Lookup for vulnerable packages by Package URL.

GET /api/packages/1037616?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/1037616?format=api",
    "purl": "pkg:deb/debian/util-linux@2.29.2-1%2Bdeb9u1",
    "type": "deb",
    "namespace": "debian",
    "name": "util-linux",
    "version": "2.29.2-1+deb9u1",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "2.42-5",
    "latest_non_vulnerable_version": "2.42-5",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77137?format=api",
            "vulnerability_id": "VCID-3pq5-w4nm-dkec",
            "summary": "util-linux: CVE-2024-28085: wall: escape sequence injection",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28085.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28085.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-28085",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.10177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9317",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.10177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93156",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.10177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9315",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.10177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93153",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.10177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93154",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.10177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93148",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.10177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9318",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.10933",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93425",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.10933",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9342",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.11188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93485",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.11188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9347",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.11188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93494",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.11188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93493",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.11188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93488",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.11188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93477",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-28085"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28085",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28085"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/03/28/1",
                    "reference_id": "1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/03/28/1"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067849",
                    "reference_id": "1067849",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067849"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/03/28/2",
                    "reference_id": "2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/03/28/2"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271942",
                    "reference_id": "2271942",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271942"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/03/28/3",
                    "reference_id": "3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/03/28/3"
                },
                {
                    "reference_url": "https://www.openwall.com/lists/oss-security/2024/03/27/5",
                    "reference_id": "5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"
                        }
                    ],
                    "url": "https://www.openwall.com/lists/oss-security/2024/03/27/5"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/03/27/5",
                    "reference_id": "5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/03/27/5"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/03/27/6",
                    "reference_id": "6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/03/27/6"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/03/27/7",
                    "reference_id": "7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/03/27/7"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/03/27/8",
                    "reference_id": "8",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/03/27/8"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/03/27/9",
                    "reference_id": "9",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/03/27/9"
                },
                {
                    "reference_url": "https://github.com/skyler-ferrante/CVE-2024-28085",
                    "reference_id": "CVE-2024-28085",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"
                        }
                    ],
                    "url": "https://github.com/skyler-ferrante/CVE-2024-28085"
                },
                {
                    "reference_url": "https://github.com/util-linux/util-linux/security/advisories/GHSA-xv2h-c6ww-mrjq",
                    "reference_id": "GHSA-xv2h-c6ww-mrjq",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"
                        }
                    ],
                    "url": "https://github.com/util-linux/util-linux/security/advisories/GHSA-xv2h-c6ww-mrjq"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00005.html",
                    "reference_id": "msg00005.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00005.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240531-0003/",
                    "reference_id": "ntap-20240531-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240531-0003/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6719-1/",
                    "reference_id": "USN-6719-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6719-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6719-2/",
                    "reference_id": "USN-6719-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6719-2/"
                },
                {
                    "reference_url": "https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/",
                    "reference_id": "util-linux",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"
                        }
                    ],
                    "url": "https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/"
                },
                {
                    "reference_url": "https://people.rit.edu/sjf5462/6831711781/wall_2_27_2024.txt",
                    "reference_id": "wall_2_27_2024.txt",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"
                        }
                    ],
                    "url": "https://people.rit.edu/sjf5462/6831711781/wall_2_27_2024.txt"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/995044?format=api",
                    "purl": "pkg:deb/debian/util-linux@2.36.1-8%2Bdeb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8hsf-75uj-13cd"
                        },
                        {
                            "vulnerability": "VCID-uchq-5u5j-wbez"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.36.1-8%252Bdeb11u2"
                }
            ],
            "aliases": [
                "CVE-2024-28085"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3pq5-w4nm-dkec"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49128?format=api",
            "vulnerability_id": "VCID-773t-t959-z3c1",
            "summary": "Multiple vulnerabilities have been discovered in util-linux which can lead to denial of service or information disclosure.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3996.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3996.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3996",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00171",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38057",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00171",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37974",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00171",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38045",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46185",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46166",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46161",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46108",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46165",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46162",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46157",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46101",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46093",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46152",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46144",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46141",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46163",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46219",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46223",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3996"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/util-linux/util-linux/commit/166e87368ae88bf31112a30e078cceae637f4cdb",
                    "reference_id": "166e87368ae88bf31112a30e078cceae637f4cdb",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T21:16:28Z/"
                        }
                    ],
                    "url": "https://github.com/util-linux/util-linux/commit/166e87368ae88bf31112a30e078cceae637f4cdb"
                },
                {
                    "reference_url": "https://www.openwall.com/lists/oss-security/2022/01/24/2",
                    "reference_id": "2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T21:16:28Z/"
                        }
                    ],
                    "url": "https://www.openwall.com/lists/oss-security/2022/01/24/2"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/11/30/2",
                    "reference_id": "2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T21:16:28Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/11/30/2"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024628",
                    "reference_id": "2024628",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T21:16:28Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024628"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/4",
                    "reference_id": "4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T21:16:28Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/4"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2021-3996",
                    "reference_id": "CVE-2021-3996",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T21:16:28Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2021-3996"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202401-08",
                    "reference_id": "GLSA-202401-08",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T21:16:28Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202401-08"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20221209-0002/",
                    "reference_id": "ntap-20221209-0002",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T21:16:28Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20221209-0002/"
                },
                {
                    "reference_url": "http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html",
                    "reference_id": "snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T21:16:28Z/"
                        }
                    ],
                    "url": "http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5279-1/",
                    "reference_id": "USN-5279-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5279-1/"
                },
                {
                    "reference_url": "https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes",
                    "reference_id": "v2.37.3-ReleaseNotes",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T21:16:28Z/"
                        }
                    ],
                    "url": "https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/995044?format=api",
                    "purl": "pkg:deb/debian/util-linux@2.36.1-8%2Bdeb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8hsf-75uj-13cd"
                        },
                        {
                            "vulnerability": "VCID-uchq-5u5j-wbez"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.36.1-8%252Bdeb11u2"
                }
            ],
            "aliases": [
                "CVE-2021-3996"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-773t-t959-z3c1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49129?format=api",
            "vulnerability_id": "VCID-7ha4-8xxt-xkfy",
            "summary": "Multiple vulnerabilities have been discovered in util-linux which can lead to denial of service or information disclosure.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37600.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37600.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-37600",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12641",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12445",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12581",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17224",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17274",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17055",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17145",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17202",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17177",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1713",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17069",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17006",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17009",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17046",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16946",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16929",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16879",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1705",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-37600"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1987320",
                    "reference_id": "1987320",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1987320"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991619",
                    "reference_id": "991619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991619"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2236",
                    "reference_id": "AVG-2236",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2236"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202401-08",
                    "reference_id": "GLSA-202401-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202401-08"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/995044?format=api",
                    "purl": "pkg:deb/debian/util-linux@2.36.1-8%2Bdeb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8hsf-75uj-13cd"
                        },
                        {
                            "vulnerability": "VCID-uchq-5u5j-wbez"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.36.1-8%252Bdeb11u2"
                }
            ],
            "aliases": [
                "CVE-2021-37600"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7ha4-8xxt-xkfy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49127?format=api",
            "vulnerability_id": "VCID-9czu-jh2d-dbhx",
            "summary": "Multiple vulnerabilities have been discovered in util-linux which can lead to denial of service or information disclosure.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3995.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3995.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3995",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4213",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42217",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42157",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42207",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42215",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42238",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42201",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42132",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42077",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42073",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41991",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42175",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42226",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48065",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4813",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48154",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3995"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024631",
                    "reference_id": "2024631",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024631"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202401-08",
                    "reference_id": "GLSA-202401-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202401-08"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5279-1/",
                    "reference_id": "USN-5279-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5279-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/995044?format=api",
                    "purl": "pkg:deb/debian/util-linux@2.36.1-8%2Bdeb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8hsf-75uj-13cd"
                        },
                        {
                            "vulnerability": "VCID-uchq-5u5j-wbez"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.36.1-8%252Bdeb11u2"
                }
            ],
            "aliases": [
                "CVE-2021-3995"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9czu-jh2d-dbhx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85316?format=api",
            "vulnerability_id": "VCID-ed2c-q43s-cydc",
            "summary": "util-linux: runuser tty hijack via TIOCSTI ioctl",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2779.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2779.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2779",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12145",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12049",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11913",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12262",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12307",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12105",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12185",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12237",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12244",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12209",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12173",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12042",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12045",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12159",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1214",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12103",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2779"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2779",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2779"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:H/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312852",
                    "reference_id": "1312852",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312852"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922",
                    "reference_id": "815922",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1049840?format=api",
                    "purl": "pkg:deb/debian/util-linux@2.33.1-0.1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3pq5-w4nm-dkec"
                        },
                        {
                            "vulnerability": "VCID-773t-t959-z3c1"
                        },
                        {
                            "vulnerability": "VCID-7ha4-8xxt-xkfy"
                        },
                        {
                            "vulnerability": "VCID-9czu-jh2d-dbhx"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.33.1-0.1"
                }
            ],
            "aliases": [
                "CVE-2016-2779"
            ],
            "risk_score": 3.9,
            "exploitability": "0.5",
            "weighted_severity": "7.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ed2c-q43s-cydc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60896?format=api",
            "vulnerability_id": "VCID-rnst-1ugv-pufk",
            "summary": "A vulnerability was discovered in util-linux, which could\n    potentially lead to the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7738.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7738.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7738",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21492",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21662",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21719",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21472",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21549",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21607",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2162",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21582",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21525",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21522",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2153",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21498",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21352",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2135",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21328",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21234",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21303",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2139",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7738"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7738",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7738"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552641",
                    "reference_id": "1552641",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552641"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892179",
                    "reference_id": "892179",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892179"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201803-02",
                    "reference_id": "GLSA-201803-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201803-02"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4512-1/",
                    "reference_id": "USN-4512-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4512-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1049840?format=api",
                    "purl": "pkg:deb/debian/util-linux@2.33.1-0.1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3pq5-w4nm-dkec"
                        },
                        {
                            "vulnerability": "VCID-773t-t959-z3c1"
                        },
                        {
                            "vulnerability": "VCID-7ha4-8xxt-xkfy"
                        },
                        {
                            "vulnerability": "VCID-9czu-jh2d-dbhx"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.33.1-0.1"
                }
            ],
            "aliases": [
                "CVE-2018-7738"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rnst-1ugv-pufk"
        }
    ],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85030?format=api",
            "vulnerability_id": "VCID-3dyt-qa2a-rke1",
            "summary": "util-linux: Extended partition loop in MBR partition table leads to DOS",
            "references": [
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2605.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2605.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5011.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5011.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5011",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34509",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34255",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34285",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34152",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34217",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34727",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34753",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34631",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34674",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34702",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34706",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34667",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34643",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3468",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34665",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34624",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34387",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34369",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5011"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5011",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5011"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/pub/scm/utils/util-linux/util-linux.git/commit/?id=7164a1c3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://git.kernel.org/pub/scm/utils/util-linux/util-linux.git/commit/?id=7164a1c3"
                },
                {
                    "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1024543",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1024543"
                },
                {
                    "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1021801",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1021801"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2016/07/11/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2016/07/11/2"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91683",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/91683"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1036272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1036272"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349741",
                    "reference_id": "1349741",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349741"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=830802",
                    "reference_id": "830802",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=830802"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:power_hardware_management_console:8.8.6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:power_hardware_management_console:8.8.6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:power_hardware_management_console:8.8.6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5011",
                    "reference_id": "CVE-2016-5011",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C"
                        },
                        {
                            "value": "4.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5011"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2605",
                    "reference_id": "RHSA-2016:2605",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2605"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5478-1/",
                    "reference_id": "USN-5478-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5478-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037616?format=api",
                    "purl": "pkg:deb/debian/util-linux@2.29.2-1%2Bdeb9u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3pq5-w4nm-dkec"
                        },
                        {
                            "vulnerability": "VCID-773t-t959-z3c1"
                        },
                        {
                            "vulnerability": "VCID-7ha4-8xxt-xkfy"
                        },
                        {
                            "vulnerability": "VCID-9czu-jh2d-dbhx"
                        },
                        {
                            "vulnerability": "VCID-ed2c-q43s-cydc"
                        },
                        {
                            "vulnerability": "VCID-rnst-1ugv-pufk"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.29.2-1%252Bdeb9u1"
                }
            ],
            "aliases": [
                "CVE-2016-5011"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3dyt-qa2a-rke1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78161?format=api",
            "vulnerability_id": "VCID-61nu-645a-dyhx",
            "summary": "util-linux: arbitrary commands execution via the path parameter",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-21583.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-21583.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-21583",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11321",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11458",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11337",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11214",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11147",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11278",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11517",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11304",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11387",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11445",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11449",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11416",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11249",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11378",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11319",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11276",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-21583"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21583",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21583"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238716",
                    "reference_id": "2238716",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238716"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786804",
                    "reference_id": "bugreport.cgi?bug=786804",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-07T15:19:58Z/"
                        }
                    ],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786804"
                },
                {
                    "reference_url": "https://packetstormsecurity.com/files/132061/hwclock-Privilege-Escalation.html",
                    "reference_id": "hwclock-Privilege-Escalation.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-07T15:19:58Z/"
                        }
                    ],
                    "url": "https://packetstormsecurity.com/files/132061/hwclock-Privilege-Escalation.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037616?format=api",
                    "purl": "pkg:deb/debian/util-linux@2.29.2-1%2Bdeb9u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3pq5-w4nm-dkec"
                        },
                        {
                            "vulnerability": "VCID-773t-t959-z3c1"
                        },
                        {
                            "vulnerability": "VCID-7ha4-8xxt-xkfy"
                        },
                        {
                            "vulnerability": "VCID-9czu-jh2d-dbhx"
                        },
                        {
                            "vulnerability": "VCID-ed2c-q43s-cydc"
                        },
                        {
                            "vulnerability": "VCID-rnst-1ugv-pufk"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.29.2-1%252Bdeb9u1"
                }
            ],
            "aliases": [
                "CVE-2020-21583"
            ],
            "risk_score": 2.9,
            "exploitability": "0.5",
            "weighted_severity": "5.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-61nu-645a-dyhx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38976?format=api",
            "vulnerability_id": "VCID-a5ny-vcsw-uqh1",
            "summary": "Multiple vulnerabilities have been found in Shadow, the worst of\n    which might allow privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2616.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2616.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19115",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19295",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19429",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19325",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1933",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19282",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19227",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19187",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19196",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19207",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19105",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19096",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19051",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18935",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19017",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19477",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19195",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19273",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2616"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038271",
                    "reference_id": "1038271",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:37:36Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038271"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1418710",
                    "reference_id": "1418710",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1418710"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=855943",
                    "reference_id": "855943",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=855943"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/96404",
                    "reference_id": "96404",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:37:36Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/96404"
                },
                {
                    "reference_url": "https://github.com/karelzak/util-linux/commit/dffab154d29a288aa171ff50263ecc8f2e14a891",
                    "reference_id": "dffab154d29a288aa171ff50263ecc8f2e14a891",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:37:36Z/"
                        }
                    ],
                    "url": "https://github.com/karelzak/util-linux/commit/dffab154d29a288aa171ff50263ecc8f2e14a891"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-3793",
                    "reference_id": "dsa-3793",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:37:36Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2017/dsa-3793"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201706-02",
                    "reference_id": "GLSA-201706-02",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:37:36Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201706-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0654",
                    "reference_id": "RHSA-2017:0654",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0654"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0654.html",
                    "reference_id": "RHSA-2017-0654.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:37:36Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0654.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0907",
                    "reference_id": "RHSA-2017:0907",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:37:36Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0907"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2616",
                    "reference_id": "show_bug.cgi?id=CVE-2017-2616",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:37:36Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2616"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3276-1/",
                    "reference_id": "USN-3276-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3276-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3276-3/",
                    "reference_id": "USN-3276-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3276-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037616?format=api",
                    "purl": "pkg:deb/debian/util-linux@2.29.2-1%2Bdeb9u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3pq5-w4nm-dkec"
                        },
                        {
                            "vulnerability": "VCID-773t-t959-z3c1"
                        },
                        {
                            "vulnerability": "VCID-7ha4-8xxt-xkfy"
                        },
                        {
                            "vulnerability": "VCID-9czu-jh2d-dbhx"
                        },
                        {
                            "vulnerability": "VCID-ed2c-q43s-cydc"
                        },
                        {
                            "vulnerability": "VCID-rnst-1ugv-pufk"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.29.2-1%252Bdeb9u1"
                }
            ],
            "aliases": [
                "(+",
                "CVE-2017-2616",
                "fix)",
                "regression"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a5ny-vcsw-uqh1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85546?format=api",
            "vulnerability_id": "VCID-arhf-bsdt-pbb6",
            "summary": "util-linux: File name collision due to incorrect mkstemp use",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5224.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5224.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5224",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8862",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.04076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88548",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88562",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88558",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88574",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.04076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88579",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.04076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88578",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.04076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8859",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.04076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88606",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.04076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88493",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88501",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88517",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88521",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8854",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88544",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88556",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5224"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5224",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5224"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:H/Au:N/C:N/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1256686",
                    "reference_id": "1256686",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-04T20:03:56Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1256686"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/08/24/3",
                    "reference_id": "3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-04T20:03:56Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2015/08/24/3"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/76467",
                    "reference_id": "76467",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-04T20:03:56Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/76467"
                },
                {
                    "reference_url": "https://github.com/karelzak/util-linux/commit/bde91c85bdc77975155058276f99d2e0f5eab5a9",
                    "reference_id": "bde91c85bdc77975155058276f99d2e0f5eab5a9",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-04T20:03:56Z/"
                        }
                    ],
                    "url": "https://github.com/karelzak/util-linux/commit/bde91c85bdc77975155058276f99d2e0f5eab5a9"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037616?format=api",
                    "purl": "pkg:deb/debian/util-linux@2.29.2-1%2Bdeb9u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3pq5-w4nm-dkec"
                        },
                        {
                            "vulnerability": "VCID-773t-t959-z3c1"
                        },
                        {
                            "vulnerability": "VCID-7ha4-8xxt-xkfy"
                        },
                        {
                            "vulnerability": "VCID-9czu-jh2d-dbhx"
                        },
                        {
                            "vulnerability": "VCID-ed2c-q43s-cydc"
                        },
                        {
                            "vulnerability": "VCID-rnst-1ugv-pufk"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.29.2-1%252Bdeb9u1"
                }
            ],
            "aliases": [
                "CVE-2015-5224"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-arhf-bsdt-pbb6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85534?format=api",
            "vulnerability_id": "VCID-etmy-48fm-vudb",
            "summary": "colcrt: global-buffer-overflow",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00035.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00035.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5218.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5218.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5218",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23062",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23167",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23345",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23384",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23173",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23246",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23296",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23318",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2328",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23223",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23239",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23232",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23212",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23019",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23012",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23009",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22902",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22986",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5218"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5218",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5218"
                },
                {
                    "reference_url": "https://github.com/kerolasa/lelux-utiliteetit/commit/70e3fcf293c1827a2655a86584ab13075124a8a8",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/kerolasa/lelux-utiliteetit/commit/70e3fcf293c1827a2655a86584ab13075124a8a8"
                },
                {
                    "reference_url": "https://github.com/kerolasa/lelux-utiliteetit/commit/d883d64d96ab9bef510745d064a351145b9babec",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/kerolasa/lelux-utiliteetit/commit/d883d64d96ab9bef510745d064a351145b9babec"
                },
                {
                    "reference_url": "https://www.kernel.org/pub/linux/utils/util-linux/v2.27/v2.27-ReleaseNotes",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.kernel.org/pub/linux/utils/util-linux/v2.27/v2.27-ReleaseNotes"
                },
                {
                    "reference_url": "http://www.spinics.net/lists/util-linux-ng/msg11873.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.spinics.net/lists/util-linux-ng/msg11873.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1259322",
                    "reference_id": "1259322",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1259322"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798067",
                    "reference_id": "798067",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798067"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse_project:leap:42.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse_project:leap:42.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse_project:leap:42.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5218",
                    "reference_id": "CVE-2015-5218",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5218"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037616?format=api",
                    "purl": "pkg:deb/debian/util-linux@2.29.2-1%2Bdeb9u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3pq5-w4nm-dkec"
                        },
                        {
                            "vulnerability": "VCID-773t-t959-z3c1"
                        },
                        {
                            "vulnerability": "VCID-7ha4-8xxt-xkfy"
                        },
                        {
                            "vulnerability": "VCID-9czu-jh2d-dbhx"
                        },
                        {
                            "vulnerability": "VCID-ed2c-q43s-cydc"
                        },
                        {
                            "vulnerability": "VCID-rnst-1ugv-pufk"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.29.2-1%252Bdeb9u1"
                }
            ],
            "aliases": [
                "CVE-2015-5218"
            ],
            "risk_score": 0.9,
            "exploitability": "0.5",
            "weighted_severity": "1.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-etmy-48fm-vudb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60896?format=api",
            "vulnerability_id": "VCID-rnst-1ugv-pufk",
            "summary": "A vulnerability was discovered in util-linux, which could\n    potentially lead to the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7738.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7738.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7738",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21492",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21662",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21719",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21472",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21549",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21607",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2162",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21582",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21525",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21522",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2153",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21498",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21352",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2135",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21328",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21234",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21303",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2139",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7738"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7738",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7738"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552641",
                    "reference_id": "1552641",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552641"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892179",
                    "reference_id": "892179",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892179"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201803-02",
                    "reference_id": "GLSA-201803-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201803-02"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4512-1/",
                    "reference_id": "USN-4512-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4512-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037616?format=api",
                    "purl": "pkg:deb/debian/util-linux@2.29.2-1%2Bdeb9u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3pq5-w4nm-dkec"
                        },
                        {
                            "vulnerability": "VCID-773t-t959-z3c1"
                        },
                        {
                            "vulnerability": "VCID-7ha4-8xxt-xkfy"
                        },
                        {
                            "vulnerability": "VCID-9czu-jh2d-dbhx"
                        },
                        {
                            "vulnerability": "VCID-ed2c-q43s-cydc"
                        },
                        {
                            "vulnerability": "VCID-rnst-1ugv-pufk"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.29.2-1%252Bdeb9u1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1049840?format=api",
                    "purl": "pkg:deb/debian/util-linux@2.33.1-0.1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3pq5-w4nm-dkec"
                        },
                        {
                            "vulnerability": "VCID-773t-t959-z3c1"
                        },
                        {
                            "vulnerability": "VCID-7ha4-8xxt-xkfy"
                        },
                        {
                            "vulnerability": "VCID-9czu-jh2d-dbhx"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.33.1-0.1"
                }
            ],
            "aliases": [
                "CVE-2018-7738"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rnst-1ugv-pufk"
        }
    ],
    "risk_score": "3.9",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.29.2-1%252Bdeb9u1"
}