Lookup for vulnerable packages by Package URL.

GET /api/packages/71878?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/71878?format=api",
    "purl": "pkg:ebuild/dev-lang/rust-bin@1.63.0-r1",
    "type": "ebuild",
    "namespace": "dev-lang",
    "name": "rust-bin",
    "version": "1.63.0-r1",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "1.64.0",
    "latest_non_vulnerable_version": "1.71.1",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31468?format=api",
            "vulnerability_id": "VCID-4khp-kevq-xff5",
            "summary": "Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28875.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28875.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28875",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61571",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61773",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61788",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61744",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61645",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61676",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61647",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61695",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61711",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61732",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6172",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.617",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61742",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61747",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6173",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61724",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61741",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61733",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61678",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28875"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28875",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28875"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949194",
                    "reference_id": "1949194",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949194"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803",
                    "reference_id": "986803",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1803",
                    "reference_id": "AVG-1803",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1803"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-09",
                    "reference_id": "GLSA-202210-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202210-09"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3042",
                    "reference_id": "RHSA-2021:3042",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3042"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3063",
                    "reference_id": "RHSA-2021:3063",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3063"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/71878?format=api",
                    "purl": "pkg:ebuild/dev-lang/rust-bin@1.63.0-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.63.0-r1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/71879?format=api",
                    "purl": "pkg:ebuild/dev-lang/rust-bin@1.64.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.64.0"
                }
            ],
            "aliases": [
                "CVE-2021-28875"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4khp-kevq-xff5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31477?format=api",
            "vulnerability_id": "VCID-69zd-gcvx-fuhr",
            "summary": "Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42574.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42574.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-42574",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.24988",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96216",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.24988",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96165",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.24988",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96167",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.24988",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96175",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.24988",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9618",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.24988",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96207",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.24988",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96211",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.25471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96197",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.25471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96234",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.25471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96189",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.25471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96236",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.25471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96213",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.25471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9621",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.25471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.962",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.25471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96233",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.25471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96232",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.25471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96181",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.25471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96253",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.25471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96246",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-42574"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42574",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42574"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2021/11/01/1",
                    "reference_id": "1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2021/11/01/1"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2021/11/02/10",
                    "reference_id": "10",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2021/11/02/10"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005819",
                    "reference_id": "2005819",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005819"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2021/11/01/4",
                    "reference_id": "4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2021/11/01/4"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2021/11/01/5",
                    "reference_id": "5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2021/11/01/5"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2021/11/01/6",
                    "reference_id": "6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2021/11/01/6"
                },
                {
                    "reference_url": "https://www.kb.cert.org/vuls/id/999008",
                    "reference_id": "999008",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/"
                        }
                    ],
                    "url": "https://www.kb.cert.org/vuls/id/999008"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2506",
                    "reference_id": "AVG-2506",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2506"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-09",
                    "reference_id": "GLSA-202210-09",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202210-09"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/",
                    "reference_id": "IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/",
                    "reference_id": "LQNTFF24ROHLVPLUOEISBN3F7QM27L4U",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/",
                    "reference_id": "QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4033",
                    "reference_id": "RHSA-2021:4033",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4033"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4034",
                    "reference_id": "RHSA-2021:4034",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4034"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4035",
                    "reference_id": "RHSA-2021:4035",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4035"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4036",
                    "reference_id": "RHSA-2021:4036",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4036"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4037",
                    "reference_id": "RHSA-2021:4037",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4037"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4038",
                    "reference_id": "RHSA-2021:4038",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4038"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4039",
                    "reference_id": "RHSA-2021:4039",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4039"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4585",
                    "reference_id": "RHSA-2021:4585",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4585"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4586",
                    "reference_id": "RHSA-2021:4586",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4586"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4587",
                    "reference_id": "RHSA-2021:4587",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4587"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4588",
                    "reference_id": "RHSA-2021:4588",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4588"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4589",
                    "reference_id": "RHSA-2021:4589",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4589"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4590",
                    "reference_id": "RHSA-2021:4590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4591",
                    "reference_id": "RHSA-2021:4591",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4591"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4592",
                    "reference_id": "RHSA-2021:4592",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4592"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4593",
                    "reference_id": "RHSA-2021:4593",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4593"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4594",
                    "reference_id": "RHSA-2021:4594",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4594"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4595",
                    "reference_id": "RHSA-2021:4595",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4595"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4596",
                    "reference_id": "RHSA-2021:4596",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4596"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4598",
                    "reference_id": "RHSA-2021:4598",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4598"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4599",
                    "reference_id": "RHSA-2021:4599",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4599"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4600",
                    "reference_id": "RHSA-2021:4600",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4600"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4601",
                    "reference_id": "RHSA-2021:4601",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4601"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4602",
                    "reference_id": "RHSA-2021:4602",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4602"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4649",
                    "reference_id": "RHSA-2021:4649",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4649"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4669",
                    "reference_id": "RHSA-2021:4669",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4669"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4694",
                    "reference_id": "RHSA-2021:4694",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4694"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4723",
                    "reference_id": "RHSA-2021:4723",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4723"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4724",
                    "reference_id": "RHSA-2021:4724",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4724"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4729",
                    "reference_id": "RHSA-2021:4729",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4729"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4730",
                    "reference_id": "RHSA-2021:4730",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4730"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4743",
                    "reference_id": "RHSA-2021:4743",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4743"
                },
                {
                    "reference_url": "https://www.starwindsoftware.com/security/sw-20220804-0002/",
                    "reference_id": "sw-20220804-0002",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/"
                        }
                    ],
                    "url": "https://www.starwindsoftware.com/security/sw-20220804-0002/"
                },
                {
                    "reference_url": "https://www.unicode.org/reports/tr31/",
                    "reference_id": "tr31",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/"
                        }
                    ],
                    "url": "https://www.unicode.org/reports/tr31/"
                },
                {
                    "reference_url": "https://www.unicode.org/reports/tr36/",
                    "reference_id": "tr36",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/"
                        }
                    ],
                    "url": "https://www.unicode.org/reports/tr36/"
                },
                {
                    "reference_url": "https://www.unicode.org/reports/tr39/",
                    "reference_id": "tr39",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/"
                        }
                    ],
                    "url": "https://www.unicode.org/reports/tr39/"
                },
                {
                    "reference_url": "https://www.unicode.org/reports/tr9/tr9-44.html#HL4",
                    "reference_id": "tr9-44.html#HL4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/"
                        }
                    ],
                    "url": "https://www.unicode.org/reports/tr9/tr9-44.html#HL4"
                },
                {
                    "reference_url": "https://www.scyon.nl/post/trojans-in-your-source-code",
                    "reference_id": "trojans-in-your-source-code",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/"
                        }
                    ],
                    "url": "https://www.scyon.nl/post/trojans-in-your-source-code"
                },
                {
                    "reference_url": "https://trojansource.codes",
                    "reference_id": "trojansource.codes",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/"
                        }
                    ],
                    "url": "https://trojansource.codes"
                },
                {
                    "reference_url": "http://www.unicode.org/versions/Unicode14.0.0/",
                    "reference_id": "Unicode14.0.0",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/"
                        }
                    ],
                    "url": "http://www.unicode.org/versions/Unicode14.0.0/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/71878?format=api",
                    "purl": "pkg:ebuild/dev-lang/rust-bin@1.63.0-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.63.0-r1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/71879?format=api",
                    "purl": "pkg:ebuild/dev-lang/rust-bin@1.64.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.64.0"
                }
            ],
            "aliases": [
                "CVE-2021-42574"
            ],
            "risk_score": 3.9,
            "exploitability": "0.5",
            "weighted_severity": "7.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-69zd-gcvx-fuhr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31469?format=api",
            "vulnerability_id": "VCID-7ap9-xghv-dbdy",
            "summary": "Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28876.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28876.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28876",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61752",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61952",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61971",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61925",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61826",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61857",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61827",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61876",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61892",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61913",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61901",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61881",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61924",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61929",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61912",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61908",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61926",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61918",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61862",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6191",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28876"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28876",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28876"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949198",
                    "reference_id": "1949198",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949198"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803",
                    "reference_id": "986803",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1801",
                    "reference_id": "AVG-1801",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1801"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-09",
                    "reference_id": "GLSA-202210-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202210-09"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3042",
                    "reference_id": "RHSA-2021:3042",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3042"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3063",
                    "reference_id": "RHSA-2021:3063",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3063"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/71878?format=api",
                    "purl": "pkg:ebuild/dev-lang/rust-bin@1.63.0-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.63.0-r1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/71879?format=api",
                    "purl": "pkg:ebuild/dev-lang/rust-bin@1.64.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.64.0"
                }
            ],
            "aliases": [
                "CVE-2021-28876"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7ap9-xghv-dbdy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31478?format=api",
            "vulnerability_id": "VCID-7mnt-kvuh-cfba",
            "summary": "Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42694.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42694.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-42694",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05247",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89939",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.07635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91893",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.07635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91896",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.07635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91881",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.07635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91877",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.07635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91872",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91851",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91859",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91845",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.08235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92276",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.08235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92236",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.08235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92246",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.08235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92257",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.08235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92265",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.08235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92269",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.0844",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92356",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0844",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92361",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0844",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92362",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-42694"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2021/11/01/1",
                    "reference_id": "1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-18T17:31:01Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2021/11/01/1"
                },
                {
                    "reference_url": "https://cwe.mitre.org/data/definitions/1007.html",
                    "reference_id": "1007.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-18T17:31:01Z/"
                        }
                    ],
                    "url": "https://cwe.mitre.org/data/definitions/1007.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015365",
                    "reference_id": "2015365",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015365"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2021/11/01/6",
                    "reference_id": "6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-18T17:31:01Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2021/11/01/6"
                },
                {
                    "reference_url": "https://www.kb.cert.org/vuls/id/999008",
                    "reference_id": "999008",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-18T17:31:01Z/"
                        }
                    ],
                    "url": "https://www.kb.cert.org/vuls/id/999008"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2507",
                    "reference_id": "AVG-2507",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2507"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-09",
                    "reference_id": "GLSA-202210-09",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-18T17:31:01Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202210-09"
                },
                {
                    "reference_url": "https://www.unicode.org/reports/tr36/",
                    "reference_id": "tr36",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-18T17:31:01Z/"
                        }
                    ],
                    "url": "https://www.unicode.org/reports/tr36/"
                },
                {
                    "reference_url": "https://www.unicode.org/reports/tr39/",
                    "reference_id": "tr39",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-18T17:31:01Z/"
                        }
                    ],
                    "url": "https://www.unicode.org/reports/tr39/"
                },
                {
                    "reference_url": "https://www.scyon.nl/post/trojans-in-your-source-code",
                    "reference_id": "trojans-in-your-source-code",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-18T17:31:01Z/"
                        }
                    ],
                    "url": "https://www.scyon.nl/post/trojans-in-your-source-code"
                },
                {
                    "reference_url": "https://trojansource.codes",
                    "reference_id": "trojansource.codes",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-18T17:31:01Z/"
                        }
                    ],
                    "url": "https://trojansource.codes"
                },
                {
                    "reference_url": "http://www.unicode.org/versions/Unicode14.0.0/",
                    "reference_id": "Unicode14.0.0",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-18T17:31:01Z/"
                        }
                    ],
                    "url": "http://www.unicode.org/versions/Unicode14.0.0/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/71878?format=api",
                    "purl": "pkg:ebuild/dev-lang/rust-bin@1.63.0-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.63.0-r1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/71879?format=api",
                    "purl": "pkg:ebuild/dev-lang/rust-bin@1.64.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.64.0"
                }
            ],
            "aliases": [
                "CVE-2021-42694"
            ],
            "risk_score": 3.8,
            "exploitability": "0.5",
            "weighted_severity": "7.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7mnt-kvuh-cfba"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31474?format=api",
            "vulnerability_id": "VCID-d8yv-ngej-1kf7",
            "summary": "Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-31162.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-31162.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-31162",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00737",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72765",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00737",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72946",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00737",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72959",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00737",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72922",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00737",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72773",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00737",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72793",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00737",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72769",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00737",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72808",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00737",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72822",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00737",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72846",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00737",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72829",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00737",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72821",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00737",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72862",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00737",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72873",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00737",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72864",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00737",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72905",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00737",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72915",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00737",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72913",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00737",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72908",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00737",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72934",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-31162"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31162",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31162"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950398",
                    "reference_id": "1950398",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950398"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1801",
                    "reference_id": "AVG-1801",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1801"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-09",
                    "reference_id": "GLSA-202210-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202210-09"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3042",
                    "reference_id": "RHSA-2021:3042",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3042"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3063",
                    "reference_id": "RHSA-2021:3063",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3063"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/71878?format=api",
                    "purl": "pkg:ebuild/dev-lang/rust-bin@1.63.0-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.63.0-r1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/71879?format=api",
                    "purl": "pkg:ebuild/dev-lang/rust-bin@1.64.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.64.0"
                }
            ],
            "aliases": [
                "CVE-2021-31162"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d8yv-ngej-1kf7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31476?format=api",
            "vulnerability_id": "VCID-e29z-agvj-jkdn",
            "summary": "Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-36318",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12356",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12464",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12507",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12312",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12391",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12441",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12448",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1241",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1237",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12271",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1227",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12375",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12374",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12341",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12228",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12144",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12279",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12342",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12335",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1236",
                            "published_at": "2026-05-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-36318"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-09",
                    "reference_id": "GLSA-202210-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202210-09"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/71878?format=api",
                    "purl": "pkg:ebuild/dev-lang/rust-bin@1.63.0-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.63.0-r1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/71879?format=api",
                    "purl": "pkg:ebuild/dev-lang/rust-bin@1.64.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.64.0"
                }
            ],
            "aliases": [
                "CVE-2021-36318"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e29z-agvj-jkdn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31473?format=api",
            "vulnerability_id": "VCID-f4bw-5erp-4uc6",
            "summary": "Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29922.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29922.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5542",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55535",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55549",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55508",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55531",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55557",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55533",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55585",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55587",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55596",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55576",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55558",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55595",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55598",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55577",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55505",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55522",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55497",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55445",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55491",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29922"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29922"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991962",
                    "reference_id": "1991962",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991962"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2263",
                    "reference_id": "AVG-2263",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2263"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-09",
                    "reference_id": "GLSA-202210-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202210-09"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4270",
                    "reference_id": "RHSA-2021:4270",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4270"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/71878?format=api",
                    "purl": "pkg:ebuild/dev-lang/rust-bin@1.63.0-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.63.0-r1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/71879?format=api",
                    "purl": "pkg:ebuild/dev-lang/rust-bin@1.64.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.64.0"
                }
            ],
            "aliases": [
                "CVE-2021-29922"
            ],
            "risk_score": 3.3,
            "exploitability": "0.5",
            "weighted_severity": "6.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f4bw-5erp-4uc6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31470?format=api",
            "vulnerability_id": "VCID-fu46-5dhv-ckdt",
            "summary": "Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28877.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28877.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28877",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50792",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50825",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50839",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50794",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50847",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50873",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50831",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50888",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50886",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50928",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50907",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5089",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50934",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50914",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50862",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5087",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5083",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50755",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50808",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28877"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28877",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28877"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949204",
                    "reference_id": "1949204",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949204"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803",
                    "reference_id": "986803",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1802",
                    "reference_id": "AVG-1802",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1802"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-09",
                    "reference_id": "GLSA-202210-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202210-09"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3042",
                    "reference_id": "RHSA-2021:3042",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3042"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3063",
                    "reference_id": "RHSA-2021:3063",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3063"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/71878?format=api",
                    "purl": "pkg:ebuild/dev-lang/rust-bin@1.63.0-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.63.0-r1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/71879?format=api",
                    "purl": "pkg:ebuild/dev-lang/rust-bin@1.64.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.64.0"
                }
            ],
            "aliases": [
                "CVE-2021-28877"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fu46-5dhv-ckdt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31475?format=api",
            "vulnerability_id": "VCID-hh53-d664-akdu",
            "summary": "Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-36317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10808",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10943",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11006",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10831",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10906",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10959",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1096",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10928",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10904",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10769",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10782",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10903",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10862",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10821",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10761",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10704",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10839",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10911",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10896",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10941",
                            "published_at": "2026-05-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-36317"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-09",
                    "reference_id": "GLSA-202210-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202210-09"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/71878?format=api",
                    "purl": "pkg:ebuild/dev-lang/rust-bin@1.63.0-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.63.0-r1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/71879?format=api",
                    "purl": "pkg:ebuild/dev-lang/rust-bin@1.64.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.64.0"
                }
            ],
            "aliases": [
                "CVE-2021-36317"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hh53-d664-akdu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31479?format=api",
            "vulnerability_id": "VCID-j9kg-rd4y-y7by",
            "summary": "Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21658.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21658.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21658",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00893",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7552",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00893",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7555",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00893",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75582",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00893",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75589",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00893",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75608",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00893",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75583",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00893",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75572",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00893",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7553",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00906",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75842",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00906",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75823",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00906",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75817",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00906",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75778",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00906",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7588",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00906",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75895",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00906",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75871",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00906",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75834",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00906",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75793",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00906",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75789",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21658"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21658",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21658"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041504",
                    "reference_id": "2041504",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041504"
                },
                {
                    "reference_url": "https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946",
                    "reference_id": "32ed6e599bb4722efefd78bbc9cd7ec4613cb946",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/"
                        }
                    ],
                    "url": "https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946"
                },
                {
                    "reference_url": "https://github.com/rust-lang/rust/pull/93110/commits/406cc071d6cfdfdb678bf3d83d766851de95abaf",
                    "reference_id": "406cc071d6cfdfdb678bf3d83d766851de95abaf",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/"
                        }
                    ],
                    "url": "https://github.com/rust-lang/rust/pull/93110/commits/406cc071d6cfdfdb678bf3d83d766851de95abaf"
                },
                {
                    "reference_url": "https://github.com/rust-lang/rust/pull/93110/commits/4f0ad1c92ca08da6e8dc17838070975762f59714",
                    "reference_id": "4f0ad1c92ca08da6e8dc17838070975762f59714",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/"
                        }
                    ],
                    "url": "https://github.com/rust-lang/rust/pull/93110/commits/4f0ad1c92ca08da6e8dc17838070975762f59714"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7JKZDTBMGAWIFJSNWKBMPO5EAKRR4BEW/",
                    "reference_id": "7JKZDTBMGAWIFJSNWKBMPO5EAKRR4BEW",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7JKZDTBMGAWIFJSNWKBMPO5EAKRR4BEW/"
                },
                {
                    "reference_url": "https://github.com/rust-lang/rust/pull/93110",
                    "reference_id": "93110",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/"
                        }
                    ],
                    "url": "https://github.com/rust-lang/rust/pull/93110"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BK32QZLHDC2OVLPKTUHNT2G3VHWHD4LX/",
                    "reference_id": "BK32QZLHDC2OVLPKTUHNT2G3VHWHD4LX",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BK32QZLHDC2OVLPKTUHNT2G3VHWHD4LX/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C63NH72Q7UHJM5V3IVYRI7LVBGGFQMSQ/",
                    "reference_id": "C63NH72Q7UHJM5V3IVYRI7LVBGGFQMSQ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C63NH72Q7UHJM5V3IVYRI7LVBGGFQMSQ/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKGTACKMKAPRDPWPTU26GYWBELIRFF5N/",
                    "reference_id": "CKGTACKMKAPRDPWPTU26GYWBELIRFF5N",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKGTACKMKAPRDPWPTU26GYWBELIRFF5N/"
                },
                {
                    "reference_url": "https://blog.rust-lang.org/2022/01/20/cve-2022-21658.html",
                    "reference_id": "cve-2022-21658.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/"
                        }
                    ],
                    "url": "https://blog.rust-lang.org/2022/01/20/cve-2022-21658.html"
                },
                {
                    "reference_url": "https://github.com/rust-lang/rust/security/advisories/GHSA-r9cc-f5pr-p3j2",
                    "reference_id": "GHSA-r9cc-f5pr-p3j2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/"
                        }
                    ],
                    "url": "https://github.com/rust-lang/rust/security/advisories/GHSA-r9cc-f5pr-p3j2"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-09",
                    "reference_id": "GLSA-202210-09",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202210-09"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213182",
                    "reference_id": "HT213182",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213182"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213183",
                    "reference_id": "HT213183",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213183"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213186",
                    "reference_id": "HT213186",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213186"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213193",
                    "reference_id": "HT213193",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213193"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1894",
                    "reference_id": "RHSA-2022:1894",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1894"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/71878?format=api",
                    "purl": "pkg:ebuild/dev-lang/rust-bin@1.63.0-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.63.0-r1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/71879?format=api",
                    "purl": "pkg:ebuild/dev-lang/rust-bin@1.64.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.64.0"
                }
            ],
            "aliases": [
                "CVE-2022-21658"
            ],
            "risk_score": 3.3,
            "exploitability": "0.5",
            "weighted_severity": "6.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j9kg-rd4y-y7by"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31472?format=api",
            "vulnerability_id": "VCID-pbjz-th4w-tqgb",
            "summary": "Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28879.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28879.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28879",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77984",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78186",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78177",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78167",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77992",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78022",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78004",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7803",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78035",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78061",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78044",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78041",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78077",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78075",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78069",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78102",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78109",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78123",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78134",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7816",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28879"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28879",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28879"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949211",
                    "reference_id": "1949211",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949211"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803",
                    "reference_id": "986803",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1801",
                    "reference_id": "AVG-1801",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1801"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-09",
                    "reference_id": "GLSA-202210-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202210-09"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3042",
                    "reference_id": "RHSA-2021:3042",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3042"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3063",
                    "reference_id": "RHSA-2021:3063",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3063"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/71878?format=api",
                    "purl": "pkg:ebuild/dev-lang/rust-bin@1.63.0-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.63.0-r1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/71879?format=api",
                    "purl": "pkg:ebuild/dev-lang/rust-bin@1.64.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.64.0"
                }
            ],
            "aliases": [
                "CVE-2021-28879"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pbjz-th4w-tqgb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31471?format=api",
            "vulnerability_id": "VCID-pvm9-wtbx-1ubx",
            "summary": "Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28878.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28878.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28878",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77065",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77277",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.01012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77271",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7726",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.01012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77071",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.771",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77082",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77115",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77124",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77152",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77131",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77126",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77167",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77169",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77161",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77195",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77202",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77216",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77221",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7725",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28878"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28878",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28878"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949207",
                    "reference_id": "1949207",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949207"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803",
                    "reference_id": "986803",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1801",
                    "reference_id": "AVG-1801",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1801"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-09",
                    "reference_id": "GLSA-202210-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202210-09"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3042",
                    "reference_id": "RHSA-2021:3042",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3042"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3063",
                    "reference_id": "RHSA-2021:3063",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3063"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/71878?format=api",
                    "purl": "pkg:ebuild/dev-lang/rust-bin@1.63.0-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.63.0-r1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/71879?format=api",
                    "purl": "pkg:ebuild/dev-lang/rust-bin@1.64.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.64.0"
                }
            ],
            "aliases": [
                "CVE-2021-28878"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pvm9-wtbx-1ubx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31480?format=api",
            "vulnerability_id": "VCID-r9ky-9nbm-yucw",
            "summary": "Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36113",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.08941",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9257",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.08941",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92647",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.08941",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92641",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.08941",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92639",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.08941",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92627",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.08941",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92615",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.08941",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92606",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.08941",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9261",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.08941",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92607",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.08941",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92604",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.08941",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92605",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.08941",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9256",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.08941",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92581",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.08941",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92567",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.08941",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92592",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.08941",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92591",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.08941",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92586",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36113"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36113",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36113"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/rust-lang/cargo",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rust-lang/cargo"
                },
                {
                    "reference_url": "https://github.com/rust-lang/cargo/commit/15f1e4b0bf4b4fc20369e0a85d9b77957c4dd52a",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rust-lang/cargo/commit/15f1e4b0bf4b4fc20369e0a85d9b77957c4dd52a"
                },
                {
                    "reference_url": "https://github.com/rust-lang/cargo/commit/97b80919e404b0768ea31ae329c3b4da54bed05a",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "4.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:00:37Z/"
                        }
                    ],
                    "url": "https://github.com/rust-lang/cargo/commit/97b80919e404b0768ea31ae329c3b4da54bed05a"
                },
                {
                    "reference_url": "https://github.com/rust-lang/cargo/commit/dafe4a7ea016739680ec7998aebe1bc6de131a5b",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rust-lang/cargo/commit/dafe4a7ea016739680ec7998aebe1bc6de131a5b"
                },
                {
                    "reference_url": "https://github.com/rust-lang/cargo/security/advisories/GHSA-rfj2-q3h3-hm5j",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "4.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:00:37Z/"
                        }
                    ],
                    "url": "https://github.com/rust-lang/cargo/security/advisories/GHSA-rfj2-q3h3-hm5j"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36113",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36113"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021142",
                    "reference_id": "1021142",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021142"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021143",
                    "reference_id": "1021143",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021143"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-rfj2-q3h3-hm5j",
                    "reference_id": "GHSA-rfj2-q3h3-hm5j",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-rfj2-q3h3-hm5j"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-09",
                    "reference_id": "GLSA-202210-09",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202210-09"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/71878?format=api",
                    "purl": "pkg:ebuild/dev-lang/rust-bin@1.63.0-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.63.0-r1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/71879?format=api",
                    "purl": "pkg:ebuild/dev-lang/rust-bin@1.64.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.64.0"
                }
            ],
            "aliases": [
                "CVE-2022-36113",
                "GHSA-rfj2-q3h3-hm5j"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r9ky-9nbm-yucw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31481?format=api",
            "vulnerability_id": "VCID-ssct-y25y-3qbw",
            "summary": "Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36114",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65074",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65206",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65183",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65214",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65169",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65121",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65138",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65139",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65126",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65109",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65125",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65099",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65086",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65036",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65116",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6508",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65108",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65047",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65118",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36114"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36114",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36114"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/rust-lang/cargo",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rust-lang/cargo"
                },
                {
                    "reference_url": "https://github.com/rust-lang/cargo/commit/2b68d3c07a4a056264dc006ecb9f1354a0679cd3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rust-lang/cargo/commit/2b68d3c07a4a056264dc006ecb9f1354a0679cd3"
                },
                {
                    "reference_url": "https://github.com/rust-lang/cargo/commit/d1f9553c825f6d7481453be8d58d0e7f117988a7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:00:35Z/"
                        }
                    ],
                    "url": "https://github.com/rust-lang/cargo/commit/d1f9553c825f6d7481453be8d58d0e7f117988a7"
                },
                {
                    "reference_url": "https://github.com/rust-lang/cargo/commit/d87d57dbbda61754f4fab0f329a7ac520e062c46",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rust-lang/cargo/commit/d87d57dbbda61754f4fab0f329a7ac520e062c46"
                },
                {
                    "reference_url": "https://github.com/rust-lang/cargo/security/advisories/GHSA-2hvr-h6gw-qrxp",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:00:35Z/"
                        }
                    ],
                    "url": "https://github.com/rust-lang/cargo/security/advisories/GHSA-2hvr-h6gw-qrxp"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36114",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36114"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021142",
                    "reference_id": "1021142",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021142"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021143",
                    "reference_id": "1021143",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021143"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-2hvr-h6gw-qrxp",
                    "reference_id": "GHSA-2hvr-h6gw-qrxp",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-2hvr-h6gw-qrxp"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-09",
                    "reference_id": "GLSA-202210-09",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202210-09"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/71878?format=api",
                    "purl": "pkg:ebuild/dev-lang/rust-bin@1.63.0-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.63.0-r1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/71879?format=api",
                    "purl": "pkg:ebuild/dev-lang/rust-bin@1.64.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.64.0"
                }
            ],
            "aliases": [
                "CVE-2022-36114",
                "GHSA-2hvr-h6gw-qrxp"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ssct-y25y-3qbw"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.63.0-r1"
}