Lookup for vulnerable packages by Package URL.

GET /api/packages/938936?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/938936?format=api",
    "purl": "pkg:deb/debian/rustc@1.53.0%2Bdfsg1-1?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "rustc",
    "version": "1.53.0+dfsg1-1",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "1.57.0+dfsg1-1",
    "latest_non_vulnerable_version": "1.94.1+dfsg1-1",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31468?format=api",
            "vulnerability_id": "VCID-4khp-kevq-xff5",
            "summary": "Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28875.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28875.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28875",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61571",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61788",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61733",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61678",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61645",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61676",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61647",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61695",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61711",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61732",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6172",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.617",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61742",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61747",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6173",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61724",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61741",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28875"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28875",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28875"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949194",
                    "reference_id": "1949194",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949194"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803",
                    "reference_id": "986803",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1803",
                    "reference_id": "AVG-1803",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1803"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-09",
                    "reference_id": "GLSA-202210-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202210-09"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3042",
                    "reference_id": "RHSA-2021:3042",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3042"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3063",
                    "reference_id": "RHSA-2021:3063",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3063"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938936?format=api",
                    "purl": "pkg:deb/debian/rustc@1.53.0%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.53.0%252Bdfsg1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938925?format=api",
                    "purl": "pkg:deb/debian/rustc@1.63.0%2Bdfsg1-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-ehdy-7aak-r3bt"
                        },
                        {
                            "vulnerability": "VCID-qj1y-b8m1-hyfm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.63.0%252Bdfsg1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938929?format=api",
                    "purl": "pkg:deb/debian/rustc@1.85.0%2Bdfsg3-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-ehdy-7aak-r3bt"
                        },
                        {
                            "vulnerability": "VCID-qj1y-b8m1-hyfm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.85.0%252Bdfsg3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938928?format=api",
                    "purl": "pkg:deb/debian/rustc@1.92.0%2Bdfsg1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.92.0%252Bdfsg1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059655?format=api",
                    "purl": "pkg:deb/debian/rustc@1.93.1%2Bdfsg1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.93.1%252Bdfsg1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067629?format=api",
                    "purl": "pkg:deb/debian/rustc@1.94.1%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.94.1%252Bdfsg1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-28875"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4khp-kevq-xff5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31469?format=api",
            "vulnerability_id": "VCID-7ap9-xghv-dbdy",
            "summary": "Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28876.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28876.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28876",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61752",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61971",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61862",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6191",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61826",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61857",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61827",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61876",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61892",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61913",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61901",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61881",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61924",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61929",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61912",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61908",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61926",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61918",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28876"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28876",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28876"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949198",
                    "reference_id": "1949198",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949198"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803",
                    "reference_id": "986803",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1801",
                    "reference_id": "AVG-1801",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1801"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-09",
                    "reference_id": "GLSA-202210-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202210-09"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3042",
                    "reference_id": "RHSA-2021:3042",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3042"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3063",
                    "reference_id": "RHSA-2021:3063",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3063"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938936?format=api",
                    "purl": "pkg:deb/debian/rustc@1.53.0%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.53.0%252Bdfsg1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938925?format=api",
                    "purl": "pkg:deb/debian/rustc@1.63.0%2Bdfsg1-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-ehdy-7aak-r3bt"
                        },
                        {
                            "vulnerability": "VCID-qj1y-b8m1-hyfm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.63.0%252Bdfsg1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938929?format=api",
                    "purl": "pkg:deb/debian/rustc@1.85.0%2Bdfsg3-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-ehdy-7aak-r3bt"
                        },
                        {
                            "vulnerability": "VCID-qj1y-b8m1-hyfm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.85.0%252Bdfsg3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938928?format=api",
                    "purl": "pkg:deb/debian/rustc@1.92.0%2Bdfsg1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.92.0%252Bdfsg1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059655?format=api",
                    "purl": "pkg:deb/debian/rustc@1.93.1%2Bdfsg1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.93.1%252Bdfsg1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067629?format=api",
                    "purl": "pkg:deb/debian/rustc@1.94.1%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.94.1%252Bdfsg1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-28876"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7ap9-xghv-dbdy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31474?format=api",
            "vulnerability_id": "VCID-d8yv-ngej-1kf7",
            "summary": "Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-31162.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-31162.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-31162",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00737",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72765",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00737",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72959",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00737",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72908",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00737",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72934",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00737",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72773",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00737",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72793",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00737",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72769",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00737",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72808",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00737",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72822",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00737",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72846",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00737",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72829",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00737",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72821",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00737",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72862",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00737",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72873",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00737",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72864",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00737",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72905",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00737",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72915",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00737",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72913",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-31162"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31162",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31162"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950398",
                    "reference_id": "1950398",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950398"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1801",
                    "reference_id": "AVG-1801",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1801"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-09",
                    "reference_id": "GLSA-202210-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202210-09"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3042",
                    "reference_id": "RHSA-2021:3042",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3042"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3063",
                    "reference_id": "RHSA-2021:3063",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3063"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938936?format=api",
                    "purl": "pkg:deb/debian/rustc@1.53.0%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.53.0%252Bdfsg1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938925?format=api",
                    "purl": "pkg:deb/debian/rustc@1.63.0%2Bdfsg1-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-ehdy-7aak-r3bt"
                        },
                        {
                            "vulnerability": "VCID-qj1y-b8m1-hyfm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.63.0%252Bdfsg1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938929?format=api",
                    "purl": "pkg:deb/debian/rustc@1.85.0%2Bdfsg3-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-ehdy-7aak-r3bt"
                        },
                        {
                            "vulnerability": "VCID-qj1y-b8m1-hyfm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.85.0%252Bdfsg3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938928?format=api",
                    "purl": "pkg:deb/debian/rustc@1.92.0%2Bdfsg1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.92.0%252Bdfsg1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059655?format=api",
                    "purl": "pkg:deb/debian/rustc@1.93.1%2Bdfsg1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.93.1%252Bdfsg1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067629?format=api",
                    "purl": "pkg:deb/debian/rustc@1.94.1%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.94.1%252Bdfsg1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-31162"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d8yv-ngej-1kf7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31473?format=api",
            "vulnerability_id": "VCID-f4bw-5erp-4uc6",
            "summary": "Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29922.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29922.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5542",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55549",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55445",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55491",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55531",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55557",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55533",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55585",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55587",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55596",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55576",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55558",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55595",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55598",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55577",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55505",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55522",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55497",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29922"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29922"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991962",
                    "reference_id": "1991962",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991962"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2263",
                    "reference_id": "AVG-2263",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2263"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-09",
                    "reference_id": "GLSA-202210-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202210-09"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4270",
                    "reference_id": "RHSA-2021:4270",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4270"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938936?format=api",
                    "purl": "pkg:deb/debian/rustc@1.53.0%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.53.0%252Bdfsg1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938925?format=api",
                    "purl": "pkg:deb/debian/rustc@1.63.0%2Bdfsg1-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-ehdy-7aak-r3bt"
                        },
                        {
                            "vulnerability": "VCID-qj1y-b8m1-hyfm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.63.0%252Bdfsg1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938929?format=api",
                    "purl": "pkg:deb/debian/rustc@1.85.0%2Bdfsg3-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-ehdy-7aak-r3bt"
                        },
                        {
                            "vulnerability": "VCID-qj1y-b8m1-hyfm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.85.0%252Bdfsg3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938928?format=api",
                    "purl": "pkg:deb/debian/rustc@1.92.0%2Bdfsg1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.92.0%252Bdfsg1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059655?format=api",
                    "purl": "pkg:deb/debian/rustc@1.93.1%2Bdfsg1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.93.1%252Bdfsg1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067629?format=api",
                    "purl": "pkg:deb/debian/rustc@1.94.1%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.94.1%252Bdfsg1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-29922"
            ],
            "risk_score": 3.3,
            "exploitability": "0.5",
            "weighted_severity": "6.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f4bw-5erp-4uc6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31470?format=api",
            "vulnerability_id": "VCID-fu46-5dhv-ckdt",
            "summary": "Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28877.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28877.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28877",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50792",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50839",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50755",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50808",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50847",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50873",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50831",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50888",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50886",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50928",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50907",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5089",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50934",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50914",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50862",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5087",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5083",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28877"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28877",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28877"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949204",
                    "reference_id": "1949204",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949204"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803",
                    "reference_id": "986803",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1802",
                    "reference_id": "AVG-1802",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1802"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-09",
                    "reference_id": "GLSA-202210-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202210-09"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3042",
                    "reference_id": "RHSA-2021:3042",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3042"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3063",
                    "reference_id": "RHSA-2021:3063",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3063"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938936?format=api",
                    "purl": "pkg:deb/debian/rustc@1.53.0%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.53.0%252Bdfsg1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938925?format=api",
                    "purl": "pkg:deb/debian/rustc@1.63.0%2Bdfsg1-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-ehdy-7aak-r3bt"
                        },
                        {
                            "vulnerability": "VCID-qj1y-b8m1-hyfm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.63.0%252Bdfsg1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938929?format=api",
                    "purl": "pkg:deb/debian/rustc@1.85.0%2Bdfsg3-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-ehdy-7aak-r3bt"
                        },
                        {
                            "vulnerability": "VCID-qj1y-b8m1-hyfm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.85.0%252Bdfsg3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938928?format=api",
                    "purl": "pkg:deb/debian/rustc@1.92.0%2Bdfsg1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.92.0%252Bdfsg1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059655?format=api",
                    "purl": "pkg:deb/debian/rustc@1.93.1%2Bdfsg1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.93.1%252Bdfsg1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067629?format=api",
                    "purl": "pkg:deb/debian/rustc@1.94.1%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.94.1%252Bdfsg1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-28877"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fu46-5dhv-ckdt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31472?format=api",
            "vulnerability_id": "VCID-pbjz-th4w-tqgb",
            "summary": "Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28879.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28879.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28879",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77984",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78177",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78134",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7816",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77992",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78022",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78004",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7803",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78035",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78061",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78044",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78041",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78077",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78075",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78069",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78102",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78109",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78123",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28879"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28879",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28879"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949211",
                    "reference_id": "1949211",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949211"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803",
                    "reference_id": "986803",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1801",
                    "reference_id": "AVG-1801",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1801"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-09",
                    "reference_id": "GLSA-202210-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202210-09"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3042",
                    "reference_id": "RHSA-2021:3042",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3042"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3063",
                    "reference_id": "RHSA-2021:3063",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3063"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938936?format=api",
                    "purl": "pkg:deb/debian/rustc@1.53.0%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.53.0%252Bdfsg1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938925?format=api",
                    "purl": "pkg:deb/debian/rustc@1.63.0%2Bdfsg1-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-ehdy-7aak-r3bt"
                        },
                        {
                            "vulnerability": "VCID-qj1y-b8m1-hyfm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.63.0%252Bdfsg1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938929?format=api",
                    "purl": "pkg:deb/debian/rustc@1.85.0%2Bdfsg3-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-ehdy-7aak-r3bt"
                        },
                        {
                            "vulnerability": "VCID-qj1y-b8m1-hyfm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.85.0%252Bdfsg3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938928?format=api",
                    "purl": "pkg:deb/debian/rustc@1.92.0%2Bdfsg1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.92.0%252Bdfsg1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059655?format=api",
                    "purl": "pkg:deb/debian/rustc@1.93.1%2Bdfsg1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.93.1%252Bdfsg1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067629?format=api",
                    "purl": "pkg:deb/debian/rustc@1.94.1%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.94.1%252Bdfsg1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-28879"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pbjz-th4w-tqgb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31471?format=api",
            "vulnerability_id": "VCID-pvm9-wtbx-1ubx",
            "summary": "Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28878.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28878.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28878",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77065",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77271",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77221",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7725",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77071",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.771",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77082",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77115",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77124",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77152",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77131",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77126",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77167",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77169",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77161",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77195",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77202",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77216",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28878"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28878",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28878"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949207",
                    "reference_id": "1949207",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949207"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803",
                    "reference_id": "986803",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1801",
                    "reference_id": "AVG-1801",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1801"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-09",
                    "reference_id": "GLSA-202210-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202210-09"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3042",
                    "reference_id": "RHSA-2021:3042",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3042"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3063",
                    "reference_id": "RHSA-2021:3063",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3063"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938936?format=api",
                    "purl": "pkg:deb/debian/rustc@1.53.0%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.53.0%252Bdfsg1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938925?format=api",
                    "purl": "pkg:deb/debian/rustc@1.63.0%2Bdfsg1-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-ehdy-7aak-r3bt"
                        },
                        {
                            "vulnerability": "VCID-qj1y-b8m1-hyfm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.63.0%252Bdfsg1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938929?format=api",
                    "purl": "pkg:deb/debian/rustc@1.85.0%2Bdfsg3-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-ehdy-7aak-r3bt"
                        },
                        {
                            "vulnerability": "VCID-qj1y-b8m1-hyfm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.85.0%252Bdfsg3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938928?format=api",
                    "purl": "pkg:deb/debian/rustc@1.92.0%2Bdfsg1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.92.0%252Bdfsg1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059655?format=api",
                    "purl": "pkg:deb/debian/rustc@1.93.1%2Bdfsg1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.93.1%252Bdfsg1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067629?format=api",
                    "purl": "pkg:deb/debian/rustc@1.94.1%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.94.1%252Bdfsg1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-28878"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pvm9-wtbx-1ubx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80738?format=api",
            "vulnerability_id": "VCID-wdu6-3vph-aqb7",
            "summary": "rust: use-after-free or double free in VecDeque::make_contiguous",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36318.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36318.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-36318",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00356",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57759",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00356",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5779",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00356",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57851",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00356",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57834",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00356",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57843",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00356",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57863",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00356",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57838",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00356",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57893",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00356",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57894",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00356",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57911",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00356",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57887",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00356",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57867",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00356",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57896",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00356",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57895",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00356",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57873",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00356",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57833",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-36318"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36318",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36318"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949192",
                    "reference_id": "1949192",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949192"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803",
                    "reference_id": "986803",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1804",
                    "reference_id": "AVG-1804",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1804"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1935",
                    "reference_id": "RHSA-2021:1935",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1935"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2243",
                    "reference_id": "RHSA-2021:2243",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2243"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938936?format=api",
                    "purl": "pkg:deb/debian/rustc@1.53.0%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.53.0%252Bdfsg1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938925?format=api",
                    "purl": "pkg:deb/debian/rustc@1.63.0%2Bdfsg1-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-ehdy-7aak-r3bt"
                        },
                        {
                            "vulnerability": "VCID-qj1y-b8m1-hyfm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.63.0%252Bdfsg1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938929?format=api",
                    "purl": "pkg:deb/debian/rustc@1.85.0%2Bdfsg3-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-ehdy-7aak-r3bt"
                        },
                        {
                            "vulnerability": "VCID-qj1y-b8m1-hyfm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.85.0%252Bdfsg3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938928?format=api",
                    "purl": "pkg:deb/debian/rustc@1.92.0%2Bdfsg1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.92.0%252Bdfsg1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059655?format=api",
                    "purl": "pkg:deb/debian/rustc@1.93.1%2Bdfsg1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.93.1%252Bdfsg1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067629?format=api",
                    "purl": "pkg:deb/debian/rustc@1.94.1%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.94.1%252Bdfsg1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2020-36318"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wdu6-3vph-aqb7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80677?format=api",
            "vulnerability_id": "VCID-wpe1-jr23-duhh",
            "summary": "rust: optimization for joining strings can cause uninitialized bytes to be exposed",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36323.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36323.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-36323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00705",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72059",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00705",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72234",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00705",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72177",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00705",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72207",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00705",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72065",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00705",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72086",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00705",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72062",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00705",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72099",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00705",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72111",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00705",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72134",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00705",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72118",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00705",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72104",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00705",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72145",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00705",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72152",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00705",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72138",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00705",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72182",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00705",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72191",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00705",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72186",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-36323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36323"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950396",
                    "reference_id": "1950396",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950396"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1801",
                    "reference_id": "AVG-1801",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1801"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3042",
                    "reference_id": "RHSA-2021:3042",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3042"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3063",
                    "reference_id": "RHSA-2021:3063",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3063"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938936?format=api",
                    "purl": "pkg:deb/debian/rustc@1.53.0%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.53.0%252Bdfsg1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938925?format=api",
                    "purl": "pkg:deb/debian/rustc@1.63.0%2Bdfsg1-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-ehdy-7aak-r3bt"
                        },
                        {
                            "vulnerability": "VCID-qj1y-b8m1-hyfm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.63.0%252Bdfsg1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938929?format=api",
                    "purl": "pkg:deb/debian/rustc@1.85.0%2Bdfsg3-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-ehdy-7aak-r3bt"
                        },
                        {
                            "vulnerability": "VCID-qj1y-b8m1-hyfm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.85.0%252Bdfsg3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938928?format=api",
                    "purl": "pkg:deb/debian/rustc@1.92.0%2Bdfsg1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.92.0%252Bdfsg1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059655?format=api",
                    "purl": "pkg:deb/debian/rustc@1.93.1%2Bdfsg1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.93.1%252Bdfsg1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067629?format=api",
                    "purl": "pkg:deb/debian/rustc@1.94.1%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.94.1%252Bdfsg1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2020-36323"
            ],
            "risk_score": 3.7,
            "exploitability": "0.5",
            "weighted_severity": "7.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wpe1-jr23-duhh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80831?format=api",
            "vulnerability_id": "VCID-y25s-c64z-57a6",
            "summary": "rust: memory safety violation in String::retain()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36317.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36317.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-36317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50792",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50839",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50755",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50808",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50847",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50873",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50831",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50888",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50886",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50928",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50907",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5089",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50934",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50914",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50862",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5087",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5083",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-36317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36317"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949189",
                    "reference_id": "1949189",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949189"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803",
                    "reference_id": "986803",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1804",
                    "reference_id": "AVG-1804",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1804"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1935",
                    "reference_id": "RHSA-2021:1935",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1935"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2243",
                    "reference_id": "RHSA-2021:2243",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2243"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938936?format=api",
                    "purl": "pkg:deb/debian/rustc@1.53.0%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.53.0%252Bdfsg1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938925?format=api",
                    "purl": "pkg:deb/debian/rustc@1.63.0%2Bdfsg1-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-ehdy-7aak-r3bt"
                        },
                        {
                            "vulnerability": "VCID-qj1y-b8m1-hyfm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.63.0%252Bdfsg1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938929?format=api",
                    "purl": "pkg:deb/debian/rustc@1.85.0%2Bdfsg3-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-ehdy-7aak-r3bt"
                        },
                        {
                            "vulnerability": "VCID-qj1y-b8m1-hyfm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.85.0%252Bdfsg3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938928?format=api",
                    "purl": "pkg:deb/debian/rustc@1.92.0%2Bdfsg1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.92.0%252Bdfsg1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059655?format=api",
                    "purl": "pkg:deb/debian/rustc@1.93.1%2Bdfsg1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.93.1%252Bdfsg1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067629?format=api",
                    "purl": "pkg:deb/debian/rustc@1.94.1%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.94.1%252Bdfsg1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2020-36317"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y25s-c64z-57a6"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.53.0%252Bdfsg1-1%3Fdistro=trixie"
}