Lookup for vulnerable packages by Package URL.

GET /api/packages/943878?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/943878?format=api",
    "purl": "pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "zabbix",
    "version": "1:6.0.23+dfsg-1",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "1:6.0.24+dfsg-1",
    "latest_non_vulnerable_version": "1:7.0.22+dfsg-1.1",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95538?format=api",
            "vulnerability_id": "VCID-464s-8ex9-kqdz",
            "summary": "A stored XSS has been found in the Zabbix web application in the Maps element if a URL field is set with spaces before URL.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72306",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72324",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72301",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7234",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72352",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72375",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72358",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72346",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72387",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72397",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72384",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72427",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72436",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72432",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72424",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72454",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72479",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72442",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72469",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72526",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72533",
                            "published_at": "2026-05-15T12:55:00Z"
                        },
                        {
                            "value": "0.00715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72543",
                            "published_at": "2026-05-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32721"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32721"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877",
                    "reference_id": "1053877",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943846?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5nmy-hdh8-xbg1"
                        },
                        {
                            "vulnerability": "VCID-cdyd-79m9-pyhv"
                        },
                        {
                            "vulnerability": "VCID-dej6-dxbp-a3bt"
                        },
                        {
                            "vulnerability": "VCID-fxqr-51kp-3ber"
                        },
                        {
                            "vulnerability": "VCID-qzp5-px2f-vqc8"
                        },
                        {
                            "vulnerability": "VCID-qzzk-mcfu-sfhv"
                        },
                        {
                            "vulnerability": "VCID-r8yr-aet5-yydn"
                        },
                        {
                            "vulnerability": "VCID-s1mb-1gsj-pbed"
                        },
                        {
                            "vulnerability": "VCID-uh37-bv9z-1bdz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943876?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943878?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943848?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943847?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1103100?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-32721"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-464s-8ex9-kqdz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95543?format=api",
            "vulnerability_id": "VCID-4uxg-fxv7-rua8",
            "summary": "An attacker who has the privilege to configure Zabbix items can use function icmpping() with additional malicious command inside it to execute arbitrary code on the current Zabbix server.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32727",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64528",
                            "published_at": "2026-05-16T12:55:00Z"
                        },
                        {
                            "value": "0.00464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64302",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64453",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64506",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64513",
                            "published_at": "2026-05-15T12:55:00Z"
                        },
                        {
                            "value": "0.00464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64331",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64287",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64335",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6435",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64363",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64351",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64322",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64358",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64369",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6436",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64381",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64394",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64368",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64413",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64459",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64428",
                            "published_at": "2026-05-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32727"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32727",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32727"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://support.zabbix.com/browse/ZBX-23857",
                    "reference_id": "ZBX-23857",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:37:31Z/"
                        }
                    ],
                    "url": "https://support.zabbix.com/browse/ZBX-23857"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943846?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5nmy-hdh8-xbg1"
                        },
                        {
                            "vulnerability": "VCID-cdyd-79m9-pyhv"
                        },
                        {
                            "vulnerability": "VCID-dej6-dxbp-a3bt"
                        },
                        {
                            "vulnerability": "VCID-fxqr-51kp-3ber"
                        },
                        {
                            "vulnerability": "VCID-qzp5-px2f-vqc8"
                        },
                        {
                            "vulnerability": "VCID-qzzk-mcfu-sfhv"
                        },
                        {
                            "vulnerability": "VCID-r8yr-aet5-yydn"
                        },
                        {
                            "vulnerability": "VCID-s1mb-1gsj-pbed"
                        },
                        {
                            "vulnerability": "VCID-uh37-bv9z-1bdz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943876?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943878?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943848?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943847?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1103100?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-32727"
            ],
            "risk_score": 1.7,
            "exploitability": "0.5",
            "weighted_severity": "3.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4uxg-fxv7-rua8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95539?format=api",
            "vulnerability_id": "VCID-547a-p94b-6fep",
            "summary": "The zabbix/src/libs/zbxjson module is vulnerable to a buffer overflow when parsing JSON files via zbx_json_open.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.581",
                            "published_at": "2026-05-16T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57972",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58009",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58079",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58093",
                            "published_at": "2026-05-15T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5799",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57966",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58022",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58024",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58041",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58019",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57999",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58029",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58028",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58005",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57969",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57985",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57968",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57925",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5803",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5798",
                            "published_at": "2026-05-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32722"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877",
                    "reference_id": "1053877",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877"
                },
                {
                    "reference_url": "https://support.zabbix.com/browse/ZBX-23390",
                    "reference_id": "ZBX-23390",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-18T15:26:49Z/"
                        }
                    ],
                    "url": "https://support.zabbix.com/browse/ZBX-23390"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943846?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5nmy-hdh8-xbg1"
                        },
                        {
                            "vulnerability": "VCID-cdyd-79m9-pyhv"
                        },
                        {
                            "vulnerability": "VCID-dej6-dxbp-a3bt"
                        },
                        {
                            "vulnerability": "VCID-fxqr-51kp-3ber"
                        },
                        {
                            "vulnerability": "VCID-qzp5-px2f-vqc8"
                        },
                        {
                            "vulnerability": "VCID-qzzk-mcfu-sfhv"
                        },
                        {
                            "vulnerability": "VCID-r8yr-aet5-yydn"
                        },
                        {
                            "vulnerability": "VCID-s1mb-1gsj-pbed"
                        },
                        {
                            "vulnerability": "VCID-uh37-bv9z-1bdz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943876?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943878?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943848?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943847?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1103100?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-32722"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-547a-p94b-6fep"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95496?format=api",
            "vulnerability_id": "VCID-5s7j-6aea-qucr",
            "summary": "Stored or persistent cross-site scripting (XSS) is a type of XSS where the attacker first sends the payload to the web application, then the application saves the payload (e.g., in a database or server-side text files), and finally, the application unintentionally executes the payload for every victim visiting its web pages.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29454",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00646",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70673",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00646",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70654",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00807",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74217",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00807",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74195",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00807",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74177",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00807",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7417",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00807",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74208",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00807",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74209",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00807",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74244",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00807",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74253",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00807",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74251",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00807",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74245",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00807",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74273",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00807",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74126",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00807",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74159",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00807",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74174",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74471",
                            "published_at": "2026-05-16T12:55:00Z"
                        },
                        {
                            "value": "0.00815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74378",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.744",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74456",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74462",
                            "published_at": "2026-05-15T12:55:00Z"
                        },
                        {
                            "value": "0.00815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74412",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29454"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29454",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29454"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175",
                    "reference_id": "1055175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175"
                },
                {
                    "reference_url": "https://support.zabbix.com/browse/ZBX-22985",
                    "reference_id": "ZBX-22985",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T21:06:47Z/"
                        }
                    ],
                    "url": "https://support.zabbix.com/browse/ZBX-22985"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943846?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5nmy-hdh8-xbg1"
                        },
                        {
                            "vulnerability": "VCID-cdyd-79m9-pyhv"
                        },
                        {
                            "vulnerability": "VCID-dej6-dxbp-a3bt"
                        },
                        {
                            "vulnerability": "VCID-fxqr-51kp-3ber"
                        },
                        {
                            "vulnerability": "VCID-qzp5-px2f-vqc8"
                        },
                        {
                            "vulnerability": "VCID-qzzk-mcfu-sfhv"
                        },
                        {
                            "vulnerability": "VCID-r8yr-aet5-yydn"
                        },
                        {
                            "vulnerability": "VCID-s1mb-1gsj-pbed"
                        },
                        {
                            "vulnerability": "VCID-uh37-bv9z-1bdz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943876?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943878?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943848?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943847?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1103100?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-29454"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "4.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5s7j-6aea-qucr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95497?format=api",
            "vulnerability_id": "VCID-673b-qsd3-e3hz",
            "summary": "Reflected XSS attacks, also known as non-persistent attacks, occur when a malicious script is reflected off a web application to the victim's browser. The script is activated through a link, which sends a request to a website with a vulnerability that enables execution of malicious scripts.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29455",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75899",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75866",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79085",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79068",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79058",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79082",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79081",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79114",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79121",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79136",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79149",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7917",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79028",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79052",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79059",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79083",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79359",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.01231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79368",
                            "published_at": "2026-05-15T12:55:00Z"
                        },
                        {
                            "value": "0.01231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79374",
                            "published_at": "2026-05-16T12:55:00Z"
                        },
                        {
                            "value": "0.01231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79301",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.01231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79319",
                            "published_at": "2026-05-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29455"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29455",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29455"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175",
                    "reference_id": "1055175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175"
                },
                {
                    "reference_url": "https://support.zabbix.com/browse/ZBX-22986",
                    "reference_id": "ZBX-22986",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T21:06:45Z/"
                        }
                    ],
                    "url": "https://support.zabbix.com/browse/ZBX-22986"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943846?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5nmy-hdh8-xbg1"
                        },
                        {
                            "vulnerability": "VCID-cdyd-79m9-pyhv"
                        },
                        {
                            "vulnerability": "VCID-dej6-dxbp-a3bt"
                        },
                        {
                            "vulnerability": "VCID-fxqr-51kp-3ber"
                        },
                        {
                            "vulnerability": "VCID-qzp5-px2f-vqc8"
                        },
                        {
                            "vulnerability": "VCID-qzzk-mcfu-sfhv"
                        },
                        {
                            "vulnerability": "VCID-r8yr-aet5-yydn"
                        },
                        {
                            "vulnerability": "VCID-s1mb-1gsj-pbed"
                        },
                        {
                            "vulnerability": "VCID-uh37-bv9z-1bdz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943876?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943878?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943848?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943847?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1103100?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-29455"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "4.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-673b-qsd3-e3hz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95493?format=api",
            "vulnerability_id": "VCID-6u3x-x7qt-g3fa",
            "summary": "JavaScript preprocessing, webhooks and global scripts can cause uncontrolled CPU, memory, and disk I/O utilization. Preprocessing/webhook/global script configuration and testing are only available to Administrative roles (Admin and Superadmin). Administrative privileges should be typically granted to users who need to perform tasks that require more control over the system. The security risk is limited because not all users have this level of access.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29449",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00755",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73212",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00755",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73191",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75212",
                            "published_at": "2026-05-16T12:55:00Z"
                        },
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75145",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75198",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75203",
                            "published_at": "2026-05-15T12:55:00Z"
                        },
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7498",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75014",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75026",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75047",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75015",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75051",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75059",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75049",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75087",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75092",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75096",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75103",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7513",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75155",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75136",
                            "published_at": "2026-05-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29449"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29449",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29449"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175",
                    "reference_id": "1055175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175"
                },
                {
                    "reference_url": "https://support.zabbix.com/browse/ZBX-22589",
                    "reference_id": "ZBX-22589",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T16:25:49Z/"
                        }
                    ],
                    "url": "https://support.zabbix.com/browse/ZBX-22589"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943846?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5nmy-hdh8-xbg1"
                        },
                        {
                            "vulnerability": "VCID-cdyd-79m9-pyhv"
                        },
                        {
                            "vulnerability": "VCID-dej6-dxbp-a3bt"
                        },
                        {
                            "vulnerability": "VCID-fxqr-51kp-3ber"
                        },
                        {
                            "vulnerability": "VCID-qzp5-px2f-vqc8"
                        },
                        {
                            "vulnerability": "VCID-qzzk-mcfu-sfhv"
                        },
                        {
                            "vulnerability": "VCID-r8yr-aet5-yydn"
                        },
                        {
                            "vulnerability": "VCID-s1mb-1gsj-pbed"
                        },
                        {
                            "vulnerability": "VCID-uh37-bv9z-1bdz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943876?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943878?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943848?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943847?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1103100?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-29449"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6u3x-x7qt-g3fa"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95541?format=api",
            "vulnerability_id": "VCID-9z8h-gg7t-b7f8",
            "summary": "Memory pointer is in a property of the Ducktape object. This leads to multiple vulnerabilities related to direct memory access and manipulation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32724",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72666",
                            "published_at": "2026-05-16T12:55:00Z"
                        },
                        {
                            "value": "0.0072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72657",
                            "published_at": "2026-05-15T12:55:00Z"
                        },
                        {
                            "value": "0.0072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72428",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72446",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72422",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72461",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72474",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72496",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72478",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72469",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7251",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72519",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72509",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72552",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72559",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72557",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7255",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72579",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72605",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.0072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72567",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.0072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72594",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.0072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72648",
                            "published_at": "2026-05-14T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32724"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32724",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32724"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877",
                    "reference_id": "1053877",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877"
                },
                {
                    "reference_url": "https://support.zabbix.com/browse/ZBX-23391",
                    "reference_id": "ZBX-23391",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:43:17Z/"
                        }
                    ],
                    "url": "https://support.zabbix.com/browse/ZBX-23391"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943846?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5nmy-hdh8-xbg1"
                        },
                        {
                            "vulnerability": "VCID-cdyd-79m9-pyhv"
                        },
                        {
                            "vulnerability": "VCID-dej6-dxbp-a3bt"
                        },
                        {
                            "vulnerability": "VCID-fxqr-51kp-3ber"
                        },
                        {
                            "vulnerability": "VCID-qzp5-px2f-vqc8"
                        },
                        {
                            "vulnerability": "VCID-qzzk-mcfu-sfhv"
                        },
                        {
                            "vulnerability": "VCID-r8yr-aet5-yydn"
                        },
                        {
                            "vulnerability": "VCID-s1mb-1gsj-pbed"
                        },
                        {
                            "vulnerability": "VCID-uh37-bv9z-1bdz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943876?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943878?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943848?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943847?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1103100?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-32724"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9z8h-gg7t-b7f8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95495?format=api",
            "vulnerability_id": "VCID-cdyd-79m9-pyhv",
            "summary": "Templates do not properly consider backticks (`) as Javascript string delimiters, and do not escape them as expected. Backticks are used, since ES6, for JS template literals. If a template contains a Go template action within a Javascript template literal, the contents of the action can be used to terminate the literal, injecting arbitrary Javascript code into the Go template. As ES6 template literals are rather complex, and themselves can do string interpolation, the decision was made to simply disallow Go template actions from being used inside of them (e.g., \"var a = {{.}}\"), since there is no obviously safe way to allow this behavior. This takes the same approach as github.com/google/safehtml. With fix, Template. Parse returns an Error when it encounters templates like this, with an ErrorCode of value 12. This ErrorCode is currently unexported but will be exported in the release of Go 1.21. Users who rely on the previous behavior can re-enable it using the GODEBUG flag jstmpllitinterp=1, with the caveat that backticks will now be escaped. This should be used with caution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29453",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68466",
                            "published_at": "2026-05-16T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6845",
                            "published_at": "2026-05-15T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68207",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68225",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68201",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68252",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68267",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68293",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6828",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68246",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68286",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68297",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68277",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6832",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68329",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68334",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68311",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68354",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6839",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68381",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68439",
                            "published_at": "2026-05-14T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29453"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29453",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29453"
                },
                {
                    "reference_url": "https://support.zabbix.com/browse/ZBX-23388",
                    "reference_id": "ZBX-23388",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-18T15:17:42Z/"
                        }
                    ],
                    "url": "https://support.zabbix.com/browse/ZBX-23388"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943878?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943848?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943847?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1103100?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-29453"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "4.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cdyd-79m9-pyhv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95500?format=api",
            "vulnerability_id": "VCID-cuqx-wxkd-nffa",
            "summary": "Duktape is an 3rd-party embeddable JavaScript engine, with a focus on portability and compact footprint. When adding too many values in valstack JavaScript will crash. This issue occurs due to bug in Duktape 2.6 which is an 3rd-party solution that we use.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28309",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28265",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32199",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32216",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32249",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32229",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32038",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3191",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3183",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31681",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31755",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32206",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32254",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32284",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32285",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32247",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00137",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33244",
                            "published_at": "2026-05-16T12:55:00Z"
                        },
                        {
                            "value": "0.00137",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33193",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00137",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33211",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00137",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33237",
                            "published_at": "2026-05-15T12:55:00Z"
                        },
                        {
                            "value": "0.00137",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33104",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00137",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33131",
                            "published_at": "2026-05-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29458"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29458"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175",
                    "reference_id": "1055175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175"
                },
                {
                    "reference_url": "https://support.zabbix.com/browse/ZBX-22989",
                    "reference_id": "ZBX-22989",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T16:19:37Z/"
                        }
                    ],
                    "url": "https://support.zabbix.com/browse/ZBX-22989"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943846?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5nmy-hdh8-xbg1"
                        },
                        {
                            "vulnerability": "VCID-cdyd-79m9-pyhv"
                        },
                        {
                            "vulnerability": "VCID-dej6-dxbp-a3bt"
                        },
                        {
                            "vulnerability": "VCID-fxqr-51kp-3ber"
                        },
                        {
                            "vulnerability": "VCID-qzp5-px2f-vqc8"
                        },
                        {
                            "vulnerability": "VCID-qzzk-mcfu-sfhv"
                        },
                        {
                            "vulnerability": "VCID-r8yr-aet5-yydn"
                        },
                        {
                            "vulnerability": "VCID-s1mb-1gsj-pbed"
                        },
                        {
                            "vulnerability": "VCID-uh37-bv9z-1bdz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943876?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943878?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943848?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943847?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1103100?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-29458"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cuqx-wxkd-nffa"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95499?format=api",
            "vulnerability_id": "VCID-ftt2-5jnt-9ye2",
            "summary": "Reflected XSS attacks, occur when a malicious script is reflected off a web application to the victim's browser. The script can be activated through Action form fields, which can be sent as request to a website with a vulnerability that enables execution of malicious scripts.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29457",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00367",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58661",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00367",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5864",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65592",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65616",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65617",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65516",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65569",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65581",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.656",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65586",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65558",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65594",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65607",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65606",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65591",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65641",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00495",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65945",
                            "published_at": "2026-05-16T12:55:00Z"
                        },
                        {
                            "value": "0.00495",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65877",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00495",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65848",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00495",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65867",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00495",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65922",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00495",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65932",
                            "published_at": "2026-05-15T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29457"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29457",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29457"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175",
                    "reference_id": "1055175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175"
                },
                {
                    "reference_url": "https://support.zabbix.com/browse/ZBX-22988",
                    "reference_id": "ZBX-22988",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T21:06:43Z/"
                        }
                    ],
                    "url": "https://support.zabbix.com/browse/ZBX-22988"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943846?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5nmy-hdh8-xbg1"
                        },
                        {
                            "vulnerability": "VCID-cdyd-79m9-pyhv"
                        },
                        {
                            "vulnerability": "VCID-dej6-dxbp-a3bt"
                        },
                        {
                            "vulnerability": "VCID-fxqr-51kp-3ber"
                        },
                        {
                            "vulnerability": "VCID-qzp5-px2f-vqc8"
                        },
                        {
                            "vulnerability": "VCID-qzzk-mcfu-sfhv"
                        },
                        {
                            "vulnerability": "VCID-r8yr-aet5-yydn"
                        },
                        {
                            "vulnerability": "VCID-s1mb-1gsj-pbed"
                        },
                        {
                            "vulnerability": "VCID-uh37-bv9z-1bdz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943876?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943878?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943848?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943847?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1103100?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-29457"
            ],
            "risk_score": 2.9,
            "exploitability": "0.5",
            "weighted_severity": "5.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ftt2-5jnt-9ye2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/267137?format=api",
            "vulnerability_id": "VCID-gyqk-zsww-ykdj",
            "summary": "Specially crafted string can cause a buffer overrun in the JSON parser library leading to a crash of the Zabbix Server or a Zabbix Proxy.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29451",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29542",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29494",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3127",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3142",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31504",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31807",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3186",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31888",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31891",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31852",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31817",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31849",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31829",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31632",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31801",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31339",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32819",
                            "published_at": "2026-05-16T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32772",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3268",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32705",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32783",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3281",
                            "published_at": "2026-05-15T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29451"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175",
                    "reference_id": "1055175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175"
                },
                {
                    "reference_url": "https://support.zabbix.com/browse/ZBX-22587",
                    "reference_id": "ZBX-22587",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T16:25:43Z/"
                        }
                    ],
                    "url": "https://support.zabbix.com/browse/ZBX-22587"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943852?format=api",
                    "purl": "pkg:deb/debian/zabbix@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943846?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5nmy-hdh8-xbg1"
                        },
                        {
                            "vulnerability": "VCID-cdyd-79m9-pyhv"
                        },
                        {
                            "vulnerability": "VCID-dej6-dxbp-a3bt"
                        },
                        {
                            "vulnerability": "VCID-fxqr-51kp-3ber"
                        },
                        {
                            "vulnerability": "VCID-qzp5-px2f-vqc8"
                        },
                        {
                            "vulnerability": "VCID-qzzk-mcfu-sfhv"
                        },
                        {
                            "vulnerability": "VCID-r8yr-aet5-yydn"
                        },
                        {
                            "vulnerability": "VCID-s1mb-1gsj-pbed"
                        },
                        {
                            "vulnerability": "VCID-uh37-bv9z-1bdz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943878?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943848?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943847?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1103100?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-29451"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gyqk-zsww-ykdj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95498?format=api",
            "vulnerability_id": "VCID-kx3g-p2zj-duaj",
            "summary": "URL validation scheme receives input from a user and then parses it to identify its various components. The validation scheme can ensure that all URL components comply with internet standards.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29456",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31519",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31478",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36041",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36081",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36042",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36016",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36055",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35989",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35762",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3573",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35643",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35529",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.356",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36006",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36056",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36074",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35822",
                            "published_at": "2026-05-16T12:55:00Z"
                        },
                        {
                            "value": "0.00155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35704",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35727",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35792",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35809",
                            "published_at": "2026-05-15T12:55:00Z"
                        },
                        {
                            "value": "0.00155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35795",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29456"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29456",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29456"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175",
                    "reference_id": "1055175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175"
                },
                {
                    "reference_url": "https://support.zabbix.com/browse/ZBX-22987",
                    "reference_id": "ZBX-22987",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T16:19:48Z/"
                        }
                    ],
                    "url": "https://support.zabbix.com/browse/ZBX-22987"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943846?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5nmy-hdh8-xbg1"
                        },
                        {
                            "vulnerability": "VCID-cdyd-79m9-pyhv"
                        },
                        {
                            "vulnerability": "VCID-dej6-dxbp-a3bt"
                        },
                        {
                            "vulnerability": "VCID-fxqr-51kp-3ber"
                        },
                        {
                            "vulnerability": "VCID-qzp5-px2f-vqc8"
                        },
                        {
                            "vulnerability": "VCID-qzzk-mcfu-sfhv"
                        },
                        {
                            "vulnerability": "VCID-r8yr-aet5-yydn"
                        },
                        {
                            "vulnerability": "VCID-s1mb-1gsj-pbed"
                        },
                        {
                            "vulnerability": "VCID-uh37-bv9z-1bdz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943876?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943878?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943848?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943847?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1103100?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-29456"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kx3g-p2zj-duaj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/291840?format=api",
            "vulnerability_id": "VCID-nyhx-57xy-wugc",
            "summary": "Currently, geomap configuration (Administration -> General -> Geographical maps) allows using HTML in the field “Attribution text” when selected “Other” Tile provider.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29452",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01801",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82757",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01801",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82744",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01972",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83582",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01972",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83545",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01972",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8358",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01972",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83581",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01972",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83606",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01972",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83613",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01972",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83617",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01972",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83641",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01972",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83661",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01972",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83507",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01972",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83531",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01972",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83541",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01972",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83556",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01972",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8355",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01991",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83814",
                            "published_at": "2026-05-16T12:55:00Z"
                        },
                        {
                            "value": "0.01991",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8375",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01991",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83801",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.01991",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83811",
                            "published_at": "2026-05-15T12:55:00Z"
                        },
                        {
                            "value": "0.01991",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83751",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.01991",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83766",
                            "published_at": "2026-05-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29452"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175",
                    "reference_id": "1055175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175"
                },
                {
                    "reference_url": "https://support.zabbix.com/browse/ZBX-22981",
                    "reference_id": "ZBX-22981",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T16:21:55Z/"
                        }
                    ],
                    "url": "https://support.zabbix.com/browse/ZBX-22981"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943852?format=api",
                    "purl": "pkg:deb/debian/zabbix@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943846?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5nmy-hdh8-xbg1"
                        },
                        {
                            "vulnerability": "VCID-cdyd-79m9-pyhv"
                        },
                        {
                            "vulnerability": "VCID-dej6-dxbp-a3bt"
                        },
                        {
                            "vulnerability": "VCID-fxqr-51kp-3ber"
                        },
                        {
                            "vulnerability": "VCID-qzp5-px2f-vqc8"
                        },
                        {
                            "vulnerability": "VCID-qzzk-mcfu-sfhv"
                        },
                        {
                            "vulnerability": "VCID-r8yr-aet5-yydn"
                        },
                        {
                            "vulnerability": "VCID-s1mb-1gsj-pbed"
                        },
                        {
                            "vulnerability": "VCID-uh37-bv9z-1bdz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943878?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943848?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943847?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1103100?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-29452"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nyhx-57xy-wugc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95494?format=api",
            "vulnerability_id": "VCID-r65p-6wkq-sfb9",
            "summary": "JavaScript pre-processing can be used by the attacker to gain access to the file system (read-only access on behalf of user \"zabbix\") on the Zabbix Server or Zabbix Proxy, potentially leading to unauthorized access to sensitive data.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29450",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48662",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48684",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5228",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52339",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52376",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52321",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52374",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52369",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52419",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52403",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52389",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52428",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52366",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52434",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52331",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5415",
                            "published_at": "2026-05-16T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54081",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54039",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54065",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54134",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54146",
                            "published_at": "2026-05-15T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29450"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29450",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29450"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175",
                    "reference_id": "1055175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175"
                },
                {
                    "reference_url": "https://support.zabbix.com/browse/ZBX-22588",
                    "reference_id": "ZBX-22588",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-06T14:20:54Z/"
                        }
                    ],
                    "url": "https://support.zabbix.com/browse/ZBX-22588"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943846?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5nmy-hdh8-xbg1"
                        },
                        {
                            "vulnerability": "VCID-cdyd-79m9-pyhv"
                        },
                        {
                            "vulnerability": "VCID-dej6-dxbp-a3bt"
                        },
                        {
                            "vulnerability": "VCID-fxqr-51kp-3ber"
                        },
                        {
                            "vulnerability": "VCID-qzp5-px2f-vqc8"
                        },
                        {
                            "vulnerability": "VCID-qzzk-mcfu-sfhv"
                        },
                        {
                            "vulnerability": "VCID-r8yr-aet5-yydn"
                        },
                        {
                            "vulnerability": "VCID-s1mb-1gsj-pbed"
                        },
                        {
                            "vulnerability": "VCID-uh37-bv9z-1bdz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943876?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943878?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943848?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943847?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1103100?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-29450"
            ],
            "risk_score": 3.9,
            "exploitability": "0.5",
            "weighted_severity": "7.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r65p-6wkq-sfb9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/267145?format=api",
            "vulnerability_id": "VCID-vkfp-asar-7bhw",
            "summary": "The website configured in the URL widget will receive a session cookie when testing or executing scheduled reports. The received session cookie can then be used to access the frontend as the particular user.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32725",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50114",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50194",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50222",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50171",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50225",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50218",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50246",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5022",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50208",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50253",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50255",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50229",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50202",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50162",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50079",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50132",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50161",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77887",
                            "published_at": "2026-05-16T12:55:00Z"
                        },
                        {
                            "value": "0.01064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77821",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.01064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77866",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.01064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7788",
                            "published_at": "2026-05-15T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32725"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943852?format=api",
                    "purl": "pkg:deb/debian/zabbix@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943846?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5nmy-hdh8-xbg1"
                        },
                        {
                            "vulnerability": "VCID-cdyd-79m9-pyhv"
                        },
                        {
                            "vulnerability": "VCID-dej6-dxbp-a3bt"
                        },
                        {
                            "vulnerability": "VCID-fxqr-51kp-3ber"
                        },
                        {
                            "vulnerability": "VCID-qzp5-px2f-vqc8"
                        },
                        {
                            "vulnerability": "VCID-qzzk-mcfu-sfhv"
                        },
                        {
                            "vulnerability": "VCID-r8yr-aet5-yydn"
                        },
                        {
                            "vulnerability": "VCID-s1mb-1gsj-pbed"
                        },
                        {
                            "vulnerability": "VCID-uh37-bv9z-1bdz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943878?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943848?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943847?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1103100?format=api",
                    "purl": "pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-32725"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vkfp-asar-7bhw"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie"
}