Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/943994?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/943994?format=api", "purl": "pkg:deb/debian/znuny@6.5.13-1?distro=trixie", "type": "deb", "namespace": "debian", "name": "znuny", "version": "6.5.13-1", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "6.5.16-1", "latest_non_vulnerable_version": "6.5.20-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/318253?format=api", "vulnerability_id": "VCID-1mkr-c1ay-jygw", "summary": "An issue was discovered in Znuny through 7.1.3. A cookie is set without the HttpOnly flag.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-26844", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58723", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.5861", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58668", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58624", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58592", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58613", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58583", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58635", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58641", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58658", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58639", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58619", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58652", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58657", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58634", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58601", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58614", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58598", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58565", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-26844" }, { "reference_url": "https://www.znuny.com", "reference_id": "www.znuny.com", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-08T18:48:53Z/" } ], "url": "https://www.znuny.com" }, { "reference_url": "https://www.znuny.org/en/advisories/zsa-2025-05", "reference_id": "zsa-2025-05", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-08T18:48:53Z/" } ], "url": "https://www.znuny.org/en/advisories/zsa-2025-05" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943994?format=api", "purl": "pkg:deb/debian/znuny@6.5.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.13-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943989?format=api", "purl": "pkg:deb/debian/znuny@6.5.15-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4sdd-c9p8-3fac" }, { "vulnerability": "VCID-zd8d-c1nk-g7a4" }, { "vulnerability": "VCID-zhfb-ajkc-5uc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.15-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943988?format=api", "purl": "pkg:deb/debian/znuny@6.5.19-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.19-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1088742?format=api", "purl": "pkg:deb/debian/znuny@6.5.20-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.20-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2025-26844" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "4.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1mkr-c1ay-jygw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/318252?format=api", "vulnerability_id": "VCID-cqx8-tegf-pfhh", "summary": "An issue was discovered in Znuny through 7.1.3. If access to a ticket is not given, the content of S/MIME encrypted e-mail messages is visible to users with access to the CommunicationLog.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-26842", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00287", "scoring_system": "epss", "scoring_elements": "0.52231", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00287", "scoring_system": "epss", "scoring_elements": "0.52151", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00287", "scoring_system": "epss", "scoring_elements": "0.5212", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00287", "scoring_system": "epss", "scoring_elements": "0.52147", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00287", "scoring_system": "epss", "scoring_elements": "0.52112", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00287", "scoring_system": "epss", "scoring_elements": "0.52166", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00287", "scoring_system": "epss", "scoring_elements": "0.52162", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00287", "scoring_system": "epss", "scoring_elements": "0.52213", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00287", "scoring_system": "epss", "scoring_elements": "0.52196", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00287", "scoring_system": "epss", "scoring_elements": "0.52182", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00287", "scoring_system": "epss", "scoring_elements": "0.52222", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00287", "scoring_system": "epss", "scoring_elements": "0.52225", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00287", "scoring_system": "epss", "scoring_elements": "0.52207", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00287", "scoring_system": "epss", "scoring_elements": "0.52156", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00287", "scoring_system": "epss", "scoring_elements": "0.52126", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00287", "scoring_system": "epss", "scoring_elements": "0.52072", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00287", "scoring_system": "epss", "scoring_elements": "0.52123", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00287", "scoring_system": "epss", "scoring_elements": "0.52165", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-26842" }, { "reference_url": "https://www.znuny.org/en/advisories/zsa-2025-01", "reference_id": "zsa-2025-01", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T18:53:25Z/" } ], "url": "https://www.znuny.org/en/advisories/zsa-2025-01" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943994?format=api", "purl": "pkg:deb/debian/znuny@6.5.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.13-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943989?format=api", "purl": "pkg:deb/debian/znuny@6.5.15-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4sdd-c9p8-3fac" }, { "vulnerability": "VCID-zd8d-c1nk-g7a4" }, { "vulnerability": "VCID-zhfb-ajkc-5uc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.15-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943988?format=api", "purl": "pkg:deb/debian/znuny@6.5.19-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.19-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1088742?format=api", "purl": "pkg:deb/debian/znuny@6.5.20-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.20-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2025-26842" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cqx8-tegf-pfhh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/318255?format=api", "vulnerability_id": "VCID-s8fu-wpk4-3ycc", "summary": "An issue was discovered in Znuny before 7.1.4. Permissions are not checked properly when using the Generic Interface to update ticket metadata.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-26846", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00404", "scoring_system": "epss", "scoring_elements": "0.61092", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00404", "scoring_system": "epss", "scoring_elements": "0.61046", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00404", "scoring_system": "epss", "scoring_elements": "0.61009", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00404", "scoring_system": "epss", "scoring_elements": "0.61035", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00404", "scoring_system": "epss", "scoring_elements": "0.60916", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00404", "scoring_system": "epss", "scoring_elements": "0.60945", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00404", "scoring_system": "epss", "scoring_elements": "0.6091", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00404", "scoring_system": "epss", "scoring_elements": "0.60959", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00404", "scoring_system": "epss", "scoring_elements": "0.60975", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00404", "scoring_system": "epss", "scoring_elements": "0.60997", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00404", "scoring_system": "epss", "scoring_elements": "0.60982", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00404", "scoring_system": "epss", "scoring_elements": "0.60963", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00404", "scoring_system": "epss", "scoring_elements": "0.61005", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00404", "scoring_system": "epss", "scoring_elements": "0.61011", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00404", "scoring_system": "epss", "scoring_elements": "0.60987", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00404", "scoring_system": "epss", "scoring_elements": "0.60998", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00404", "scoring_system": "epss", "scoring_elements": "0.60991", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00404", "scoring_system": "epss", "scoring_elements": "0.60939", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-26846" }, { "reference_url": "https://www.znuny.com", "reference_id": "www.znuny.com", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-12T21:50:36Z/" } ], "url": "https://www.znuny.com" }, { "reference_url": "https://www.znuny.org/en/advisories/zsa-2025-02", "reference_id": "zsa-2025-02", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-12T21:50:36Z/" } ], "url": "https://www.znuny.org/en/advisories/zsa-2025-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943994?format=api", "purl": "pkg:deb/debian/znuny@6.5.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.13-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943989?format=api", "purl": "pkg:deb/debian/znuny@6.5.15-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4sdd-c9p8-3fac" }, { "vulnerability": "VCID-zd8d-c1nk-g7a4" }, { "vulnerability": "VCID-zhfb-ajkc-5uc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.15-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943988?format=api", "purl": "pkg:deb/debian/znuny@6.5.19-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.19-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1088742?format=api", "purl": "pkg:deb/debian/znuny@6.5.20-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.20-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2025-26846" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "4.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s8fu-wpk4-3ycc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/318254?format=api", "vulnerability_id": "VCID-yrdb-btgm-p3cd", "summary": "An Eval Injection issue was discovered in Znuny through 7.1.3. A user with write access to the configuration file can use this to execute a command executed by the user running the backup.pl script.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-26845", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.6146", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.61415", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.61377", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.61404", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.61289", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.61318", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.61286", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.61334", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.61349", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.61369", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.61354", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.61336", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.61374", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.61379", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.61359", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.61348", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.61363", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.61356", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.61307", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-26845" }, { "reference_url": "https://www.znuny.com", "reference_id": "www.znuny.com", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-08T18:45:30Z/" } ], "url": "https://www.znuny.com" }, { "reference_url": "https://www.znuny.org/en/advisories/zsa-2025-03", "reference_id": "zsa-2025-03", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-08T18:45:30Z/" } ], "url": "https://www.znuny.org/en/advisories/zsa-2025-03" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943994?format=api", "purl": "pkg:deb/debian/znuny@6.5.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.13-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943989?format=api", "purl": "pkg:deb/debian/znuny@6.5.15-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4sdd-c9p8-3fac" }, { "vulnerability": "VCID-zd8d-c1nk-g7a4" }, { "vulnerability": "VCID-zhfb-ajkc-5uc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.15-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943988?format=api", "purl": "pkg:deb/debian/znuny@6.5.19-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.19-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1088742?format=api", "purl": "pkg:deb/debian/znuny@6.5.20-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.20-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2025-26845" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "4.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yrdb-btgm-p3cd" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.13-1%3Fdistro=trixie" }