Lookup for vulnerable packages by Package URL.

GET /api/packages/995044?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/995044?format=api",
    "purl": "pkg:deb/debian/util-linux@2.36.1-8%2Bdeb11u2",
    "type": "deb",
    "namespace": "debian",
    "name": "util-linux",
    "version": "2.36.1-8+deb11u2",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "2.42-4",
    "latest_non_vulnerable_version": "2.42-4",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/349414?format=api",
            "vulnerability_id": "VCID-8hsf-75uj-13cd",
            "summary": "",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27456.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27456.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-27456",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01166",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01172",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01156",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01465",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01475",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01474",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01481",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01489",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01737",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01567",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01479",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03147",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03101",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-27456"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27456",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27456"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2454956",
                    "reference_id": "2454956",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2454956"
                },
                {
                    "reference_url": "https://github.com/util-linux/util-linux/commit/5e390467b26a3cf3fecc04e1a0d482dff3162fc4",
                    "reference_id": "5e390467b26a3cf3fecc04e1a0d482dff3162fc4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-06T15:38:42Z/"
                        }
                    ],
                    "url": "https://github.com/util-linux/util-linux/commit/5e390467b26a3cf3fecc04e1a0d482dff3162fc4"
                },
                {
                    "reference_url": "https://github.com/util-linux/util-linux/security/advisories/GHSA-qq4x-vfq4-9h9g",
                    "reference_id": "GHSA-qq4x-vfq4-9h9g",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-06T15:38:42Z/"
                        }
                    ],
                    "url": "https://github.com/util-linux/util-linux/security/advisories/GHSA-qq4x-vfq4-9h9g"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7180",
                    "reference_id": "RHSA-2026:7180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7180"
                },
                {
                    "reference_url": "https://github.com/util-linux/util-linux/releases/tag/v2.41.4",
                    "reference_id": "v2.41.4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-06T15:38:42Z/"
                        }
                    ],
                    "url": "https://github.com/util-linux/util-linux/releases/tag/v2.41.4"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089405?format=api",
                    "purl": "pkg:deb/debian/util-linux@2.42-5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-5"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1055039?format=api",
                    "purl": "pkg:deb/debian/util-linux@2.42-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059957?format=api",
                    "purl": "pkg:deb/debian/util-linux@2.42-2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-2"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067274?format=api",
                    "purl": "pkg:deb/debian/util-linux@2.42-3",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-3"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076493?format=api",
                    "purl": "pkg:deb/debian/util-linux@2.42-4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-4"
                }
            ],
            "aliases": [
                "CVE-2026-27456"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8hsf-75uj-13cd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66331?format=api",
            "vulnerability_id": "VCID-uchq-5u5j-wbez",
            "summary": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14104.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14104.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-14104",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00433",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "7e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00458",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "7e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00454",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "7e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00453",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "7e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00451",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "7e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00456",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "7e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00585",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "7e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00461",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "7e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00459",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "7e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00586",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "7e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00583",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-14104"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1122058",
                    "reference_id": "1122058",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1122058"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419369",
                    "reference_id": "2419369",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-05T20:03:09Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419369"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:7::el9",
                    "reference_id": "cpe:/a:redhat:ceph_storage:7::el9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:7::el9"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:8::el9",
                    "reference_id": "cpe:/a:redhat:ceph_storage:8::el9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:8::el9"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:9::el10",
                    "reference_id": "cpe:/a:redhat:ceph_storage:9::el10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:9::el10"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:8::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1",
                    "reference_id": "cpe:/a:redhat:hummingbird:1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9",
                    "reference_id": "cpe:/a:redhat:insights_proxy:1.5::el9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4",
                    "reference_id": "cpe:/a:redhat:openshift:4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhui:5::el9",
                    "reference_id": "cpe:/a:redhat:rhui:5::el9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhui:5::el9"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:10.1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:8::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:9::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2025-14104",
                    "reference_id": "CVE-2025-14104",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-05T20:03:09Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2025-14104"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:1696",
                    "reference_id": "RHSA-2026:1696",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-05T20:03:09Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2026:1696"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:1852",
                    "reference_id": "RHSA-2026:1852",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-05T20:03:09Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2026:1852"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:1913",
                    "reference_id": "RHSA-2026:1913",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-05T20:03:09Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2026:1913"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:2485",
                    "reference_id": "RHSA-2026:2485",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-05T20:03:09Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2026:2485"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:2563",
                    "reference_id": "RHSA-2026:2563",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-05T20:03:09Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2026:2563"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:2737",
                    "reference_id": "RHSA-2026:2737",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-05T20:03:09Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2026:2737"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:2800",
                    "reference_id": "RHSA-2026:2800",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-05T20:03:09Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2026:2800"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:3406",
                    "reference_id": "RHSA-2026:3406",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-05T20:03:09Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2026:3406"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:4943",
                    "reference_id": "RHSA-2026:4943",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-05T20:03:09Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2026:4943"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7180",
                    "reference_id": "RHSA-2026:7180",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-05T20:03:09Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7180"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089405?format=api",
                    "purl": "pkg:deb/debian/util-linux@2.42-5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-5"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/995047?format=api",
                    "purl": "pkg:deb/debian/util-linux@2.41.3-4",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8hsf-75uj-13cd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41.3-4"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067274?format=api",
                    "purl": "pkg:deb/debian/util-linux@2.42-3",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-3"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076493?format=api",
                    "purl": "pkg:deb/debian/util-linux@2.42-4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-4"
                }
            ],
            "aliases": [
                "CVE-2025-14104"
            ],
            "risk_score": 2.8,
            "exploitability": "0.5",
            "weighted_severity": "5.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uchq-5u5j-wbez"
        }
    ],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77137?format=api",
            "vulnerability_id": "VCID-3pq5-w4nm-dkec",
            "summary": "util-linux: CVE-2024-28085: wall: escape sequence injection",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28085.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28085.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-28085",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.10177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93153",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.10177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9315",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.10177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93148",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.10177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93154",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.10933",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93425",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.10933",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9342",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.11188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9347",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.11188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93494",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.11188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93493",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.11188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93485",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.11188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93477",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.11188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93488",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-28085"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28085",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28085"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/03/28/1",
                    "reference_id": "1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/03/28/1"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067849",
                    "reference_id": "1067849",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067849"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/03/28/2",
                    "reference_id": "2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/03/28/2"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271942",
                    "reference_id": "2271942",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271942"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/03/28/3",
                    "reference_id": "3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/03/28/3"
                },
                {
                    "reference_url": "https://www.openwall.com/lists/oss-security/2024/03/27/5",
                    "reference_id": "5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"
                        }
                    ],
                    "url": "https://www.openwall.com/lists/oss-security/2024/03/27/5"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/03/27/5",
                    "reference_id": "5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/03/27/5"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/03/27/6",
                    "reference_id": "6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/03/27/6"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/03/27/7",
                    "reference_id": "7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/03/27/7"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/03/27/8",
                    "reference_id": "8",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/03/27/8"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/03/27/9",
                    "reference_id": "9",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/03/27/9"
                },
                {
                    "reference_url": "https://github.com/skyler-ferrante/CVE-2024-28085",
                    "reference_id": "CVE-2024-28085",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"
                        }
                    ],
                    "url": "https://github.com/skyler-ferrante/CVE-2024-28085"
                },
                {
                    "reference_url": "https://github.com/util-linux/util-linux/security/advisories/GHSA-xv2h-c6ww-mrjq",
                    "reference_id": "GHSA-xv2h-c6ww-mrjq",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"
                        }
                    ],
                    "url": "https://github.com/util-linux/util-linux/security/advisories/GHSA-xv2h-c6ww-mrjq"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00005.html",
                    "reference_id": "msg00005.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00005.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240531-0003/",
                    "reference_id": "ntap-20240531-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240531-0003/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6719-1/",
                    "reference_id": "USN-6719-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6719-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6719-2/",
                    "reference_id": "USN-6719-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6719-2/"
                },
                {
                    "reference_url": "https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/",
                    "reference_id": "util-linux",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"
                        }
                    ],
                    "url": "https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/"
                },
                {
                    "reference_url": "https://people.rit.edu/sjf5462/6831711781/wall_2_27_2024.txt",
                    "reference_id": "wall_2_27_2024.txt",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"
                        }
                    ],
                    "url": "https://people.rit.edu/sjf5462/6831711781/wall_2_27_2024.txt"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/995044?format=api",
                    "purl": "pkg:deb/debian/util-linux@2.36.1-8%2Bdeb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8hsf-75uj-13cd"
                        },
                        {
                            "vulnerability": "VCID-uchq-5u5j-wbez"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.36.1-8%252Bdeb11u2"
                }
            ],
            "aliases": [
                "CVE-2024-28085"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3pq5-w4nm-dkec"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49128?format=api",
            "vulnerability_id": "VCID-773t-t959-z3c1",
            "summary": "Multiple vulnerabilities have been discovered in util-linux which can lead to denial of service or information disclosure.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3996.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3996.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3996",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46141",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46101",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46161",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46108",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46165",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46162",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46185",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46157",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46166",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46223",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46219",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46163",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46144",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46152",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46093",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3996"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/util-linux/util-linux/commit/166e87368ae88bf31112a30e078cceae637f4cdb",
                    "reference_id": "166e87368ae88bf31112a30e078cceae637f4cdb",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T21:16:28Z/"
                        }
                    ],
                    "url": "https://github.com/util-linux/util-linux/commit/166e87368ae88bf31112a30e078cceae637f4cdb"
                },
                {
                    "reference_url": "https://www.openwall.com/lists/oss-security/2022/01/24/2",
                    "reference_id": "2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T21:16:28Z/"
                        }
                    ],
                    "url": "https://www.openwall.com/lists/oss-security/2022/01/24/2"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/11/30/2",
                    "reference_id": "2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T21:16:28Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/11/30/2"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024628",
                    "reference_id": "2024628",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T21:16:28Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024628"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/4",
                    "reference_id": "4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T21:16:28Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/4"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2021-3996",
                    "reference_id": "CVE-2021-3996",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T21:16:28Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2021-3996"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202401-08",
                    "reference_id": "GLSA-202401-08",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T21:16:28Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202401-08"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20221209-0002/",
                    "reference_id": "ntap-20221209-0002",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T21:16:28Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20221209-0002/"
                },
                {
                    "reference_url": "http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html",
                    "reference_id": "snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T21:16:28Z/"
                        }
                    ],
                    "url": "http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5279-1/",
                    "reference_id": "USN-5279-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5279-1/"
                },
                {
                    "reference_url": "https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes",
                    "reference_id": "v2.37.3-ReleaseNotes",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T21:16:28Z/"
                        }
                    ],
                    "url": "https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/995044?format=api",
                    "purl": "pkg:deb/debian/util-linux@2.36.1-8%2Bdeb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8hsf-75uj-13cd"
                        },
                        {
                            "vulnerability": "VCID-uchq-5u5j-wbez"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.36.1-8%252Bdeb11u2"
                }
            ],
            "aliases": [
                "CVE-2021-3996"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-773t-t959-z3c1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49129?format=api",
            "vulnerability_id": "VCID-7ha4-8xxt-xkfy",
            "summary": "Multiple vulnerabilities have been discovered in util-linux which can lead to denial of service or information disclosure.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37600.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37600.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-37600",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1705",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16879",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16946",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16929",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17224",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17274",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17055",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17145",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17202",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17177",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1713",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17069",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17006",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17009",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17046",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-37600"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1987320",
                    "reference_id": "1987320",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1987320"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991619",
                    "reference_id": "991619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991619"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2236",
                    "reference_id": "AVG-2236",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2236"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202401-08",
                    "reference_id": "GLSA-202401-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202401-08"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/995044?format=api",
                    "purl": "pkg:deb/debian/util-linux@2.36.1-8%2Bdeb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8hsf-75uj-13cd"
                        },
                        {
                            "vulnerability": "VCID-uchq-5u5j-wbez"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.36.1-8%252Bdeb11u2"
                }
            ],
            "aliases": [
                "CVE-2021-37600"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7ha4-8xxt-xkfy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49127?format=api",
            "vulnerability_id": "VCID-9czu-jh2d-dbhx",
            "summary": "Multiple vulnerabilities have been discovered in util-linux which can lead to denial of service or information disclosure.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3995.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3995.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3995",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4213",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42217",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42157",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42207",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42215",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42238",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42201",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42175",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42226",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42132",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42077",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42073",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41991",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3995"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024631",
                    "reference_id": "2024631",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024631"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202401-08",
                    "reference_id": "GLSA-202401-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202401-08"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5279-1/",
                    "reference_id": "USN-5279-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5279-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/995044?format=api",
                    "purl": "pkg:deb/debian/util-linux@2.36.1-8%2Bdeb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8hsf-75uj-13cd"
                        },
                        {
                            "vulnerability": "VCID-uchq-5u5j-wbez"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.36.1-8%252Bdeb11u2"
                }
            ],
            "aliases": [
                "CVE-2021-3995"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9czu-jh2d-dbhx"
        }
    ],
    "risk_score": "2.8",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.36.1-8%252Bdeb11u2"
}