Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/434855?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/434855?format=api", "purl": "pkg:apk/alpine/openjdk8@8.382.05-r0?arch=armhf&distroversion=v3.21&reponame=community", "type": "apk", "namespace": "alpine", "name": "openjdk8", "version": "8.382.05-r0", "qualifiers": { "arch": "armhf", "distroversion": "v3.21", "reponame": "community" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "8.392.08-r0", "latest_non_vulnerable_version": "8.452.09-r0", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31965?format=api", "vulnerability_id": "VCID-dyg2-udwy-cud7", "summary": "Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22045.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22045.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-22045", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.3604", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36098", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36104", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36066", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.3603", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.3608", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42145", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42172", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-22045" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2221645", "reference_id": "2221645", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2221645" }, { "reference_url": "https://security.gentoo.org/glsa/202407-24", "reference_id": "GLSA-202407-24", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202407-24" }, { "reference_url": "https://security.gentoo.org/glsa/202412-07", "reference_id": "GLSA-202412-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4157", "reference_id": "RHSA-2023:4157", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4157" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4158", "reference_id": "RHSA-2023:4158", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4158" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4159", "reference_id": "RHSA-2023:4159", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4159" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4161", "reference_id": "RHSA-2023:4161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4162", "reference_id": "RHSA-2023:4162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4162" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4163", "reference_id": "RHSA-2023:4163", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4163" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4164", "reference_id": "RHSA-2023:4164", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4164" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4165", "reference_id": "RHSA-2023:4165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4166", "reference_id": "RHSA-2023:4166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4167", "reference_id": "RHSA-2023:4167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4168", "reference_id": "RHSA-2023:4168", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4168" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4169", "reference_id": "RHSA-2023:4169", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4169" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4170", "reference_id": "RHSA-2023:4170", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4170" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4171", "reference_id": "RHSA-2023:4171", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4171" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4172", "reference_id": "RHSA-2023:4172", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4172" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4173", "reference_id": "RHSA-2023:4173", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4173" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4174", "reference_id": "RHSA-2023:4174", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4174" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4175", "reference_id": "RHSA-2023:4175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4175" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4176", "reference_id": "RHSA-2023:4176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4176" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4177", "reference_id": "RHSA-2023:4177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4177" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4178", "reference_id": "RHSA-2023:4178", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4178" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4208", "reference_id": "RHSA-2023:4208", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4208" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4209", "reference_id": "RHSA-2023:4209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4210", "reference_id": "RHSA-2023:4210", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4210" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4211", "reference_id": "RHSA-2023:4211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4212", "reference_id": "RHSA-2023:4212", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4212" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4233", "reference_id": "RHSA-2023:4233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4233" }, { "reference_url": "https://usn.ubuntu.com/6263-1/", "reference_id": "USN-6263-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6263-1/" }, { "reference_url": "https://usn.ubuntu.com/6272-1/", "reference_id": "USN-6272-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6272-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/434855?format=api", "purl": "pkg:apk/alpine/openjdk8@8.382.05-r0?arch=armhf&distroversion=v3.21&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk8@8.382.05-r0%3Farch=armhf&distroversion=v3.21&reponame=community" } ], "aliases": [ "CVE-2023-22045" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dyg2-udwy-cud7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31966?format=api", "vulnerability_id": "VCID-gjgy-dfq7-zfb2", "summary": "Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22049.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22049.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-22049", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20289", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20363", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20392", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20347", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20223", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20303", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24864", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24903", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-22049" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2221647", "reference_id": "2221647", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2221647" }, { "reference_url": "https://security.gentoo.org/glsa/202407-24", "reference_id": "GLSA-202407-24", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202407-24" }, { "reference_url": "https://security.gentoo.org/glsa/202412-07", "reference_id": "GLSA-202412-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4157", "reference_id": "RHSA-2023:4157", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4157" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4158", "reference_id": "RHSA-2023:4158", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4158" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4159", "reference_id": "RHSA-2023:4159", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4159" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4161", "reference_id": "RHSA-2023:4161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4162", "reference_id": "RHSA-2023:4162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4162" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4163", "reference_id": "RHSA-2023:4163", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4163" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4164", "reference_id": "RHSA-2023:4164", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4164" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4165", "reference_id": "RHSA-2023:4165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4166", "reference_id": "RHSA-2023:4166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4167", "reference_id": "RHSA-2023:4167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4168", "reference_id": "RHSA-2023:4168", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4168" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4169", "reference_id": "RHSA-2023:4169", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4169" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4170", "reference_id": "RHSA-2023:4170", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4170" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4171", "reference_id": "RHSA-2023:4171", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4171" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4172", "reference_id": "RHSA-2023:4172", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4172" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4173", "reference_id": "RHSA-2023:4173", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4173" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4174", "reference_id": "RHSA-2023:4174", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4174" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4175", "reference_id": "RHSA-2023:4175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4175" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4176", "reference_id": "RHSA-2023:4176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4176" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4177", "reference_id": "RHSA-2023:4177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4177" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4178", "reference_id": "RHSA-2023:4178", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4178" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4208", "reference_id": "RHSA-2023:4208", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4208" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4209", "reference_id": "RHSA-2023:4209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4210", "reference_id": "RHSA-2023:4210", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4210" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4211", "reference_id": "RHSA-2023:4211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4212", "reference_id": "RHSA-2023:4212", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4212" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4233", "reference_id": "RHSA-2023:4233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4876", "reference_id": "RHSA-2023:4876", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4876" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4877", "reference_id": "RHSA-2023:4877", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4877" }, { "reference_url": "https://usn.ubuntu.com/6263-1/", "reference_id": "USN-6263-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6263-1/" }, { "reference_url": "https://usn.ubuntu.com/6272-1/", "reference_id": "USN-6272-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6272-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/434855?format=api", "purl": "pkg:apk/alpine/openjdk8@8.382.05-r0?arch=armhf&distroversion=v3.21&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk8@8.382.05-r0%3Farch=armhf&distroversion=v3.21&reponame=community" } ], "aliases": [ "CVE-2023-22049" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gjgy-dfq7-zfb2" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk8@8.382.05-r0%3Farch=armhf&distroversion=v3.21&reponame=community" }