Lookup for vulnerable packages by Package URL.

GET /api/packages/47290?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/47290?format=api",
    "purl": "pkg:nuget/PowerShell@7.1.0",
    "type": "nuget",
    "namespace": "",
    "name": "PowerShell",
    "version": "7.1.0",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "7.1.7",
    "latest_non_vulnerable_version": "7.3.10",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/13204?format=api",
            "vulnerability_id": "VCID-6j7g-pz7c-y7hd",
            "summary": "This advisory has been marked as False-Positive and removed.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24512.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24512.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24512",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46383",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46326",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46317",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46345",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46266",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46321",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46301",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46322",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24512"
                },
                {
                    "reference_url": "https://github.com/dotnet/announcements/issues/213",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/dotnet/announcements/issues/213"
                },
                {
                    "reference_url": "https://github.com/dotnet/runtime/security/advisories/GHSA-c6w8-7mp3-34j9",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/dotnet/runtime/security/advisories/GHSA-c6w8-7mp3-34j9"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4TOGTZ2ZWDH662ZNFFSZVL3M5AJXV6JF",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4TOGTZ2ZWDH662ZNFFSZVL3M5AJXV6JF"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4TOGTZ2ZWDH662ZNFFSZVL3M5AJXV6JF/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4TOGTZ2ZWDH662ZNFFSZVL3M5AJXV6JF/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CIJGCVKLHVNLFBTEYJGWS43QG5DYJFBL",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CIJGCVKLHVNLFBTEYJGWS43QG5DYJFBL"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CIJGCVKLHVNLFBTEYJGWS43QG5DYJFBL/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CIJGCVKLHVNLFBTEYJGWS43QG5DYJFBL/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQLM7ABVCYJLF6JRPF3M3EBXW63GNC27",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQLM7ABVCYJLF6JRPF3M3EBXW63GNC27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQLM7ABVCYJLF6JRPF3M3EBXW63GNC27/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQLM7ABVCYJLF6JRPF3M3EBXW63GNC27/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRGSPXMZY4RM2L35FYHCXBFROLC23B2V",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRGSPXMZY4RM2L35FYHCXBFROLC23B2V"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRGSPXMZY4RM2L35FYHCXBFROLC23B2V/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRGSPXMZY4RM2L35FYHCXBFROLC23B2V/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OS2Q4NPRSARP7GHLKFLIYHFOPSYDO6MK",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OS2Q4NPRSARP7GHLKFLIYHFOPSYDO6MK"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OS2Q4NPRSARP7GHLKFLIYHFOPSYDO6MK/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OS2Q4NPRSARP7GHLKFLIYHFOPSYDO6MK/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXEQ3GQVELA2T4HNZG7VPMS2HDVXMJRG",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXEQ3GQVELA2T4HNZG7VPMS2HDVXMJRG"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXEQ3GQVELA2T4HNZG7VPMS2HDVXMJRG/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXEQ3GQVELA2T4HNZG7VPMS2HDVXMJRG/"
                },
                {
                    "reference_url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24512",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24512"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061854",
                    "reference_id": "2061854",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061854"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24512",
                    "reference_id": "CVE-2022-24512",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24512"
                },
                {
                    "reference_url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24512",
                    "reference_id": "CVE-2022-24512",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24512"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-c6w8-7mp3-34j9",
                    "reference_id": "GHSA-c6w8-7mp3-34j9",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-c6w8-7mp3-34j9"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0826",
                    "reference_id": "RHSA-2022:0826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0827",
                    "reference_id": "RHSA-2022:0827",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0827"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0828",
                    "reference_id": "RHSA-2022:0828",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0828"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0829",
                    "reference_id": "RHSA-2022:0829",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0829"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0830",
                    "reference_id": "RHSA-2022:0830",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0830"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0832",
                    "reference_id": "RHSA-2022:0832",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0832"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/47293?format=api",
                    "purl": "pkg:nuget/PowerShell@7.1.6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hh1b-rurr-9qb2"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/PowerShell@7.1.6"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/47294?format=api",
                    "purl": "pkg:nuget/PowerShell@7.2.2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-7dq5-qkwa-33ey"
                        },
                        {
                            "vulnerability": "VCID-hh1b-rurr-9qb2"
                        },
                        {
                            "vulnerability": "VCID-ks36-zkdx-c3ap"
                        },
                        {
                            "vulnerability": "VCID-rz8f-jn6b-a7fw"
                        },
                        {
                            "vulnerability": "VCID-ujyg-uwtg-vqbt"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/PowerShell@7.2.2"
                }
            ],
            "aliases": [
                "CVE-2022-24512",
                "GHSA-c6w8-7mp3-34j9"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6j7g-pz7c-y7hd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/11818?format=api",
            "vulnerability_id": "VCID-c7qw-u98p-1qa9",
            "summary": "Authentication Bypass by Spoofing\nMicrosoft PowerShell Spoofing Vulnerability",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-43896",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04305",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88897",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04305",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88837",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04305",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88883",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04305",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88828",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04305",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88852",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04305",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88855",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04305",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88872",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04305",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88877",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04305",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88889",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04305",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88884",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-43896"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:powershell:7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:microsoft:powershell:7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:powershell:7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:cbl_mariner:1.0:*:*:*:*:*:*:arm",
                    "reference_id": "cpe:2.3:o:microsoft:cbl_mariner:1.0:*:*:*:*:*:*:arm",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:cbl_mariner:1.0:*:*:*:*:*:*:arm"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:cbl_mariner:1.0:*:*:*:*:*:*:x64",
                    "reference_id": "cpe:2.3:o:microsoft:cbl_mariner:1.0:*:*:*:*:*:*:x64",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:cbl_mariner:1.0:*:*:*:*:*:*:x64"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43896",
                    "reference_id": "CVE-2021-43896",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43896"
                },
                {
                    "reference_url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43896",
                    "reference_id": "CVE-2021-43896",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:48:49Z/"
                        }
                    ],
                    "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43896"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/42326?format=api",
                    "purl": "pkg:nuget/PowerShell@7.2.1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-6j7g-pz7c-y7hd"
                        },
                        {
                            "vulnerability": "VCID-7dq5-qkwa-33ey"
                        },
                        {
                            "vulnerability": "VCID-hh1b-rurr-9qb2"
                        },
                        {
                            "vulnerability": "VCID-ks36-zkdx-c3ap"
                        },
                        {
                            "vulnerability": "VCID-rz8f-jn6b-a7fw"
                        },
                        {
                            "vulnerability": "VCID-ujyg-uwtg-vqbt"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/PowerShell@7.2.1"
                }
            ],
            "aliases": [
                "CVE-2021-43896"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c7qw-u98p-1qa9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/13780?format=api",
            "vulnerability_id": "VCID-hh1b-rurr-9qb2",
            "summary": "PowerShell Elevation of Privilege Vulnerability.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26788",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59297",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59366",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59334",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59352",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59368",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59349",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59336",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59285",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59321",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26788"
                },
                {
                    "reference_url": "https://github.com/PowerShell/Announcements/issues/31",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/PowerShell/Announcements/issues/31"
                },
                {
                    "reference_url": "https://github.com/PowerShell/PowerShell",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/PowerShell/PowerShell"
                },
                {
                    "reference_url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26788",
                    "reference_id": "CVE-2022-26788",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26788"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26788",
                    "reference_id": "CVE-2022-26788",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26788"
                },
                {
                    "reference_url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26788",
                    "reference_id": "CVE-2022-26788",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26788"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-q7x5-x7rr-2859",
                    "reference_id": "GHSA-q7x5-x7rr-2859",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-q7x5-x7rr-2859"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/49621?format=api",
                    "purl": "pkg:nuget/PowerShell@7.1.7",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/PowerShell@7.1.7"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/49623?format=api",
                    "purl": "pkg:nuget/PowerShell@7.2.3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-7dq5-qkwa-33ey"
                        },
                        {
                            "vulnerability": "VCID-ks36-zkdx-c3ap"
                        },
                        {
                            "vulnerability": "VCID-rz8f-jn6b-a7fw"
                        },
                        {
                            "vulnerability": "VCID-ujyg-uwtg-vqbt"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/PowerShell@7.2.3"
                }
            ],
            "aliases": [
                "CVE-2022-26788",
                "GHSA-q7x5-x7rr-2859"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hh1b-rurr-9qb2"
        }
    ],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/15466?format=api",
            "vulnerability_id": "VCID-rz8f-jn6b-a7fw",
            "summary": ".NET Information Disclosure Vulnerability\nMicrosoft is releasing this security advisory to provide information about a vulnerability in .NET Core 3.1 and .NET 6.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.\n\nAn information disclosure vulnerability exists in .NET Core 3.1 and .NET 6.0 that could lead to unauthorized access of privileged information.\n\n## <a name=\"affected-software\"></a>Affected software\n\n* Any .NET 6.0 application running on .NET 6.0.7 or earlier.\n* Any .NET Core 3.1 applicaiton running on .NET Core 3.1.27 or earlier.\n\nIf your application uses the following package versions, ensure you update to the latest version of .NET.\n\n### <a name=\".NET Core 3.1\"></a>.NET Core 3.1\n\nPackage name | Affected version | Patched version\n------------ | ---------------- | -------------------------\n[System.Security.Cryptography.Xml](http://system.security)| <=4.7.0| 4.7.1\n[Microsoft.AspNetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x64)| >=3.1.0, 3.1.27| 3.1.28\n[Microsoft.AspNetCore.App.Runtime.linux-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-x64)| >=3.1.0, 3.1.27| 3.1.28\n[Microsoft.AspNetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x86)| >=3.1.0, 3.1.27| 3.1.28\n[Microsoft.AspNetCore.App.Runtime.osx-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.osx-x64)| >=3.1.0, 3.1.27| 3.1.28\n[Microsoft.AspNetCore.App.Runtime.linux-musl-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-musl-x64)| >=3.1.0, 3.1.27| 3.1.28\n[Microsoft.AspNetCore.App.Runtime.linux-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-arm64)| >=3.1.0, 3.1.27| 3.1.28\n[Microsoft.AspNetCore.App.Runtime.linux-arm](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-arm)| >=3.1.0, 3.1.27| 3.1.28\n[Microsoft.AspNetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-arm64)| >=3.1.0, 3.1.27| 3.1.28\n[Microsoft.AspNetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-arm)| >=3.1.0, 3.1.27| 3.1.28\n[Microsoft.AspNetCore.App.Runtime.linux-musl-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-musl-arm64)| >=3.1.0, 3.1.27| 3.1.28\n[Microsoft.AspNetCore.App.Runtime.linux-musl-arm](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-musl-arm)| >=3.1.0, 3.1.27| 3.1.28\n\n### <a name=\".NET 6\"></a>.NET 6\n\nPackage name | Affected version | Patched version\n------------ | ---------------- | -------------------------\n[System.Security.Cryptography.Xml](https://www.nuget.org/packages/System.Security.Cryptography.Xml)| >=5.0.0, 6.0.0| 6.0.1\n[Microsoft.AspNetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x64)| >=6.0.0, 6.0.7| 6.0.8\n[Microsoft.AspNetCore.App.Runtime.linux-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-x64)| >=6.0.0, 6.0.7| 6.0.8\n[Microsoft.AspNetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x86)| >=6.0.0, 6.0.7| 6.0.8\n[Microsoft.AspNetCore.App.Runtime.osx-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.osx-x64)| >=6.0.0, 6.0.7| 6.0.8\n[Microsoft.AspNetCore.App.Runtime.linux-musl-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-musl-x64)| >=6.0.0, 6.0.7| 6.0.8\n[Microsoft.AspNetCore.App.Runtime.linux-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-arm64)| >=6.0.0, 6.0.7| 6.0.8\n[Microsoft.AspNetCore.App.Runtime.linux-arm](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-arm)| >=6.0.0, 6.0.7| 6.0.8\n[Microsoft.AspNetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-arm64)| >=6.0.0, 6.0.7| 6.0.8\n[Microsoft.AspNetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-arm)| >=6.0.0, 6.0.7| 6.0.8\n[Microsoft.AspNetCore.App.Runtime.osx-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.osx-arm64)| >=6.0.0, 6.0.7| 6.0.8\n[Microsoft.AspNetCore.App.Runtime.linux-musl-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-musl-arm64)| >=6.0.0, 6.0.7| 6.0.8\n[Microsoft.AspNetCore.App.Runtime.linux-musl-arm](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-musl-arm)| >=6.0.0, 6.0.7| 6.0.8\n\n## Patches\n\n\n* If you're using .NET 6.0, you should download and install Runtime 6.0.8 or SDK 6.0.108 (for Visual Studio 2022 v17.1) from https://dotnet.microsoft.com/download/dotnet-core/6.0.\n* If you're using .NET Core 3.1, you should download and install Runtime 3.1.28 (for Visual Studio 2019 v16.9) from https://dotnet.microsoft.com/download/dotnet-core/3.1.\n\n\n### Other\n\nAnnouncement for this issue can be found at https://github.com/dotnet/announcements/issues/232\nAn Issue for this can be found at https://github.com/dotnet/aspnetcore/issues/43166\nMSRC details for this can be found at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34716",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34716.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34716.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34716",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00952",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76385",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00952",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76425",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78082",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78064",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78121",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7809",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78094",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78103",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78053",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34716"
                },
                {
                    "reference_url": "https://github.com/dotnet/announcements/issues/232",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/dotnet/announcements/issues/232"
                },
                {
                    "reference_url": "https://github.com/dotnet/aspnetcore/issues/43166",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/dotnet/aspnetcore/issues/43166"
                },
                {
                    "reference_url": "https://github.com/dotnet/aspnetcore/security/advisories/GHSA-vh55-786g-wjwj",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/dotnet/aspnetcore/security/advisories/GHSA-vh55-786g-wjwj"
                },
                {
                    "reference_url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34716",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C"
                        },
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-29T20:04:18Z/"
                        }
                    ],
                    "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34716"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34716",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34716"
                },
                {
                    "reference_url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34716",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34716"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115183",
                    "reference_id": "2115183",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115183"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-vh55-786g-wjwj",
                    "reference_id": "GHSA-vh55-786g-wjwj",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-vh55-786g-wjwj"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6037",
                    "reference_id": "RHSA-2022:6037",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6037"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6038",
                    "reference_id": "RHSA-2022:6038",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6038"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6043",
                    "reference_id": "RHSA-2022:6043",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6043"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6057",
                    "reference_id": "RHSA-2022:6057",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6057"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6058",
                    "reference_id": "RHSA-2022:6058",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6058"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/47290?format=api",
                    "purl": "pkg:nuget/PowerShell@7.1.0",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-6j7g-pz7c-y7hd"
                        },
                        {
                            "vulnerability": "VCID-c7qw-u98p-1qa9"
                        },
                        {
                            "vulnerability": "VCID-hh1b-rurr-9qb2"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/PowerShell@7.1.0"
                }
            ],
            "aliases": [
                "CVE-2022-34716",
                "GHSA-vh55-786g-wjwj",
                "GMS-2024-75",
                "GMS-2024-76",
                "GMS-2024-77",
                "GMS-2024-78",
                "GMS-2024-79",
                "GMS-2024-80",
                "GMS-2024-81",
                "GMS-2024-82",
                "GMS-2024-83",
                "GMS-2024-84",
                "GMS-2024-85",
                "GMS-2024-86",
                "GMS-2024-90"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rz8f-jn6b-a7fw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/14377?format=api",
            "vulnerability_id": "VCID-ujyg-uwtg-vqbt",
            "summary": "Uncontrolled Resource Consumption\n.NET, Visual Studio and PowerShell Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-29117, CVE-2022-29145.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23267.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23267.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23267",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.08193",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92214",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.08193",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92203",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.08193",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92206",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.08193",
                            "scoring_system": "epss",
                            "scoring_elements": "0.922",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.08193",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92197",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.08193",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92186",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.08193",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92182",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.08193",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92176",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23267"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/dotnet/announcements/issues/221",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/dotnet/announcements/issues/221"
                },
                {
                    "reference_url": "https://github.com/dotnet/runtime/security/advisories/GHSA-485p-mrj5-8w2v",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/dotnet/runtime/security/advisories/GHSA-485p-mrj5-8w2v"
                },
                {
                    "reference_url": "https://github.com/PowerShell/Announcements/issues/32",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/PowerShell/Announcements/issues/32"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY"
                },
                {
                    "reference_url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23267",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23267"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2083650",
                    "reference_id": "2083650",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2083650"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23267",
                    "reference_id": "CVE-2022-23267",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23267"
                },
                {
                    "reference_url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23267",
                    "reference_id": "CVE-2022-23267",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23267"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-485p-mrj5-8w2v",
                    "reference_id": "GHSA-485p-mrj5-8w2v",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-485p-mrj5-8w2v"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:2194",
                    "reference_id": "RHSA-2022:2194",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:2194"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:2195",
                    "reference_id": "RHSA-2022:2195",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:2195"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:2196",
                    "reference_id": "RHSA-2022:2196",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:2196"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:2199",
                    "reference_id": "RHSA-2022:2199",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:2199"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:2200",
                    "reference_id": "RHSA-2022:2200",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:2200"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:2202",
                    "reference_id": "RHSA-2022:2202",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:2202"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4588",
                    "reference_id": "RHSA-2022:4588",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4588"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/47290?format=api",
                    "purl": "pkg:nuget/PowerShell@7.1.0",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-6j7g-pz7c-y7hd"
                        },
                        {
                            "vulnerability": "VCID-c7qw-u98p-1qa9"
                        },
                        {
                            "vulnerability": "VCID-hh1b-rurr-9qb2"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/PowerShell@7.1.0"
                }
            ],
            "aliases": [
                "CVE-2022-23267",
                "GHSA-485p-mrj5-8w2v"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ujyg-uwtg-vqbt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55022?format=api",
            "vulnerability_id": "VCID-v2z1-w1v6-4ufg",
            "summary": "A denial of service vulnerability exists when .NET Core or .NET Framework improperly handles web requests, aka '.NET Core & .NET Framework Denial of Service Vulnerability'.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1108.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1108.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03788",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88087",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03788",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88074",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03788",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88073",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03788",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8808",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03788",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8807",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03788",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88015",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03788",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88024",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03788",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88064",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03788",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88045",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03788",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88038",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1108"
                },
                {
                    "reference_url": "https://github.com/dotnet/announcements/issues/157",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/dotnet/announcements/issues/157"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1108"
                },
                {
                    "reference_url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1108"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827643",
                    "reference_id": "1827643",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827643"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-3w5p-jhp5-c29q",
                    "reference_id": "GHSA-3w5p-jhp5-c29q",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-3w5p-jhp5-c29q"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:2143",
                    "reference_id": "RHSA-2020:2143",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:2143"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:2146",
                    "reference_id": "RHSA-2020:2146",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:2146"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:2249",
                    "reference_id": "RHSA-2020:2249",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:2249"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:2250",
                    "reference_id": "RHSA-2020:2250",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:2250"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:2450",
                    "reference_id": "RHSA-2020:2450",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:2450"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:2471",
                    "reference_id": "RHSA-2020:2471",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:2471"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:2475",
                    "reference_id": "RHSA-2020:2475",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:2475"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:2476",
                    "reference_id": "RHSA-2020:2476",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:2476"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/206749?format=api",
                    "purl": "pkg:nuget/PowerShell@7.0.1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-6j7g-pz7c-y7hd"
                        },
                        {
                            "vulnerability": "VCID-c7qw-u98p-1qa9"
                        },
                        {
                            "vulnerability": "VCID-hh1b-rurr-9qb2"
                        },
                        {
                            "vulnerability": "VCID-rz8f-jn6b-a7fw"
                        },
                        {
                            "vulnerability": "VCID-ujyg-uwtg-vqbt"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/PowerShell@7.0.1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/47290?format=api",
                    "purl": "pkg:nuget/PowerShell@7.1.0",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-6j7g-pz7c-y7hd"
                        },
                        {
                            "vulnerability": "VCID-c7qw-u98p-1qa9"
                        },
                        {
                            "vulnerability": "VCID-hh1b-rurr-9qb2"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/PowerShell@7.1.0"
                }
            ],
            "aliases": [
                "CVE-2020-1108",
                "GHSA-3w5p-jhp5-c29q"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v2z1-w1v6-4ufg"
        }
    ],
    "risk_score": "4.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/PowerShell@7.1.0"
}