Lookup for vulnerable packages by Package URL.

GET /api/packages/77808?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/77808?format=api",
    "purl": "pkg:ebuild/net-misc/curl@7.86.0",
    "type": "ebuild",
    "namespace": "net-misc",
    "name": "curl",
    "version": "7.86.0",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "8.3.0-r2",
    "latest_non_vulnerable_version": "8.7.1",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49272?format=api",
            "vulnerability_id": "VCID-1k8f-qgcv-xkhb",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27782.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27782.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00469",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64582",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00469",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64484",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00469",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64515",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00469",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64472",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00469",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6452",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00469",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64536",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00469",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64552",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00469",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6454",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00469",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64512",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00469",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64546",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00469",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64558",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00469",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64551",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00469",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64569",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27782"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2022-27782.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2022-27782.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1555796",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:54:53Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1555796"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082215",
                    "reference_id": "2082215",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082215"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/03/20/6",
                    "reference_id": "6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:54:53Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/03/20/6"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2706",
                    "reference_id": "AVG-2706",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2706"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5197",
                    "reference_id": "dsa-5197",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:54:53Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5197"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:54:53Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html",
                    "reference_id": "msg00017.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:54:53Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220609-0009/",
                    "reference_id": "ntap-20220609-0009",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:54:53Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220609-0009/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5245",
                    "reference_id": "RHSA-2022:5245",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5245"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5313",
                    "reference_id": "RHSA-2022:5313",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5313"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5412-1/",
                    "reference_id": "USN-5412-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5412-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77808?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.86.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.86.0"
                }
            ],
            "aliases": [
                "CVE-2022-27782"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1k8f-qgcv-xkhb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49279?format=api",
            "vulnerability_id": "VCID-2xmp-jc8v-bucb",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35252.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35252.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-35252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43804",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43779",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43787",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43736",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52318",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52332",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52348",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5236",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52298",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52356",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58219",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58205",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00371",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58912",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-35252"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2022-35252.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2022-35252.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35252"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1613943",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1613943"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1018831",
                    "reference_id": "1018831",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1018831"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2023/Jan/20",
                    "reference_id": "20",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2023/Jan/20"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2023/Jan/21",
                    "reference_id": "21",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2023/Jan/21"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2120718",
                    "reference_id": "2120718",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2120718"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213603",
                    "reference_id": "HT213603",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213603"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213604",
                    "reference_id": "HT213604",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213604"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html",
                    "reference_id": "msg00028.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220930-0005/",
                    "reference_id": "ntap-20220930-0005",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220930-0005/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8840",
                    "reference_id": "RHSA-2022:8840",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8840"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8841",
                    "reference_id": "RHSA-2022:8841",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8841"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2478",
                    "reference_id": "RHSA-2023:2478",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2478"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2963",
                    "reference_id": "RHSA-2023:2963",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2963"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0428",
                    "reference_id": "RHSA-2024:0428",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0428"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5587-1/",
                    "reference_id": "USN-5587-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5587-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77808?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.86.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.86.0"
                }
            ],
            "aliases": [
                "CVE-2022-35252"
            ],
            "risk_score": 1.6,
            "exploitability": "0.5",
            "weighted_severity": "3.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2xmp-jc8v-bucb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49266?format=api",
            "vulnerability_id": "VCID-3sy2-4f3g-zkac",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27774.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27774.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53835",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53855",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53749",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53775",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53748",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53801",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53799",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53847",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5383",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53851",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53814",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54556",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54541",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27774"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2022-27774.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2022-27774.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1543773",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:41:23Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1543773"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010254",
                    "reference_id": "1010254",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010254"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077547",
                    "reference_id": "2077547",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077547"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2685",
                    "reference_id": "AVG-2685",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2685"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5197",
                    "reference_id": "dsa-5197",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:41:23Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5197"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:41:23Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html",
                    "reference_id": "msg00028.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:41:23Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220609-0008/",
                    "reference_id": "ntap-20220609-0008",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:41:23Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220609-0008/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5245",
                    "reference_id": "RHSA-2022:5245",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5245"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5313",
                    "reference_id": "RHSA-2022:5313",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5313"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5397-1/",
                    "reference_id": "USN-5397-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5397-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77808?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.86.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.86.0"
                }
            ],
            "aliases": [
                "CVE-2022-27774"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3sy2-4f3g-zkac"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49259?format=api",
            "vulnerability_id": "VCID-56wg-yafz-gkgx",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22922.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22922.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34891",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34738",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35088",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35115",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34995",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35039",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35067",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35071",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35036",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35012",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3505",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35035",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34988",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34757",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22922"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2021-22922.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2021-22922.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22922"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1213175",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:09:24Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1213175"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981435",
                    "reference_id": "1981435",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981435"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202107-59",
                    "reference_id": "ASA-202107-59",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202107-59"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2194",
                    "reference_id": "AVG-2194",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2194"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/",
                    "reference_id": "FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:09:24Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:09:24Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210902-0003/",
                    "reference_id": "ntap-20210902-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:09:24Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210902-0003/"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E",
                    "reference_id": "r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:09:24Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E",
                    "reference_id": "r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:09:24Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E",
                    "reference_id": "rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:09:24Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E",
                    "reference_id": "rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:09:24Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3582",
                    "reference_id": "RHSA-2021:3582",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3582"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3903",
                    "reference_id": "RHSA-2021:3903",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3903"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77808?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.86.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.86.0"
                }
            ],
            "aliases": [
                "CVE-2021-22922"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-56wg-yafz-gkgx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49269?format=api",
            "vulnerability_id": "VCID-6ge5-86tg-dydf",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27779.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27779.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27779",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50673",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50737",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50717",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50665",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50654",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5068",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50635",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5069",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50686",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50728",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50705",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50731",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27779"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2022-27779.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2022-27779.html"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1553301",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://hackerone.com/reports/1553301"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082202",
                    "reference_id": "2082202",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082202"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2706",
                    "reference_id": "AVG-2706",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2706"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77808?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.86.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.86.0"
                }
            ],
            "aliases": [
                "CVE-2022-27779"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6ge5-86tg-dydf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49278?format=api",
            "vulnerability_id": "VCID-9nak-pscy-e7gs",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32221.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32221.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32221",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01612",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81845",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82219",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82179",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82218",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82185",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01711",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82397",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02591",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85547",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02591",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8553",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86012",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85998",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85988",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85969",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32221"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2022-32221.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2022-32221.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32221",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32221"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1704017",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1704017"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2023/Jan/19",
                    "reference_id": "19",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2023/Jan/19"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2023/Jan/20",
                    "reference_id": "20",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2023/Jan/20"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135411",
                    "reference_id": "2135411",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135411"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/05/17/4",
                    "reference_id": "4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/05/17/4"
                },
                {
                    "reference_url": "https://www.debian.org/security/2023/dsa-5330",
                    "reference_id": "dsa-5330",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2023/dsa-5330"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213604",
                    "reference_id": "HT213604",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213604"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213605",
                    "reference_id": "HT213605",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213605"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html",
                    "reference_id": "msg00028.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230110-0006/",
                    "reference_id": "ntap-20230110-0006",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230110-0006/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230208-0002/",
                    "reference_id": "ntap-20230208-0002",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230208-0002/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8840",
                    "reference_id": "RHSA-2022:8840",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8840"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8841",
                    "reference_id": "RHSA-2022:8841",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8841"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0333",
                    "reference_id": "RHSA-2023:0333",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0333"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4139",
                    "reference_id": "RHSA-2023:4139",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4139"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5702-1/",
                    "reference_id": "USN-5702-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5702-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5702-2/",
                    "reference_id": "USN-5702-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5702-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5823-1/",
                    "reference_id": "USN-5823-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5823-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77808?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.86.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.86.0"
                }
            ],
            "aliases": [
                "CVE-2022-32221"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9nak-pscy-e7gs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49271?format=api",
            "vulnerability_id": "VCID-bb2f-7qrm-1kca",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27781.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27781.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22789",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23104",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23149",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2294",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23013",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23066",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23085",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23049",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22992",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23006",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22998",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22961",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22794",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27781"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2022-27781.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2022-27781.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1555441",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:02:11Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1555441"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082204",
                    "reference_id": "2082204",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082204"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2706",
                    "reference_id": "AVG-2706",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2706"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5197",
                    "reference_id": "dsa-5197",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:02:11Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5197"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:02:11Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html",
                    "reference_id": "msg00017.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:02:11Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220609-0009/",
                    "reference_id": "ntap-20220609-0009",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:02:11Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220609-0009/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8840",
                    "reference_id": "RHSA-2022:8840",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8840"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8841",
                    "reference_id": "RHSA-2022:8841",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8841"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5412-1/",
                    "reference_id": "USN-5412-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5412-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5499-1/",
                    "reference_id": "USN-5499-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5499-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77808?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.86.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.86.0"
                }
            ],
            "aliases": [
                "CVE-2022-27781"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bb2f-7qrm-1kca"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/11278?format=api",
            "vulnerability_id": "VCID-bdy2-8gub-tfe6",
            "summary": "Double Free\nWhen sending data to an MQTT server, libcurl could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it *again*.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22945.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22945.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57605",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57712",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57699",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5768",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57721",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57744",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57748",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57719",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57738",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5769",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57759",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57743",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57686",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57741",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22945"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2021-22945.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2021-22945.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1269242",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-28T15:53:40Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1269242"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001527",
                    "reference_id": "2001527",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001527"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Mar/29",
                    "reference_id": "29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-28T15:53:40Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Mar/29"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/",
                    "reference_id": "APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-28T15:53:40Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2384",
                    "reference_id": "AVG-2384",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2384"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2385",
                    "reference_id": "AVG-2385",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2385"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2386",
                    "reference_id": "AVG-2386",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2386"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2387",
                    "reference_id": "AVG-2387",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2387"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2388",
                    "reference_id": "AVG-2388",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2388"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2389",
                    "reference_id": "AVG-2389",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2389"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22945",
                    "reference_id": "CVE-2021-22945",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22945"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5197",
                    "reference_id": "dsa-5197",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-28T15:53:40Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5197"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-28T15:53:40Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213183",
                    "reference_id": "HT213183",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-28T15:53:40Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213183"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211029-0003/",
                    "reference_id": "ntap-20211029-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-28T15:53:40Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211029-0003/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/",
                    "reference_id": "RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-28T15:53:40Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5079-1/",
                    "reference_id": "USN-5079-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5079-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77808?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.86.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.86.0"
                }
            ],
            "aliases": [
                "CVE-2021-22945"
            ],
            "risk_score": 4.1,
            "exploitability": "0.5",
            "weighted_severity": "8.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bdy2-8gub-tfe6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49262?format=api",
            "vulnerability_id": "VCID-dc3c-3wab-57gh",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22926.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22926.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22926",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00657",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70966",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00657",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71113",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00657",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71049",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00657",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71104",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00657",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70976",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00657",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70993",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00657",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70968",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00657",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7101",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00657",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71025",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00657",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71048",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00657",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71032",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00657",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71016",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00657",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71062",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00657",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71069",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22926"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2021-22926.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2021-22926.html"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1234760",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://hackerone.com/reports/1234760"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016088",
                    "reference_id": "2016088",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016088"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77808?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.86.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.86.0"
                }
            ],
            "aliases": [
                "CVE-2021-22926"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dc3c-3wab-57gh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49281?format=api",
            "vulnerability_id": "VCID-ej47-4dcu-5fhy",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42915.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42915.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42915",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00467",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6448",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00467",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64436",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00467",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64407",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00467",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64442",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00467",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64454",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00467",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64447",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00467",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64467",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70128",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70143",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00812",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74203",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00812",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74272",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00812",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7425",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00812",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74235",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42915"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2022-42915.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T13:58:40Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2022-42915.html"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1722065",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://hackerone.com/reports/1722065"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2023/Jan/19",
                    "reference_id": "19",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T13:58:40Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2023/Jan/19"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2023/Jan/20",
                    "reference_id": "20",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T13:58:40Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2023/Jan/20"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135413",
                    "reference_id": "2135413",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135413"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37YEVVC6NAF6H7UHH6YAUY5QEVY6LIH2/",
                    "reference_id": "37YEVVC6NAF6H7UHH6YAUY5QEVY6LIH2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T13:58:40Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37YEVVC6NAF6H7UHH6YAUY5QEVY6LIH2/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T13:58:40Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213604",
                    "reference_id": "HT213604",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T13:58:40Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213604"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213605",
                    "reference_id": "HT213605",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T13:58:40Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213605"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVU3IMZCKR4VE6KJ4GCWRL2ILLC6OV76/",
                    "reference_id": "HVU3IMZCKR4VE6KJ4GCWRL2ILLC6OV76",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T13:58:40Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVU3IMZCKR4VE6KJ4GCWRL2ILLC6OV76/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20221209-0010/",
                    "reference_id": "ntap-20221209-0010",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T13:58:40Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20221209-0010/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q27V5YYMXUVI6PRZQVECON32XPVWTKDK/",
                    "reference_id": "Q27V5YYMXUVI6PRZQVECON32XPVWTKDK",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T13:58:40Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q27V5YYMXUVI6PRZQVECON32XPVWTKDK/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8840",
                    "reference_id": "RHSA-2022:8840",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8840"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8841",
                    "reference_id": "RHSA-2022:8841",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8841"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5702-1/",
                    "reference_id": "USN-5702-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5702-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77808?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.86.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.86.0"
                }
            ],
            "aliases": [
                "CVE-2022-42915"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ej47-4dcu-5fhy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49276?format=api",
            "vulnerability_id": "VCID-gv7x-j8bz-wycc",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32207.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32207.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42513",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42604",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42633",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42572",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42624",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42635",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42658",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42622",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42594",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42654",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42639",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42574",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42512",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32207"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2022-32207.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2022-32207.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1573634",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:36Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1573634"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099305",
                    "reference_id": "2099305",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099305"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Oct/28",
                    "reference_id": "28",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:36Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Oct/28"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Oct/41",
                    "reference_id": "41",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:36Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Oct/41"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2817",
                    "reference_id": "AVG-2817",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Unknown",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2817"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/",
                    "reference_id": "BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:36Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5197",
                    "reference_id": "dsa-5197",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:36Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5197"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:36Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213488",
                    "reference_id": "HT213488",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:36Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213488"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220915-0003/",
                    "reference_id": "ntap-20220915-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:36Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220915-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6157",
                    "reference_id": "RHSA-2022:6157",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6157"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8840",
                    "reference_id": "RHSA-2022:8840",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8840"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8841",
                    "reference_id": "RHSA-2022:8841",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8841"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5495-1/",
                    "reference_id": "USN-5495-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5495-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77808?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.86.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.86.0"
                }
            ],
            "aliases": [
                "CVE-2022-32207"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gv7x-j8bz-wycc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49261?format=api",
            "vulnerability_id": "VCID-hudt-78dw-tkf2",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22925.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22925.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22925",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55006",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5489",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55017",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55005",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5496",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54986",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54956",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62217",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62194",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62235",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62173",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62224",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62218",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62207",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22925"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2021-22925.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2021-22925.html"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1223882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1223882"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970902",
                    "reference_id": "1970902",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970902"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2021/Sep/39",
                    "reference_id": "39",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2021/Sep/39"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2021/Sep/40",
                    "reference_id": "40",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2021/Sep/40"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202107-59",
                    "reference_id": "ASA-202107-59",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202107-59"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202107-60",
                    "reference_id": "ASA-202107-60",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202107-60"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202107-61",
                    "reference_id": "ASA-202107-61",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202107-61"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202107-62",
                    "reference_id": "ASA-202107-62",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202107-62"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202107-63",
                    "reference_id": "ASA-202107-63",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202107-63"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202107-64",
                    "reference_id": "ASA-202107-64",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202107-64"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2194",
                    "reference_id": "AVG-2194",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2194"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2195",
                    "reference_id": "AVG-2195",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2195"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2196",
                    "reference_id": "AVG-2196",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2196"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2197",
                    "reference_id": "AVG-2197",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2197"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2198",
                    "reference_id": "AVG-2198",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2198"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2199",
                    "reference_id": "AVG-2199",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2199"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/",
                    "reference_id": "FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT212804",
                    "reference_id": "HT212804",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT212804"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT212805",
                    "reference_id": "HT212805",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT212805"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210902-0003/",
                    "reference_id": "ntap-20210902-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210902-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4511",
                    "reference_id": "RHSA-2021:4511",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4511"
                },
                {
                    "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf",
                    "reference_id": "ssa-484086.pdf",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/"
                        }
                    ],
                    "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5021-1/",
                    "reference_id": "USN-5021-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5021-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5021-2/",
                    "reference_id": "USN-5021-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5021-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5894-1/",
                    "reference_id": "USN-5894-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5894-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77808?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.86.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.86.0"
                }
            ],
            "aliases": [
                "CVE-2021-22925"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hudt-78dw-tkf2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49265?format=api",
            "vulnerability_id": "VCID-q229-ag6u-u3hv",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22576.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22576.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-22576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00272",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50585",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00272",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50613",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00339",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56625",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00339",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5669",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00339",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56669",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00339",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56699",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00339",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56697",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00339",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5667",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00339",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56607",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58012",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58028",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57955",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5801",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-22576"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2022-22576.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2022-22576.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1526328",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-04-16T14:05:38Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1526328"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010295",
                    "reference_id": "1010295",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010295"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077541",
                    "reference_id": "2077541",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077541"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2685",
                    "reference_id": "AVG-2685",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2685"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5197",
                    "reference_id": "dsa-5197",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-04-16T14:05:38Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5197"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-04-16T14:05:38Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html",
                    "reference_id": "msg00017.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-04-16T14:05:38Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220609-0008/",
                    "reference_id": "ntap-20220609-0008",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-04-16T14:05:38Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220609-0008/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5245",
                    "reference_id": "RHSA-2022:5245",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5245"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5313",
                    "reference_id": "RHSA-2022:5313",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5313"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5397-1/",
                    "reference_id": "USN-5397-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5397-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77808?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.86.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.86.0"
                }
            ],
            "aliases": [
                "CVE-2022-22576"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q229-ag6u-u3hv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49260?format=api",
            "vulnerability_id": "VCID-qbpd-star-6fgn",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22923.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22923.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22923",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25873",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25674",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25816",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25868",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25879",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25838",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25782",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25784",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25766",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25738",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25683",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25937",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25978",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25745",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22923"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2021-22923.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2021-22923.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22923",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22923"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1213181",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T14:25:07Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1213181"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981438",
                    "reference_id": "1981438",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981438"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202107-59",
                    "reference_id": "ASA-202107-59",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202107-59"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2194",
                    "reference_id": "AVG-2194",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2194"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/",
                    "reference_id": "FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T14:25:07Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T14:25:07Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210902-0003/",
                    "reference_id": "ntap-20210902-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T14:25:07Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210902-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3582",
                    "reference_id": "RHSA-2021:3582",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3582"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3903",
                    "reference_id": "RHSA-2021:3903",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3903"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77808?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.86.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.86.0"
                }
            ],
            "aliases": [
                "CVE-2021-22923"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qbpd-star-6fgn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49268?format=api",
            "vulnerability_id": "VCID-r7bh-7wur-xffs",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27776.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27776.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00682",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7169",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00682",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71565",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00682",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71605",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00682",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71616",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00682",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71639",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00682",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71623",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00682",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71604",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00682",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71649",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00682",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71654",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00682",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71636",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00682",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71685",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00682",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71574",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00682",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71592",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27776"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2022-27776.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2022-27776.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1547048",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1547048"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010252",
                    "reference_id": "1010252",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010252"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2078408",
                    "reference_id": "2078408",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2078408"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP/",
                    "reference_id": "7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP/"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2685",
                    "reference_id": "AVG-2685",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2685"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B/",
                    "reference_id": "DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5197",
                    "reference_id": "dsa-5197",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5197"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html",
                    "reference_id": "msg00017.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220609-0008/",
                    "reference_id": "ntap-20220609-0008",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220609-0008/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5245",
                    "reference_id": "RHSA-2022:5245",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5245"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5313",
                    "reference_id": "RHSA-2022:5313",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5313"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5397-1/",
                    "reference_id": "USN-5397-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5397-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77808?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.86.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.86.0"
                }
            ],
            "aliases": [
                "CVE-2022-27776"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r7bh-7wur-xffs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49280?format=api",
            "vulnerability_id": "VCID-rg54-svzj-x7f9",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35260.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35260.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-35260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00182",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39957",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00182",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3993",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00194",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41282",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00194",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41362",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00194",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41341",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00194",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41333",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46919",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48645",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48647",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4869",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48632",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48694",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48631",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-35260"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2022-35260.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2022-35260.html"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1721098",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:48:27Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1721098"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2023/Jan/19",
                    "reference_id": "19",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:48:27Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2023/Jan/19"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2023/Jan/20",
                    "reference_id": "20",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:48:27Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2023/Jan/20"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135412",
                    "reference_id": "2135412",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135412"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:48:27Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213604",
                    "reference_id": "HT213604",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:48:27Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213604"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213605",
                    "reference_id": "HT213605",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:48:27Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213605"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230110-0006/",
                    "reference_id": "ntap-20230110-0006",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:48:27Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230110-0006/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5702-1/",
                    "reference_id": "USN-5702-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5702-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77808?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.86.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.86.0"
                }
            ],
            "aliases": [
                "CVE-2022-35260"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rg54-svzj-x7f9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49270?format=api",
            "vulnerability_id": "VCID-rhxh-77pj-1bfy",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27780.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27780.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27780",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36345",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36667",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36683",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36692",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36658",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36632",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36677",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36659",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36599",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36375",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36748",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36779",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36615",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27780"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2022-27780.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2022-27780.html"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1553841",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-26T20:10:43Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1553841"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082203",
                    "reference_id": "2082203",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082203"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2706",
                    "reference_id": "AVG-2706",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2706"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-26T20:10:43Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220609-0009/",
                    "reference_id": "ntap-20220609-0009",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-26T20:10:43Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220609-0009/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5412-1/",
                    "reference_id": "USN-5412-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5412-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77808?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.86.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.86.0"
                }
            ],
            "aliases": [
                "CVE-2022-27780"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rhxh-77pj-1bfy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49263?format=api",
            "vulnerability_id": "VCID-sh5a-fmna-wffr",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19373",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19479",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19382",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19491",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23261",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23143",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23204",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23365",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23154",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23227",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23277",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2322",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23322",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22946"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2021-22946.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2021-22946.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1334111",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1334111"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1017589",
                    "reference_id": "1017589",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1017589"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2003175",
                    "reference_id": "2003175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2003175"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Mar/29",
                    "reference_id": "29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Mar/29"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/",
                    "reference_id": "APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2384",
                    "reference_id": "AVG-2384",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2384"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2385",
                    "reference_id": "AVG-2385",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2385"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2386",
                    "reference_id": "AVG-2386",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2386"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2387",
                    "reference_id": "AVG-2387",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2387"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2388",
                    "reference_id": "AVG-2388",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2388"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2389",
                    "reference_id": "AVG-2389",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2389"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5197",
                    "reference_id": "dsa-5197",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5197"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213183",
                    "reference_id": "HT213183",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213183"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html",
                    "reference_id": "msg00017.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html",
                    "reference_id": "msg00022.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211029-0003/",
                    "reference_id": "ntap-20211029-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211029-0003/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/",
                    "reference_id": "ntap-20220121-0008",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220121-0008/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4059",
                    "reference_id": "RHSA-2021:4059",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4059"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0635",
                    "reference_id": "RHSA-2022:0635",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0635"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1354",
                    "reference_id": "RHSA-2022:1354",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1354"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/",
                    "reference_id": "RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5079-1/",
                    "reference_id": "USN-5079-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5079-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5079-2/",
                    "reference_id": "USN-5079-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5079-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77808?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.86.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.86.0"
                }
            ],
            "aliases": [
                "CVE-2021-22946"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sh5a-fmna-wffr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49274?format=api",
            "vulnerability_id": "VCID-t1fk-cbsx-j3gh",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32205.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32205.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32205",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02588",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85638",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02588",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85522",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02588",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85539",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02588",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85544",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02588",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85564",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02588",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85575",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02588",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85589",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02588",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85586",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02588",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85581",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02588",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85604",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02588",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8561",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02588",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85606",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02588",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85628",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32205"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2022-32205.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2022-32205.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1569946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:54Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1569946"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099296",
                    "reference_id": "2099296",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099296"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Oct/28",
                    "reference_id": "28",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:54Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Oct/28"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Oct/41",
                    "reference_id": "41",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:54Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Oct/41"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2771",
                    "reference_id": "AVG-2771",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2771"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/",
                    "reference_id": "BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:54Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5197",
                    "reference_id": "dsa-5197",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:54Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5197"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:54Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213488",
                    "reference_id": "HT213488",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:54Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213488"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220915-0003/",
                    "reference_id": "ntap-20220915-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:54Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220915-0003/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5495-1/",
                    "reference_id": "USN-5495-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5495-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77808?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.86.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.86.0"
                }
            ],
            "aliases": [
                "CVE-2022-32205"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t1fk-cbsx-j3gh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49264?format=api",
            "vulnerability_id": "VCID-t4gn-9fw8-gkc3",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22947",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48666",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48656",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.486",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48683",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48662",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48614",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48668",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48665",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48671",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48714",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48718",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48669",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48657",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48641",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22947"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2021-22947.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2021-22947.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1334763",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:17Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1334763"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2003191",
                    "reference_id": "2003191",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2003191"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Mar/29",
                    "reference_id": "29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:17Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Mar/29"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/",
                    "reference_id": "APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:17Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2384",
                    "reference_id": "AVG-2384",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2384"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2385",
                    "reference_id": "AVG-2385",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2385"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2386",
                    "reference_id": "AVG-2386",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2386"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2387",
                    "reference_id": "AVG-2387",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2387"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2388",
                    "reference_id": "AVG-2388",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2388"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2389",
                    "reference_id": "AVG-2389",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2389"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5197",
                    "reference_id": "dsa-5197",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:17Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5197"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:17Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213183",
                    "reference_id": "HT213183",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:17Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213183"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html",
                    "reference_id": "msg00017.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:17Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html",
                    "reference_id": "msg00022.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:17Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211029-0003/",
                    "reference_id": "ntap-20211029-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:17Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211029-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4059",
                    "reference_id": "RHSA-2021:4059",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4059"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0635",
                    "reference_id": "RHSA-2022:0635",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0635"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1354",
                    "reference_id": "RHSA-2022:1354",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1354"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/",
                    "reference_id": "RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:17Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5079-1/",
                    "reference_id": "USN-5079-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5079-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5079-2/",
                    "reference_id": "USN-5079-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5079-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77808?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.86.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.86.0"
                }
            ],
            "aliases": [
                "CVE-2021-22947"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t4gn-9fw8-gkc3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49267?format=api",
            "vulnerability_id": "VCID-t8t6-9wa3-aub7",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27775.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27775.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27775",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35624",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35934",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35883",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35656",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36026",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36057",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3589",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3594",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35964",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3597",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35931",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35907",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35947",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27775"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2022-27775.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2022-27775.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1546268",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://hackerone.com/reports/1546268"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010253",
                    "reference_id": "1010253",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010253"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2078388",
                    "reference_id": "2078388",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2078388"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2685",
                    "reference_id": "AVG-2685",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2685"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8299",
                    "reference_id": "RHSA-2022:8299",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8299"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5397-1/",
                    "reference_id": "USN-5397-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5397-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77808?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.86.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.86.0"
                }
            ],
            "aliases": [
                "CVE-2022-27775"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t8t6-9wa3-aub7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49273?format=api",
            "vulnerability_id": "VCID-v9n1-d6xt-6ubn",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30115.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30115.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-30115",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2755",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27755",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27713",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27658",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27925",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27967",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27758",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27826",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27867",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27873",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27831",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27774",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2778",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-30115"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2022-30115.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2022-30115.html"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1557449",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://hackerone.com/reports/1557449"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082223",
                    "reference_id": "2082223",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082223"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2706",
                    "reference_id": "AVG-2706",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2706"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77808?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.86.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.86.0"
                }
            ],
            "aliases": [
                "CVE-2022-30115"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v9n1-d6xt-6ubn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49275?format=api",
            "vulnerability_id": "VCID-xzay-sjpy-3yce",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32206.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32206.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03973",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88423",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.04546",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89161",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04546",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89158",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04546",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89143",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04546",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89212",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.04546",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89195",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.04546",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89199",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04546",
                            "scoring_system": "epss",
                            "scoring_elements": "0.892",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04546",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89187",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04546",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89189",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04546",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89193",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04546",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89183",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04546",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89178",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32206"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2022-32206.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2022-32206.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1570651",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1570651"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099300",
                    "reference_id": "2099300",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099300"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Oct/28",
                    "reference_id": "28",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Oct/28"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/02/15/3",
                    "reference_id": "3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/02/15/3"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Oct/41",
                    "reference_id": "41",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Oct/41"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2817",
                    "reference_id": "AVG-2817",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Unknown",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2817"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/",
                    "reference_id": "BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5197",
                    "reference_id": "dsa-5197",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5197"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213488",
                    "reference_id": "HT213488",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213488"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html",
                    "reference_id": "msg00017.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220915-0003/",
                    "reference_id": "ntap-20220915-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220915-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6157",
                    "reference_id": "RHSA-2022:6157",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6157"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6159",
                    "reference_id": "RHSA-2022:6159",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6159"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8840",
                    "reference_id": "RHSA-2022:8840",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8840"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8841",
                    "reference_id": "RHSA-2022:8841",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8841"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3460",
                    "reference_id": "RHSA-2023:3460",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3460"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5495-1/",
                    "reference_id": "USN-5495-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5495-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77808?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.86.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.86.0"
                }
            ],
            "aliases": [
                "CVE-2022-32206"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xzay-sjpy-3yce"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49277?format=api",
            "vulnerability_id": "VCID-y4x5-n5m2-x7bq",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32208.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32208.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33792",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34188",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33815",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37942",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37916",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37863",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37884",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37837",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37862",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37898",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37883",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3787",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37819",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32208"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2022-32208.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2022-32208.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1590071",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1590071"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099306",
                    "reference_id": "2099306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099306"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Oct/28",
                    "reference_id": "28",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Oct/28"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Oct/41",
                    "reference_id": "41",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Oct/41"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2817",
                    "reference_id": "AVG-2817",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Unknown",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2817"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/",
                    "reference_id": "BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5197",
                    "reference_id": "dsa-5197",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5197"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213488",
                    "reference_id": "HT213488",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213488"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html",
                    "reference_id": "msg00017.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220915-0003/",
                    "reference_id": "ntap-20220915-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220915-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6157",
                    "reference_id": "RHSA-2022:6157",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6157"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6159",
                    "reference_id": "RHSA-2022:6159",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6159"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8840",
                    "reference_id": "RHSA-2022:8840",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8840"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8841",
                    "reference_id": "RHSA-2022:8841",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8841"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5495-1/",
                    "reference_id": "USN-5495-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5495-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5499-1/",
                    "reference_id": "USN-5499-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5499-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77808?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.86.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.86.0"
                }
            ],
            "aliases": [
                "CVE-2022-32208"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y4x5-n5m2-x7bq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49282?format=api",
            "vulnerability_id": "VCID-yaas-j3qk-kfdg",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42916.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42916.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42916",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14667",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14637",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14669",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25934",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26053",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26002",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25945",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25964",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25958",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26017",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26063",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31155",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31202",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42916"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2022-42916.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2022-42916.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42916",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42916"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1730660",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://hackerone.com/reports/1730660"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/12/21/1",
                    "reference_id": "1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/12/21/1"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2023/Jan/19",
                    "reference_id": "19",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2023/Jan/19"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2023/Jan/20",
                    "reference_id": "20",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2023/Jan/20"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135416",
                    "reference_id": "2135416",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135416"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37YEVVC6NAF6H7UHH6YAUY5QEVY6LIH2/",
                    "reference_id": "37YEVVC6NAF6H7UHH6YAUY5QEVY6LIH2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37YEVVC6NAF6H7UHH6YAUY5QEVY6LIH2/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213604",
                    "reference_id": "HT213604",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213604"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213605",
                    "reference_id": "HT213605",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213605"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVU3IMZCKR4VE6KJ4GCWRL2ILLC6OV76/",
                    "reference_id": "HVU3IMZCKR4VE6KJ4GCWRL2ILLC6OV76",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVU3IMZCKR4VE6KJ4GCWRL2ILLC6OV76/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20221209-0010/",
                    "reference_id": "ntap-20221209-0010",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20221209-0010/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q27V5YYMXUVI6PRZQVECON32XPVWTKDK/",
                    "reference_id": "Q27V5YYMXUVI6PRZQVECON32XPVWTKDK",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q27V5YYMXUVI6PRZQVECON32XPVWTKDK/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8840",
                    "reference_id": "RHSA-2022:8840",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8840"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8841",
                    "reference_id": "RHSA-2022:8841",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8841"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5702-1/",
                    "reference_id": "USN-5702-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5702-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77808?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.86.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.86.0"
                }
            ],
            "aliases": [
                "CVE-2022-42916"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yaas-j3qk-kfdg"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.86.0"
}