Lookup for vulnerable packages by Package URL.

GET /api/packages/95867?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/95867?format=api",
    "purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1?arch=el9",
    "type": "rpm",
    "namespace": "redhat",
    "name": "webkit2gtk3",
    "version": "2.38.5-1",
    "qualifiers": {
        "arch": "el9"
    },
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49534?format=api",
            "vulnerability_id": "VCID-1v5n-s4cf-dkat",
            "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25361.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25361.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-25361",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00215",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44064",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00215",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44039",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00215",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44088",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00215",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44019",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00215",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4407",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00215",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44072",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00215",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44055",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-25361"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175103",
                    "reference_id": "2175103",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175103"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/04/21/3",
                    "reference_id": "3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T16:19:05Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/04/21/3"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202305-32",
                    "reference_id": "GLSA-202305-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T16:19:05Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202305-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2256",
                    "reference_id": "RHSA-2023:2256",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2256"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2834",
                    "reference_id": "RHSA-2023:2834",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2834"
                },
                {
                    "reference_url": "https://bugs.webkit.org/show_bug.cgi?id=244249",
                    "reference_id": "show_bug.cgi?id=244249",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T16:19:05Z/"
                        }
                    ],
                    "url": "https://bugs.webkit.org/show_bug.cgi?id=244249"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-25361"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1v5n-s4cf-dkat"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49535?format=api",
            "vulnerability_id": "VCID-2dzh-7e8h-rbac",
            "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25362.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25362.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-25362",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00215",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44064",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00215",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44039",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00215",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44019",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00215",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4407",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00215",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44072",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00215",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44055",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00215",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44088",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-25362"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175105",
                    "reference_id": "2175105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175105"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/04/21/3",
                    "reference_id": "3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T17:25:41Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/04/21/3"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202305-32",
                    "reference_id": "GLSA-202305-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T17:25:41Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202305-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2256",
                    "reference_id": "RHSA-2023:2256",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2256"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2834",
                    "reference_id": "RHSA-2023:2834",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2834"
                },
                {
                    "reference_url": "https://bugs.webkit.org/show_bug.cgi?id=244802",
                    "reference_id": "show_bug.cgi?id=244802",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T17:25:41Z/"
                        }
                    ],
                    "url": "https://bugs.webkit.org/show_bug.cgi?id=244802"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-25362"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2dzh-7e8h-rbac"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49527?format=api",
            "vulnerability_id": "VCID-4tnr-2yst-m3b8",
            "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46699.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46699.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-46699",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71715",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71747",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71733",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71707",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71746",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71758",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71782",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71765",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-46699"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/20",
                    "reference_id": "20",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/20"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156993",
                    "reference_id": "2156993",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156993"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/26",
                    "reference_id": "26",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/26"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/27",
                    "reference_id": "27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/27"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/28",
                    "reference_id": "28",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/28"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202305-32",
                    "reference_id": "GLSA-202305-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202305-32"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213530",
                    "reference_id": "HT213530",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213530"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213532",
                    "reference_id": "HT213532",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213532"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213535",
                    "reference_id": "HT213535",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213535"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213536",
                    "reference_id": "HT213536",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213536"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213537",
                    "reference_id": "HT213537",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213537"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2256",
                    "reference_id": "RHSA-2023:2256",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2256"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2834",
                    "reference_id": "RHSA-2023:2834",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2834"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364",
                    "reference_id": "RHSA-2025:10364",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10364"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5797-1/",
                    "reference_id": "USN-5797-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5797-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-46699"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4tnr-2yst-m3b8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49523?format=api",
            "vulnerability_id": "VCID-68gk-5ng7-17d9",
            "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42867.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42867.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42867",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90392",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90436",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90404",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90408",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90422",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90429",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42867"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/12/26/1",
                    "reference_id": "1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/12/26/1"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/20",
                    "reference_id": "20",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/20"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156989",
                    "reference_id": "2156989",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156989"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/26",
                    "reference_id": "26",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/26"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/27",
                    "reference_id": "27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/27"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/28",
                    "reference_id": "28",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/28"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202305-32",
                    "reference_id": "GLSA-202305-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202305-32"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213530",
                    "reference_id": "HT213530",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213530"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213532",
                    "reference_id": "HT213532",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213532"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213535",
                    "reference_id": "HT213535",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213535"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213536",
                    "reference_id": "HT213536",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213536"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213537",
                    "reference_id": "HT213537",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213537"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2256",
                    "reference_id": "RHSA-2023:2256",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2256"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2834",
                    "reference_id": "RHSA-2023:2834",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2834"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364",
                    "reference_id": "RHSA-2025:10364",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10364"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5797-1/",
                    "reference_id": "USN-5797-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5797-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-42867"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-68gk-5ng7-17d9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49530?format=api",
            "vulnerability_id": "VCID-6t3m-f99z-1kf6",
            "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23518.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23518.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-23518",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54207",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54271",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54238",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54213",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54265",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54261",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5431",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54292",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-23518"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167715",
                    "reference_id": "2167715",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167715"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202305-32",
                    "reference_id": "GLSA-202305-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202305-32"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213599",
                    "reference_id": "HT213599",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213599"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213600",
                    "reference_id": "HT213600",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213600"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213601",
                    "reference_id": "HT213601",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213601"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213603",
                    "reference_id": "HT213603",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213603"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213604",
                    "reference_id": "HT213604",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213604"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213605",
                    "reference_id": "HT213605",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213605"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213606",
                    "reference_id": "HT213606",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213606"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213638",
                    "reference_id": "HT213638",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213638"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2256",
                    "reference_id": "RHSA-2023:2256",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2256"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2834",
                    "reference_id": "RHSA-2023:2834",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2834"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364",
                    "reference_id": "RHSA-2025:10364",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10364"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5867-1/",
                    "reference_id": "USN-5867-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5867-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-23518"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6t3m-f99z-1kf6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49533?format=api",
            "vulnerability_id": "VCID-6wkv-5av5-gfhy",
            "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25360.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25360.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-25360",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43094",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43098",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43121",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43059",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43112",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43125",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43146",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43113",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-25360"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175101",
                    "reference_id": "2175101",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175101"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/04/21/3",
                    "reference_id": "3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T16:11:53Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/04/21/3"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202305-32",
                    "reference_id": "GLSA-202305-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T16:11:53Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202305-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2256",
                    "reference_id": "RHSA-2023:2256",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2256"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2834",
                    "reference_id": "RHSA-2023:2834",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2834"
                },
                {
                    "reference_url": "https://bugs.webkit.org/show_bug.cgi?id=242686",
                    "reference_id": "show_bug.cgi?id=242686",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T16:11:53Z/"
                        }
                    ],
                    "url": "https://bugs.webkit.org/show_bug.cgi?id=242686"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-25360"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6wkv-5av5-gfhy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49536?format=api",
            "vulnerability_id": "VCID-auzh-b1y3-nkfs",
            "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25363.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25363.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-25363",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00215",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44064",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00215",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44039",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00215",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44019",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00215",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4407",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00215",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44072",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00215",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44055",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00215",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44088",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-25363"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175107",
                    "reference_id": "2175107",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175107"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/04/21/3",
                    "reference_id": "3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T17:24:00Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/04/21/3"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202305-32",
                    "reference_id": "GLSA-202305-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T17:24:00Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202305-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2256",
                    "reference_id": "RHSA-2023:2256",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2256"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2834",
                    "reference_id": "RHSA-2023:2834",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2834"
                },
                {
                    "reference_url": "https://bugs.webkit.org/show_bug.cgi?id=242684",
                    "reference_id": "show_bug.cgi?id=242684",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T17:24:00Z/"
                        }
                    ],
                    "url": "https://bugs.webkit.org/show_bug.cgi?id=242684"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-25363"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-auzh-b1y3-nkfs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49529?format=api",
            "vulnerability_id": "VCID-bmta-jy4b-mugh",
            "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23517.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23517.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-23517",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00213",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43808",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00213",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43787",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00213",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43832",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00213",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43763",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00213",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43814",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00213",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43818",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00213",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43836",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00213",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43804",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-23517"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167717",
                    "reference_id": "2167717",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167717"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202305-32",
                    "reference_id": "GLSA-202305-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202305-32"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213599",
                    "reference_id": "HT213599",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213599"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213600",
                    "reference_id": "HT213600",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213600"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213601",
                    "reference_id": "HT213601",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213601"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213603",
                    "reference_id": "HT213603",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213603"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213604",
                    "reference_id": "HT213604",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213604"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213605",
                    "reference_id": "HT213605",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213605"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213606",
                    "reference_id": "HT213606",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213606"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213638",
                    "reference_id": "HT213638",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213638"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2256",
                    "reference_id": "RHSA-2023:2256",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2256"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2834",
                    "reference_id": "RHSA-2023:2834",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2834"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364",
                    "reference_id": "RHSA-2025:10364",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10364"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5867-1/",
                    "reference_id": "USN-5867-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5867-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-23517"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bmta-jy4b-mugh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49512?format=api",
            "vulnerability_id": "VCID-c4mn-f4k4-wqe9",
            "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32886.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32886.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32886",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75296",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75246",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75278",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75255",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75298",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75308",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75329",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75307",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32886"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128643",
                    "reference_id": "2128643",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128643"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Oct/28",
                    "reference_id": "28",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Oct/28"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Oct/39",
                    "reference_id": "39",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Oct/39"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Oct/41",
                    "reference_id": "41",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Oct/41"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/74MXH2U5GA4CX3L3NLYP4TBO4O2VOPBJ/",
                    "reference_id": "74MXH2U5GA4CX3L3NLYP4TBO4O2VOPBJ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/74MXH2U5GA4CX3L3NLYP4TBO4O2VOPBJ/"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2819",
                    "reference_id": "AVG-2819",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Unknown",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2819"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2820",
                    "reference_id": "AVG-2820",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Unknown",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2820"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5240",
                    "reference_id": "dsa-5240",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5240"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5241",
                    "reference_id": "dsa-5241",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5241"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202305-32",
                    "reference_id": "GLSA-202305-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202305-32"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213442",
                    "reference_id": "HT213442",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213442"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213445",
                    "reference_id": "HT213445",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213445"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213446",
                    "reference_id": "HT213446",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213446"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KDV6OLKDTL55NH4LNSMLQ4D6LLSX6JU2/",
                    "reference_id": "KDV6OLKDTL55NH4LNSMLQ4D6LLSX6JU2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KDV6OLKDTL55NH4LNSMLQ4D6LLSX6JU2/"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00034.html",
                    "reference_id": "msg00034.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00034.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2256",
                    "reference_id": "RHSA-2023:2256",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2256"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2834",
                    "reference_id": "RHSA-2023:2834",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2834"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364",
                    "reference_id": "RHSA-2025:10364",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10364"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TDNT32WIARRD2ANWKGCTTIQXI6OII7HZ/",
                    "reference_id": "TDNT32WIARRD2ANWKGCTTIQXI6OII7HZ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TDNT32WIARRD2ANWKGCTTIQXI6OII7HZ/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5642-1/",
                    "reference_id": "USN-5642-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5642-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-32886"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c4mn-f4k4-wqe9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49532?format=api",
            "vulnerability_id": "VCID-cc7v-7r6y-nkcp",
            "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25358.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25358.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-25358",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37082",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36955",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37116",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36943",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36994",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37007",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37016",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36981",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-25358"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175099",
                    "reference_id": "2175099",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175099"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/04/21/3",
                    "reference_id": "3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T15:57:29Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/04/21/3"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5OKKVEUQAAGH3NHMX3WHWKRPYU4QFKTQ/",
                    "reference_id": "5OKKVEUQAAGH3NHMX3WHWKRPYU4QFKTQ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T15:57:29Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5OKKVEUQAAGH3NHMX3WHWKRPYU4QFKTQ/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6QL5OGMSHRQ26FTYWZUXVNWB2VHOSVXK/",
                    "reference_id": "6QL5OGMSHRQ26FTYWZUXVNWB2VHOSVXK",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T15:57:29Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6QL5OGMSHRQ26FTYWZUXVNWB2VHOSVXK/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202305-32",
                    "reference_id": "GLSA-202305-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T15:57:29Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202305-32"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KC7DMUX37BRCLAI4VPQYHDUVEGTNYN5A/",
                    "reference_id": "KC7DMUX37BRCLAI4VPQYHDUVEGTNYN5A",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T15:57:29Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KC7DMUX37BRCLAI4VPQYHDUVEGTNYN5A/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2256",
                    "reference_id": "RHSA-2023:2256",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2256"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2834",
                    "reference_id": "RHSA-2023:2834",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2834"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364",
                    "reference_id": "RHSA-2025:10364",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10364"
                },
                {
                    "reference_url": "https://bugs.webkit.org/show_bug.cgi?id=242683",
                    "reference_id": "show_bug.cgi?id=242683",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T15:57:29Z/"
                        }
                    ],
                    "url": "https://bugs.webkit.org/show_bug.cgi?id=242683"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6061-1/",
                    "reference_id": "USN-6061-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6061-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2023-25358"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cc7v-7r6y-nkcp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49528?format=api",
            "vulnerability_id": "VCID-cjg6-jkzc-uyg8",
            "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46700.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46700.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-46700",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71715",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71747",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71733",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71707",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71746",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71758",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71782",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71765",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-46700"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/20",
                    "reference_id": "20",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/20"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/21",
                    "reference_id": "21",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/21"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156994",
                    "reference_id": "2156994",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156994"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/26",
                    "reference_id": "26",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/26"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/27",
                    "reference_id": "27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/27"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/28",
                    "reference_id": "28",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/28"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202305-32",
                    "reference_id": "GLSA-202305-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202305-32"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213530",
                    "reference_id": "HT213530",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213530"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213531",
                    "reference_id": "HT213531",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213531"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213532",
                    "reference_id": "HT213532",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213532"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213535",
                    "reference_id": "HT213535",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213535"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213536",
                    "reference_id": "HT213536",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213536"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213537",
                    "reference_id": "HT213537",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213537"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2256",
                    "reference_id": "RHSA-2023:2256",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2256"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2834",
                    "reference_id": "RHSA-2023:2834",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2834"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364",
                    "reference_id": "RHSA-2025:10364",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10364"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5797-1/",
                    "reference_id": "USN-5797-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5797-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-46700"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cjg6-jkzc-uyg8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49518?format=api",
            "vulnerability_id": "VCID-dsb1-yxm6-dkcf",
            "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42824.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42824.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42824",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08383",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0833",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08366",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08303",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09601",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09648",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09617",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42824"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140504",
                    "reference_id": "2140504",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140504"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/11/04/4",
                    "reference_id": "4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/11/04/4"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/",
                    "reference_id": "5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/",
                    "reference_id": "AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5273",
                    "reference_id": "dsa-5273",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5273"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5274",
                    "reference_id": "dsa-5274",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5274"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202305-32",
                    "reference_id": "GLSA-202305-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202305-32"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213488",
                    "reference_id": "HT213488",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213488"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213489",
                    "reference_id": "HT213489",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213489"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213491",
                    "reference_id": "HT213491",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213491"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213492",
                    "reference_id": "HT213492",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213492"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213495",
                    "reference_id": "HT213495",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213495"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/",
                    "reference_id": "JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00010.html",
                    "reference_id": "msg00010.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00010.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2256",
                    "reference_id": "RHSA-2023:2256",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2256"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2834",
                    "reference_id": "RHSA-2023:2834",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2834"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364",
                    "reference_id": "RHSA-2025:10364",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10364"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5730-1/",
                    "reference_id": "USN-5730-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5730-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-42824"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dsb1-yxm6-dkcf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49524?format=api",
            "vulnerability_id": "VCID-e695-3zce-rfay",
            "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46691.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46691.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-46691",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00408",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61159",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00408",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61205",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00408",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61187",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00408",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61153",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00408",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61201",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00408",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61216",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00408",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61236",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00408",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61223",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-46691"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/20",
                    "reference_id": "20",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/20"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/21",
                    "reference_id": "21",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/21"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156990",
                    "reference_id": "2156990",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156990"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/26",
                    "reference_id": "26",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/26"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/27",
                    "reference_id": "27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/27"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/28",
                    "reference_id": "28",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/28"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202305-32",
                    "reference_id": "GLSA-202305-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202305-32"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213530",
                    "reference_id": "HT213530",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213530"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213531",
                    "reference_id": "HT213531",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213531"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213532",
                    "reference_id": "HT213532",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213532"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213535",
                    "reference_id": "HT213535",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213535"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213536",
                    "reference_id": "HT213536",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213536"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213537",
                    "reference_id": "HT213537",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213537"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2256",
                    "reference_id": "RHSA-2023:2256",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2256"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2834",
                    "reference_id": "RHSA-2023:2834",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2834"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364",
                    "reference_id": "RHSA-2025:10364",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10364"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-46691"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e695-3zce-rfay"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49515?format=api",
            "vulnerability_id": "VCID-ex1v-8bhw-5yfm",
            "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32923.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32923.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32923",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46563",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46544",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46567",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46512",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00268",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00268",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50272",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00268",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50245",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32923"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140502",
                    "reference_id": "2140502",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140502"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/11/04/4",
                    "reference_id": "4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T03:26:29Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/11/04/4"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202305-32",
                    "reference_id": "GLSA-202305-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T03:26:29Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202305-32"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213488",
                    "reference_id": "HT213488",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T03:26:29Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213488"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213489",
                    "reference_id": "HT213489",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T03:26:29Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213489"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213490",
                    "reference_id": "HT213490",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T03:26:29Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213490"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213491",
                    "reference_id": "HT213491",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T03:26:29Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213491"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213492",
                    "reference_id": "HT213492",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T03:26:29Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213492"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213495",
                    "reference_id": "HT213495",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T03:26:29Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213495"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2256",
                    "reference_id": "RHSA-2023:2256",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2256"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2834",
                    "reference_id": "RHSA-2023:2834",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2834"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364",
                    "reference_id": "RHSA-2025:10364",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10364"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5730-1/",
                    "reference_id": "USN-5730-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5730-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-32923"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ex1v-8bhw-5yfm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49520?format=api",
            "vulnerability_id": "VCID-fknw-h7xk-gkbt",
            "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42852.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42852.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42852",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00846",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7478",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00846",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74821",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00846",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74807",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00846",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74781",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00846",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74814",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00846",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74828",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00846",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74852",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00846",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74831",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42852"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/20",
                    "reference_id": "20",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/20"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/21",
                    "reference_id": "21",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/21"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156986",
                    "reference_id": "2156986",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156986"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/26",
                    "reference_id": "26",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/26"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/27",
                    "reference_id": "27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/27"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/28",
                    "reference_id": "28",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/28"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202305-32",
                    "reference_id": "GLSA-202305-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202305-32"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213530",
                    "reference_id": "HT213530",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213530"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213531",
                    "reference_id": "HT213531",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213531"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213532",
                    "reference_id": "HT213532",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213532"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213535",
                    "reference_id": "HT213535",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213535"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213536",
                    "reference_id": "HT213536",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213536"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213537",
                    "reference_id": "HT213537",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213537"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2256",
                    "reference_id": "RHSA-2023:2256",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2256"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2834",
                    "reference_id": "RHSA-2023:2834",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2834"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364",
                    "reference_id": "RHSA-2025:10364",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10364"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5797-1/",
                    "reference_id": "USN-5797-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5797-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-42852"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fknw-h7xk-gkbt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49525?format=api",
            "vulnerability_id": "VCID-hye4-wr18-5fbh",
            "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46692.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46692.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-46692",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02411",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02415",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02422",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0242",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02424",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02445",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-46692"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/20",
                    "reference_id": "20",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/20"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/21",
                    "reference_id": "21",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/21"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156991",
                    "reference_id": "2156991",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156991"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/26",
                    "reference_id": "26",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/26"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/28",
                    "reference_id": "28",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/28"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202305-32",
                    "reference_id": "GLSA-202305-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202305-32"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213530",
                    "reference_id": "HT213530",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213530"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213531",
                    "reference_id": "HT213531",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213531"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213532",
                    "reference_id": "HT213532",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213532"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213535",
                    "reference_id": "HT213535",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213535"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213536",
                    "reference_id": "HT213536",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213536"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213537",
                    "reference_id": "HT213537",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213537"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213538",
                    "reference_id": "HT213538",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213538"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2256",
                    "reference_id": "RHSA-2023:2256",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2256"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2834",
                    "reference_id": "RHSA-2023:2834",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2834"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364",
                    "reference_id": "RHSA-2025:10364",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10364"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5797-1/",
                    "reference_id": "USN-5797-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5797-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-46692"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hye4-wr18-5fbh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78307?format=api",
            "vulnerability_id": "VCID-knds-dwjv-c3c4",
            "summary": "webkitgtk: improper bounds checking leading to arbitrary code execution",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48503.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48503.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-48503",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3691",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36879",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39622",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39674",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39639",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40327",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40265",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40316",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-48503"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218623",
                    "reference_id": "2218623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218623"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213340",
                    "reference_id": "HT213340",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-20T14:53:48Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213340"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213341",
                    "reference_id": "HT213341",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-20T14:53:48Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213341"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213342",
                    "reference_id": "HT213342",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-20T14:53:48Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213342"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213346",
                    "reference_id": "HT213346",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-20T14:53:48Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213346"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2256",
                    "reference_id": "RHSA-2023:2256",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2256"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2834",
                    "reference_id": "RHSA-2023:2834",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2834"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:9653",
                    "reference_id": "RHSA-2024:9653",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:9653"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:9679",
                    "reference_id": "RHSA-2024:9679",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:9679"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:9680",
                    "reference_id": "RHSA-2024:9680",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:9680"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364",
                    "reference_id": "RHSA-2025:10364",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10364"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-48503"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-knds-dwjv-c3c4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49517?format=api",
            "vulnerability_id": "VCID-ma6z-vrhf-mqdw",
            "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42823.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42823.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42823",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00631",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70264",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00631",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70246",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00631",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70302",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00631",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70287",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00631",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7024",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00714",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72322",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00714",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7235",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00714",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72334",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42823"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140505",
                    "reference_id": "2140505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140505"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/11/04/4",
                    "reference_id": "4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/11/04/4"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/",
                    "reference_id": "5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/",
                    "reference_id": "AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5273",
                    "reference_id": "dsa-5273",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5273"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5274",
                    "reference_id": "dsa-5274",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5274"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202305-32",
                    "reference_id": "GLSA-202305-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202305-32"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213488",
                    "reference_id": "HT213488",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213488"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213489",
                    "reference_id": "HT213489",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213489"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213491",
                    "reference_id": "HT213491",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213491"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213492",
                    "reference_id": "HT213492",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213492"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213495",
                    "reference_id": "HT213495",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213495"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/",
                    "reference_id": "JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00010.html",
                    "reference_id": "msg00010.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00010.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2256",
                    "reference_id": "RHSA-2023:2256",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2256"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2834",
                    "reference_id": "RHSA-2023:2834",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2834"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364",
                    "reference_id": "RHSA-2025:10364",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10364"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5730-1/",
                    "reference_id": "USN-5730-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5730-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-42823"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ma6z-vrhf-mqdw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49519?format=api",
            "vulnerability_id": "VCID-maw9-2k6n-wyea",
            "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42826.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42826.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42826",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2786",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27852",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27919",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2796",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27962",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28491",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28534",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42826"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167716",
                    "reference_id": "2167716",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167716"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202305-32",
                    "reference_id": "GLSA-202305-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T14:41:32Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202305-32"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213488",
                    "reference_id": "HT213488",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T14:41:32Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213488"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213489",
                    "reference_id": "HT213489",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T14:41:32Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213489"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213495",
                    "reference_id": "HT213495",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T14:41:32Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213495"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2256",
                    "reference_id": "RHSA-2023:2256",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2256"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2834",
                    "reference_id": "RHSA-2023:2834",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2834"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364",
                    "reference_id": "RHSA-2025:10364",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10364"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5867-1/",
                    "reference_id": "USN-5867-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5867-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-42826"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-maw9-2k6n-wyea"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49522?format=api",
            "vulnerability_id": "VCID-nykh-jh9p-4bhy",
            "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42863.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42863.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42863",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77131",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77186",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7716",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77142",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77174",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77183",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7721",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77189",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42863"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/12/26/1",
                    "reference_id": "1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/12/26/1"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/20",
                    "reference_id": "20",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/20"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156987",
                    "reference_id": "2156987",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156987"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/26",
                    "reference_id": "26",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/26"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/27",
                    "reference_id": "27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/27"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/28",
                    "reference_id": "28",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/28"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202305-32",
                    "reference_id": "GLSA-202305-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202305-32"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213530",
                    "reference_id": "HT213530",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213530"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213532",
                    "reference_id": "HT213532",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213532"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213535",
                    "reference_id": "HT213535",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213535"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213536",
                    "reference_id": "HT213536",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213536"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213537",
                    "reference_id": "HT213537",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213537"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2256",
                    "reference_id": "RHSA-2023:2256",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2256"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2834",
                    "reference_id": "RHSA-2023:2834",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2834"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364",
                    "reference_id": "RHSA-2025:10364",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10364"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-42863"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nykh-jh9p-4bhy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49516?format=api",
            "vulnerability_id": "VCID-ryxv-e8de-q7h8",
            "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42799.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42799.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42799",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00462",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64205",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00462",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64233",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00462",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64194",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00462",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64244",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00462",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6426",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6692",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66964",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66951",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42799"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140503",
                    "reference_id": "2140503",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140503"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202305-32",
                    "reference_id": "GLSA-202305-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202305-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2256",
                    "reference_id": "RHSA-2023:2256",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2256"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2834",
                    "reference_id": "RHSA-2023:2834",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2834"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364",
                    "reference_id": "RHSA-2025:10364",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10364"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5730-1/",
                    "reference_id": "USN-5730-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5730-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-42799"
            ],
            "risk_score": 2.8,
            "exploitability": "0.5",
            "weighted_severity": "5.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ryxv-e8de-q7h8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49526?format=api",
            "vulnerability_id": "VCID-tmt1-qwc9-nfhs",
            "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46698.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46698.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-46698",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00969",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76564",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00969",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76613",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00969",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76593",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00969",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76573",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00969",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76605",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00969",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76617",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00969",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76643",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00969",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76623",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-46698"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/20",
                    "reference_id": "20",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/20"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156992",
                    "reference_id": "2156992",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156992"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/26",
                    "reference_id": "26",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/26"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/27",
                    "reference_id": "27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/27"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/28",
                    "reference_id": "28",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/28"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202305-32",
                    "reference_id": "GLSA-202305-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202305-32"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213530",
                    "reference_id": "HT213530",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213530"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213532",
                    "reference_id": "HT213532",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213532"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213535",
                    "reference_id": "HT213535",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213535"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213536",
                    "reference_id": "HT213536",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213536"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213537",
                    "reference_id": "HT213537",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213537"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213538",
                    "reference_id": "HT213538",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213538"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2256",
                    "reference_id": "RHSA-2023:2256",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2256"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2834",
                    "reference_id": "RHSA-2023:2834",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2834"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364",
                    "reference_id": "RHSA-2025:10364",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10364"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5797-1/",
                    "reference_id": "USN-5797-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5797-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-46698"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tmt1-qwc9-nfhs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49513?format=api",
            "vulnerability_id": "VCID-xzgb-egkw-9kdn",
            "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32888.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32888.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32888",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00702",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7202",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00702",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00702",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72046",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00702",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72034",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00702",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71995",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00794",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73935",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00794",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73961",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00794",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73943",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32888"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140501",
                    "reference_id": "2140501",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140501"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/11/04/4",
                    "reference_id": "4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/11/04/4"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202305-32",
                    "reference_id": "GLSA-202305-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202305-32"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213443",
                    "reference_id": "HT213443",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213443"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213444",
                    "reference_id": "HT213444",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213444"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213445",
                    "reference_id": "HT213445",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213445"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213446",
                    "reference_id": "HT213446",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213446"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213486",
                    "reference_id": "HT213486",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213486"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213487",
                    "reference_id": "HT213487",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213487"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213488",
                    "reference_id": "HT213488",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213488"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2256",
                    "reference_id": "RHSA-2023:2256",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2256"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2834",
                    "reference_id": "RHSA-2023:2834",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2834"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364",
                    "reference_id": "RHSA-2025:10364",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10364"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5730-1/",
                    "reference_id": "USN-5730-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5730-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-32888"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xzgb-egkw-9kdn"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "10.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/webkit2gtk3@2.38.5-1%3Farch=el9"
}