Lookup for vulnerable packages by Package URL.

GET /api/packages/99531?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/99531?format=api",
    "purl": "pkg:rpm/redhat/eap7-log4j@2.17.1-1.redhat_00001.1?arch=el8eap",
    "type": "rpm",
    "namespace": "redhat",
    "name": "eap7-log4j",
    "version": "2.17.1-1.redhat_00001.1",
    "qualifiers": {
        "arch": "el8eap"
    },
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/12311?format=api",
            "vulnerability_id": "VCID-1vfk-arae-ubha",
            "summary": "Deserialization of Untrusted Data in Log4j 1.x\nJMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can provide a TopicConnectionFactoryBindingName configuration causing JMSSink to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-4104. Note this issue only affects Log4j 1.x when specifically configured to use JMSSink, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23302.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23302.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23302",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00647",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70794",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00647",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70774",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00647",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70817",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00647",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7081",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00647",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70765",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00647",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7078",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00647",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70796",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00647",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70718",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00647",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70737",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00647",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70713",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00647",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70758",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23302"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23302",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23302"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/apache/logging-log4j1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/logging-log4j1"
                },
                {
                    "reference_url": "https://lists.apache.org/thread/bsr3l5qz4g0myrjhy9h67bcxodpkwj4w",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread/bsr3l5qz4g0myrjhy9h67bcxodpkwj4w"
                },
                {
                    "reference_url": "https://logging.apache.org/log4j/1.2/index.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://logging.apache.org/log4j/1.2/index.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220217-0006",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220217-0006"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujul2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/01/18/3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/01/18/3"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004482",
                    "reference_id": "1004482",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004482"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041949",
                    "reference_id": "2041949",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041949"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23302",
                    "reference_id": "CVE-2022-23302",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23302"
                },
                {
                    "reference_url": "https://www.vicarius.io/vsociety/posts/cve-2022-23302-detect-log4j-1217-vulnerability",
                    "reference_id": "CVE-2022-23302-DETECT-LOG4J-1217-VULNERABILITY",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.vicarius.io/vsociety/posts/cve-2022-23302-detect-log4j-1217-vulnerability"
                },
                {
                    "reference_url": "https://www.vicarius.io/vsociety/posts/cve-2022-23302-mitigate-log4j-1217-vulnerability",
                    "reference_id": "CVE-2022-23302-MITIGATE-LOG4J-1217-VULNERABILITY",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.vicarius.io/vsociety/posts/cve-2022-23302-mitigate-log4j-1217-vulnerability"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-w9p3-5cr8-m3jj",
                    "reference_id": "GHSA-w9p3-5cr8-m3jj",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-w9p3-5cr8-m3jj"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-16",
                    "reference_id": "GLSA-202402-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-16"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0289",
                    "reference_id": "RHSA-2022:0289",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0289"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0290",
                    "reference_id": "RHSA-2022:0290",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0290"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0291",
                    "reference_id": "RHSA-2022:0291",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0291"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0294",
                    "reference_id": "RHSA-2022:0294",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0294"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0430",
                    "reference_id": "RHSA-2022:0430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0430"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0435",
                    "reference_id": "RHSA-2022:0435",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0435"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0436",
                    "reference_id": "RHSA-2022:0436",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0436"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0437",
                    "reference_id": "RHSA-2022:0437",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0437"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0438",
                    "reference_id": "RHSA-2022:0438",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0438"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0439",
                    "reference_id": "RHSA-2022:0439",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0439"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0442",
                    "reference_id": "RHSA-2022:0442",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0442"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0444",
                    "reference_id": "RHSA-2022:0444",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0444"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0445",
                    "reference_id": "RHSA-2022:0445",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0445"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0446",
                    "reference_id": "RHSA-2022:0446",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0446"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0447",
                    "reference_id": "RHSA-2022:0447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0448",
                    "reference_id": "RHSA-2022:0448",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0448"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0449",
                    "reference_id": "RHSA-2022:0449",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0449"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0450",
                    "reference_id": "RHSA-2022:0450",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0450"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0467",
                    "reference_id": "RHSA-2022:0467",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0467"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0469",
                    "reference_id": "RHSA-2022:0469",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0469"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0475",
                    "reference_id": "RHSA-2022:0475",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0475"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0497",
                    "reference_id": "RHSA-2022:0497",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0497"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0507",
                    "reference_id": "RHSA-2022:0507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0524",
                    "reference_id": "RHSA-2022:0524",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0524"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0527",
                    "reference_id": "RHSA-2022:0527",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0527"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0553",
                    "reference_id": "RHSA-2022:0553",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0553"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0661",
                    "reference_id": "RHSA-2022:0661",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0661"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1296",
                    "reference_id": "RHSA-2022:1296",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1296"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1297",
                    "reference_id": "RHSA-2022:1297",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1297"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1299",
                    "reference_id": "RHSA-2022:1299",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1299"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5458",
                    "reference_id": "RHSA-2022:5458",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5458"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5459",
                    "reference_id": "RHSA-2022:5459",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5459"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5460",
                    "reference_id": "RHSA-2022:5460",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5460"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5856",
                    "reference_id": "RHSA-2024:5856",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5856"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5998-1/",
                    "reference_id": "USN-5998-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5998-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7590-1/",
                    "reference_id": "USN-7590-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7590-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-23302",
                "GHSA-w9p3-5cr8-m3jj"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1vfk-arae-ubha"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/11784?format=api",
            "vulnerability_id": "VCID-698m-2hju-2qcv",
            "summary": "Deserialization of Untrusted Data\nJMSAppender in Log4j is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide `TopicBindingName` and `TopicConnectionFactoryBindingName` configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j when specifically configured to use JMSAppender, which is not the default. Apache Log4j reached end of life in August Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4104.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4104.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4104",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.69284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98648",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.69284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98647",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.69284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98646",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.69284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98644",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.69284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98643",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.69284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98653",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.69284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98651",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.69284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98639",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.69284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98635",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.69284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98633",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.69284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98641",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4104"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4104",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4104"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/apache/logging-log4j2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/logging-log4j2"
                },
                {
                    "reference_url": "https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126"
                },
                {
                    "reference_url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0033",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0033"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202209-02",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202209-02"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-16",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202310-16"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202312-04",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202312-04"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211223-0007",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211223-0007"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211223-0007/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20211223-0007/"
                },
                {
                    "reference_url": "https://www.cve.org/CVERecord?id=CVE-2021-44228",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
                },
                {
                    "reference_url": "https://www.kb.cert.org/vuls/id/930724",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.kb.cert.org/vuls/id/930724"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujan2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpujan2022.html"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujul2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/01/18/3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/01/18/3"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031667",
                    "reference_id": "2031667",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031667"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2021-4104",
                    "reference_id": "CVE-2021-4104",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2021-4104"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4104",
                    "reference_id": "CVE-2021-4104",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4104"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-fp5r-v3w9-4333",
                    "reference_id": "GHSA-fp5r-v3w9-4333",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-fp5r-v3w9-4333"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202312-02",
                    "reference_id": "GLSA-202312-02",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202312-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5107",
                    "reference_id": "RHSA-2021:5107",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5107"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5141",
                    "reference_id": "RHSA-2021:5141",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5141"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5148",
                    "reference_id": "RHSA-2021:5148",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5148"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5183",
                    "reference_id": "RHSA-2021:5183",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5183"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5184",
                    "reference_id": "RHSA-2021:5184",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5184"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5186",
                    "reference_id": "RHSA-2021:5186",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5186"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5206",
                    "reference_id": "RHSA-2021:5206",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5206"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5269",
                    "reference_id": "RHSA-2021:5269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5269"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0289",
                    "reference_id": "RHSA-2022:0289",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0289"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0290",
                    "reference_id": "RHSA-2022:0290",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0290"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0291",
                    "reference_id": "RHSA-2022:0291",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0291"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0294",
                    "reference_id": "RHSA-2022:0294",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0294"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0430",
                    "reference_id": "RHSA-2022:0430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0430"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0435",
                    "reference_id": "RHSA-2022:0435",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0435"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0436",
                    "reference_id": "RHSA-2022:0436",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0436"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0437",
                    "reference_id": "RHSA-2022:0437",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0437"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0438",
                    "reference_id": "RHSA-2022:0438",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0438"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0444",
                    "reference_id": "RHSA-2022:0444",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0444"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0445",
                    "reference_id": "RHSA-2022:0445",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0445"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0446",
                    "reference_id": "RHSA-2022:0446",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0446"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0447",
                    "reference_id": "RHSA-2022:0447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0448",
                    "reference_id": "RHSA-2022:0448",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0448"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0449",
                    "reference_id": "RHSA-2022:0449",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0449"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0450",
                    "reference_id": "RHSA-2022:0450",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0450"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0475",
                    "reference_id": "RHSA-2022:0475",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0475"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0497",
                    "reference_id": "RHSA-2022:0497",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0497"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0507",
                    "reference_id": "RHSA-2022:0507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0524",
                    "reference_id": "RHSA-2022:0524",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0524"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0527",
                    "reference_id": "RHSA-2022:0527",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0527"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0553",
                    "reference_id": "RHSA-2022:0553",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0553"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0661",
                    "reference_id": "RHSA-2022:0661",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0661"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1296",
                    "reference_id": "RHSA-2022:1296",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1296"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1297",
                    "reference_id": "RHSA-2022:1297",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1297"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1299",
                    "reference_id": "RHSA-2022:1299",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1299"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5458",
                    "reference_id": "RHSA-2022:5458",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5458"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5459",
                    "reference_id": "RHSA-2022:5459",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5459"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5460",
                    "reference_id": "RHSA-2022:5460",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5460"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5856",
                    "reference_id": "RHSA-2024:5856",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5856"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5223-1/",
                    "reference_id": "USN-5223-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5223-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/USN-5223-2/",
                    "reference_id": "USN-USN-5223-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/USN-5223-2/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2021-4104",
                "GHSA-fp5r-v3w9-4333"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-698m-2hju-2qcv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/11781?format=api",
            "vulnerability_id": "VCID-8977-tjss-w7ba",
            "summary": "Incomplete fix for Apache Log4j vulnerability\nThe fix to address [CVE-2021-44228](https://nvd.nist.gov/vuln/detail/CVE-2021-44228) in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allow attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in a remote code execution (RCE) attack.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45046.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45046.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-45046",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.9434",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99954",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.9434",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99955",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.94434",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99985",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-45046"
                },
                {
                    "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T19:31:22Z/"
                        }
                    ],
                    "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf"
                },
                {
                    "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T19:31:22Z/"
                        }
                    ],
                    "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf"
                },
                {
                    "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T19:31:22Z/"
                        }
                    ],
                    "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf"
                },
                {
                    "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T19:31:22Z/"
                        }
                    ],
                    "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ"
                },
                {
                    "reference_url": "https://logging.apache.org/log4j/2.x/security.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T19:31:22Z/"
                        }
                    ],
                    "url": "https://logging.apache.org/log4j/2.x/security.html"
                },
                {
                    "reference_url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T19:31:22Z/"
                        }
                    ],
                    "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032"
                },
                {
                    "reference_url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-16",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T19:31:22Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202310-16"
                },
                {
                    "reference_url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T19:31:22Z/"
                        }
                    ],
                    "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
                },
                {
                    "reference_url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-45046",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-45046"
                },
                {
                    "reference_url": "https://www.cve.org/CVERecord?id=CVE-2021-44228",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T19:31:22Z/"
                        }
                    ],
                    "url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
                },
                {
                    "reference_url": "https://www.debian.org/security/2021/dsa-5022",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T19:31:22Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2021/dsa-5022"
                },
                {
                    "reference_url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T19:31:22Z/"
                        }
                    ],
                    "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html"
                },
                {
                    "reference_url": "https://www.kb.cert.org/vuls/id/930724",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T19:31:22Z/"
                        }
                    ],
                    "url": "https://www.kb.cert.org/vuls/id/930724"
                },
                {
                    "reference_url": "https://www.openwall.com/lists/oss-security/2021/12/14/4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.openwall.com/lists/oss-security/2021/12/14/4"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/alert-cve-2021-44228.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T19:31:22Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/alert-cve-2021-44228.html"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T19:31:22Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujan2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T19:31:22Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpujan2022.html"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujul2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T19:31:22Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2021/12/14/4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T19:31:22Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2021/12/14/4"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2021/12/15/3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T19:31:22Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2021/12/15/3"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2021/12/18/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T19:31:22Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2021/12/18/1"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1001729",
                    "reference_id": "1001729",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1001729"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032580",
                    "reference_id": "2032580",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032580"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45046",
                    "reference_id": "CVE-2021-45046",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45046"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY/",
                    "reference_id": "EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T19:31:22Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY/"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-7rjr-3q55-vv33",
                    "reference_id": "GHSA-7rjr-3q55-vv33",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "CRITICAL",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-7rjr-3q55-vv33"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-jfh8-c2jp-5v3q",
                    "reference_id": "GHSA-jfh8-c2jp-5v3q",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-jfh8-c2jp-5v3q"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5094",
                    "reference_id": "RHSA-2021:5094",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5094"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5106",
                    "reference_id": "RHSA-2021:5106",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5106"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5107",
                    "reference_id": "RHSA-2021:5107",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5107"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5108",
                    "reference_id": "RHSA-2021:5108",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5108"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5127",
                    "reference_id": "RHSA-2021:5127",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5127"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5128",
                    "reference_id": "RHSA-2021:5128",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5128"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5129",
                    "reference_id": "RHSA-2021:5129",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5129"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5137",
                    "reference_id": "RHSA-2021:5137",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5137"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5141",
                    "reference_id": "RHSA-2021:5141",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5141"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5148",
                    "reference_id": "RHSA-2021:5148",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5148"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0083",
                    "reference_id": "RHSA-2022:0083",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0083"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0138",
                    "reference_id": "RHSA-2022:0138",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0138"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0203",
                    "reference_id": "RHSA-2022:0203",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0203"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0205",
                    "reference_id": "RHSA-2022:0205",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0205"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0216",
                    "reference_id": "RHSA-2022:0216",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0216"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0222",
                    "reference_id": "RHSA-2022:0222",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0222"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0223",
                    "reference_id": "RHSA-2022:0223",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0223"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1296",
                    "reference_id": "RHSA-2022:1296",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1296"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1297",
                    "reference_id": "RHSA-2022:1297",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1297"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1299",
                    "reference_id": "RHSA-2022:1299",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1299"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:1746",
                    "reference_id": "RHSA-2025:1746",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:1746"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:1747",
                    "reference_id": "RHSA-2025:1747",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:1747"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ/",
                    "reference_id": "SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T19:31:22Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5197-1/",
                    "reference_id": "USN-5197-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5197-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2021-45046",
                "GHSA-7rjr-3q55-vv33"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8977-tjss-w7ba"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/12203?format=api",
            "vulnerability_id": "VCID-9k99-jzq8-fyge",
            "summary": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nBy design, the JDBCAppender in Log4j accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering crafted strings into input fields or headers of an application that are logged allowing unintended SQL queries to be executed. Note this issue only affects Log4j when specifically configured to use the JDBCAppender, which is not the default. Beginning, the JDBCAppender was re-introduced with proper support for parameterized SQL queries and further customization over the columns written to in logs. Apache Log4j reached end of life in August Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23305.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23305.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23305",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07951",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92072",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.07951",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92069",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.07951",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92074",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.07951",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92077",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.07951",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92037",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07951",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92045",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07951",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9205",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07951",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92062",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07951",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92065",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23305"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23305",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23305"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/apache/logging-log4j1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/logging-log4j1"
                },
                {
                    "reference_url": "https://lists.apache.org/thread/pt6lh3pbsvxqlwlp4c5l798dv2hkc85y",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread/pt6lh3pbsvxqlwlp4c5l798dv2hkc85y"
                },
                {
                    "reference_url": "https://logging.apache.org/log4j/1.2/index.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://logging.apache.org/log4j/1.2/index.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220217-0007",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220217-0007"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220217-0007/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20220217-0007/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujul2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/01/18/4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/01/18/4"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004482",
                    "reference_id": "1004482",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004482"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041959",
                    "reference_id": "2041959",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041959"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23305",
                    "reference_id": "CVE-2022-23305",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23305"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-65fg-84f6-3jq3",
                    "reference_id": "GHSA-65fg-84f6-3jq3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "CRITICAL",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-65fg-84f6-3jq3"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-16",
                    "reference_id": "GLSA-202402-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-16"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0289",
                    "reference_id": "RHSA-2022:0289",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0289"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0290",
                    "reference_id": "RHSA-2022:0290",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0290"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0291",
                    "reference_id": "RHSA-2022:0291",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0291"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0294",
                    "reference_id": "RHSA-2022:0294",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0294"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0430",
                    "reference_id": "RHSA-2022:0430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0430"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0435",
                    "reference_id": "RHSA-2022:0435",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0435"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0436",
                    "reference_id": "RHSA-2022:0436",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0436"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0437",
                    "reference_id": "RHSA-2022:0437",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0437"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0438",
                    "reference_id": "RHSA-2022:0438",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0438"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0439",
                    "reference_id": "RHSA-2022:0439",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0439"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0442",
                    "reference_id": "RHSA-2022:0442",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0442"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0444",
                    "reference_id": "RHSA-2022:0444",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0444"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0445",
                    "reference_id": "RHSA-2022:0445",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0445"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0446",
                    "reference_id": "RHSA-2022:0446",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0446"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0447",
                    "reference_id": "RHSA-2022:0447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0448",
                    "reference_id": "RHSA-2022:0448",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0448"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0449",
                    "reference_id": "RHSA-2022:0449",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0449"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0450",
                    "reference_id": "RHSA-2022:0450",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0450"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0467",
                    "reference_id": "RHSA-2022:0467",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0467"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0469",
                    "reference_id": "RHSA-2022:0469",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0469"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0475",
                    "reference_id": "RHSA-2022:0475",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0475"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0497",
                    "reference_id": "RHSA-2022:0497",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0497"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0507",
                    "reference_id": "RHSA-2022:0507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0524",
                    "reference_id": "RHSA-2022:0524",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0524"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0527",
                    "reference_id": "RHSA-2022:0527",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0527"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0553",
                    "reference_id": "RHSA-2022:0553",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0553"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0661",
                    "reference_id": "RHSA-2022:0661",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0661"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1296",
                    "reference_id": "RHSA-2022:1296",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1296"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1297",
                    "reference_id": "RHSA-2022:1297",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1297"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1299",
                    "reference_id": "RHSA-2022:1299",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1299"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5458",
                    "reference_id": "RHSA-2022:5458",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5458"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5459",
                    "reference_id": "RHSA-2022:5459",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5459"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5460",
                    "reference_id": "RHSA-2022:5460",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5460"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5856",
                    "reference_id": "RHSA-2024:5856",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5856"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5998-1/",
                    "reference_id": "USN-5998-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5998-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7590-1/",
                    "reference_id": "USN-7590-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7590-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-23305",
                "GHSA-65fg-84f6-3jq3"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9k99-jzq8-fyge"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/12208?format=api",
            "vulnerability_id": "VCID-bbq3-tx7c-yucn",
            "summary": "This advisory has been marked as False Positive and removed.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23307.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23307.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23307",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84292",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84288",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84287",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84265",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84268",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84273",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84256",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84249",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84227",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84208",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84226",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23307"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23307",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23307"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.apache.org/thread/rg4yyc89vs3dw6kpy3r92xop9loywyhh",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread/rg4yyc89vs3dw6kpy3r92xop9loywyhh"
                },
                {
                    "reference_url": "https://logging.apache.org/log4j/1.2/index.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://logging.apache.org/log4j/1.2/index.html"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujul2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004482",
                    "reference_id": "1004482",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004482"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041967",
                    "reference_id": "2041967",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041967"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23307",
                    "reference_id": "CVE-2022-23307",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23307"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-f7vh-qwp3-x37m",
                    "reference_id": "GHSA-f7vh-qwp3-x37m",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "CRITICAL",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-f7vh-qwp3-x37m"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0289",
                    "reference_id": "RHSA-2022:0289",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0289"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0290",
                    "reference_id": "RHSA-2022:0290",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0290"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0291",
                    "reference_id": "RHSA-2022:0291",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0291"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0294",
                    "reference_id": "RHSA-2022:0294",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0294"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0430",
                    "reference_id": "RHSA-2022:0430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0430"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0435",
                    "reference_id": "RHSA-2022:0435",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0435"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0436",
                    "reference_id": "RHSA-2022:0436",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0436"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0437",
                    "reference_id": "RHSA-2022:0437",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0437"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0438",
                    "reference_id": "RHSA-2022:0438",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0438"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0439",
                    "reference_id": "RHSA-2022:0439",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0439"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0442",
                    "reference_id": "RHSA-2022:0442",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0442"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0444",
                    "reference_id": "RHSA-2022:0444",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0444"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0445",
                    "reference_id": "RHSA-2022:0445",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0445"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0446",
                    "reference_id": "RHSA-2022:0446",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0446"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0447",
                    "reference_id": "RHSA-2022:0447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0448",
                    "reference_id": "RHSA-2022:0448",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0448"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0449",
                    "reference_id": "RHSA-2022:0449",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0449"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0450",
                    "reference_id": "RHSA-2022:0450",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0450"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0467",
                    "reference_id": "RHSA-2022:0467",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0467"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0469",
                    "reference_id": "RHSA-2022:0469",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0469"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0475",
                    "reference_id": "RHSA-2022:0475",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0475"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0497",
                    "reference_id": "RHSA-2022:0497",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0497"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0507",
                    "reference_id": "RHSA-2022:0507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0524",
                    "reference_id": "RHSA-2022:0524",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0524"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0527",
                    "reference_id": "RHSA-2022:0527",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0527"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0553",
                    "reference_id": "RHSA-2022:0553",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0553"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0661",
                    "reference_id": "RHSA-2022:0661",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0661"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1296",
                    "reference_id": "RHSA-2022:1296",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1296"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1297",
                    "reference_id": "RHSA-2022:1297",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1297"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1299",
                    "reference_id": "RHSA-2022:1299",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1299"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5458",
                    "reference_id": "RHSA-2022:5458",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5458"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5459",
                    "reference_id": "RHSA-2022:5459",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5459"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5460",
                    "reference_id": "RHSA-2022:5460",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5460"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5856",
                    "reference_id": "RHSA-2024:5856",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5856"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5998-1/",
                    "reference_id": "USN-5998-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5998-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7590-1/",
                    "reference_id": "USN-7590-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7590-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-23307",
                "GHSA-f7vh-qwp3-x37m"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bbq3-tx7c-yucn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/11944?format=api",
            "vulnerability_id": "VCID-r67p-yqg2-9bbq",
            "summary": "Improper Input Validation and Injection in Apache Log4j2\nApache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to an attack where an attacker with permission to modify the logging configuration file can construct a malicious configuration using a JDBC Appender with a data source referencing a JNDI URI which can execute remote code. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44832.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44832.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-44832",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.50589",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9785",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.53648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98001",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.53648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.53648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97993",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.53648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97991",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.53648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97999",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.53648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97982",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.53648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97987",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.53648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97989",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.53648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97976",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.53648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97979",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.53648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97981",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-44832"
                },
                {
                    "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-784507.pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-784507.pdf"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44832",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44832"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/apache/logging-log4j2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/logging-log4j2"
                },
                {
                    "reference_url": "https://issues.apache.org/jira/browse/LOG4J2-3293",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://issues.apache.org/jira/browse/LOG4J2-3293"
                },
                {
                    "reference_url": "https://lists.apache.org/thread/s1o5vlo78ypqxnzn6p8zf6t9shtq5143",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread/s1o5vlo78ypqxnzn6p8zf6t9shtq5143"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00036.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00036.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVV25FXL4FU5X6X5BSL7RLQ7T6F65MRA",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVV25FXL4FU5X6X5BSL7RLQ7T6F65MRA"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T57MPJUW3MA6QGWZRTMCHHMMPQNVKGFC",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T57MPJUW3MA6QGWZRTMCHHMMPQNVKGFC"
                },
                {
                    "reference_url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220104-0001",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220104-0001"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujan2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpujan2022.html"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujul2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2021/12/28/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2021/12/28/1"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002813",
                    "reference_id": "1002813",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002813"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035951",
                    "reference_id": "2035951",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035951"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44832",
                    "reference_id": "CVE-2021-44832",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44832"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-8489-44mv-ggj8",
                    "reference_id": "GHSA-8489-44mv-ggj8",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-8489-44mv-ggj8"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0083",
                    "reference_id": "RHSA-2022:0083",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0083"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0138",
                    "reference_id": "RHSA-2022:0138",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0138"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0181",
                    "reference_id": "RHSA-2022:0181",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0181"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0203",
                    "reference_id": "RHSA-2022:0203",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0203"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0205",
                    "reference_id": "RHSA-2022:0205",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0205"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0216",
                    "reference_id": "RHSA-2022:0216",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0216"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0222",
                    "reference_id": "RHSA-2022:0222",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0222"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0223",
                    "reference_id": "RHSA-2022:0223",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0223"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0225",
                    "reference_id": "RHSA-2022:0225",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0225"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0226",
                    "reference_id": "RHSA-2022:0226",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0226"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0227",
                    "reference_id": "RHSA-2022:0227",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0227"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0230",
                    "reference_id": "RHSA-2022:0230",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0230"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0236",
                    "reference_id": "RHSA-2022:0236",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0236"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0467",
                    "reference_id": "RHSA-2022:0467",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0467"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0485",
                    "reference_id": "RHSA-2022:0485",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0485"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0493",
                    "reference_id": "RHSA-2022:0493",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0493"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1296",
                    "reference_id": "RHSA-2022:1296",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1296"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1297",
                    "reference_id": "RHSA-2022:1297",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1297"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1299",
                    "reference_id": "RHSA-2022:1299",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1299"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5222-1/",
                    "reference_id": "USN-5222-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5222-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2021-44832",
                "GHSA-8489-44mv-ggj8"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r67p-yqg2-9bbq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/11891?format=api",
            "vulnerability_id": "VCID-sjuz-dd96-sqe3",
            "summary": "Uncontrolled Recursion\nThis advisory has been marked as a false positive.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45105.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45105.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-45105",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.70431",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98693",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.70431",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98692",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.70431",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98691",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.70431",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98688",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.70431",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98687",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.70431",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98685",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.71364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98716",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.71364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98709",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.71364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98713",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.71364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98708",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.71364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98717",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-45105"
                },
                {
                    "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf"
                },
                {
                    "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-501673.pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-501673.pdf"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45105",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45105"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00017.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00017.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ/"
                },
                {
                    "reference_url": "https://logging.apache.org/log4j/2.x/security.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://logging.apache.org/log4j/2.x/security.html"
                },
                {
                    "reference_url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032"
                },
                {
                    "reference_url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211218-0001",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211218-0001"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211218-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20211218-0001/"
                },
                {
                    "reference_url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
                },
                {
                    "reference_url": "https://www.debian.org/security/2021/dsa-5024",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.debian.org/security/2021/dsa-5024"
                },
                {
                    "reference_url": "https://www.kb.cert.org/vuls/id/930724",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.kb.cert.org/vuls/id/930724"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujan2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpujan2022.html"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujul2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
                },
                {
                    "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1541",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1541"
                },
                {
                    "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1541/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1541/"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2021/12/19/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2021/12/19/1"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1001891",
                    "reference_id": "1001891",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1001891"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034067",
                    "reference_id": "2034067",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034067"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45105",
                    "reference_id": "CVE-2021-45105",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45105"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-p6xc-xr62-6r2g",
                    "reference_id": "GHSA-p6xc-xr62-6r2g",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-p6xc-xr62-6r2g"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0026",
                    "reference_id": "RHSA-2022:0026",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0026"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0042",
                    "reference_id": "RHSA-2022:0042",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0042"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0043",
                    "reference_id": "RHSA-2022:0043",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0043"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0044",
                    "reference_id": "RHSA-2022:0044",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0044"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0047",
                    "reference_id": "RHSA-2022:0047",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0047"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0083",
                    "reference_id": "RHSA-2022:0083",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0083"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0203",
                    "reference_id": "RHSA-2022:0203",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0203"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0205",
                    "reference_id": "RHSA-2022:0205",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0205"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0216",
                    "reference_id": "RHSA-2022:0216",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0216"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0219",
                    "reference_id": "RHSA-2022:0219",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0219"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0222",
                    "reference_id": "RHSA-2022:0222",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0222"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0223",
                    "reference_id": "RHSA-2022:0223",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0223"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1296",
                    "reference_id": "RHSA-2022:1296",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1296"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1297",
                    "reference_id": "RHSA-2022:1297",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1297"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1299",
                    "reference_id": "RHSA-2022:1299",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1299"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1462",
                    "reference_id": "RHSA-2022:1462",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1462"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1463",
                    "reference_id": "RHSA-2022:1463",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1463"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1469",
                    "reference_id": "RHSA-2022:1469",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1469"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5203-1/",
                    "reference_id": "USN-5203-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5203-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5222-1/",
                    "reference_id": "USN-5222-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5222-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2021-45105",
                "GHSA-p6xc-xr62-6r2g"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sjuz-dd96-sqe3"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "10.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/eap7-log4j@2.17.1-1.redhat_00001.1%3Farch=el8eap"
}