Lookup for vulnerable packages by Package URL.

GET /api/packages/928274?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/928274?format=api",
    "purl": "pkg:deb/debian/libpod@4.3.1%2Bds1-8%2Bdeb12u1?distro=bullseye",
    "type": "deb",
    "namespace": "debian",
    "name": "libpod",
    "version": "4.3.1+ds1-8+deb12u1",
    "qualifiers": {
        "distro": "bullseye"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52046?format=api",
            "vulnerability_id": "VCID-24f4-v4pk-g7bh",
            "summary": "Podman's default inheritable capabilities for linux container not empty\nA bug was found in Podman where containers were created with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2).\n\nThis bug did not affect the container security sandbox as the inheritable set never contained more capabilities than were included in the container's bounding set.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27649.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27649.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27649",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00489",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65529",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00489",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65501",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66055",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66008",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67641",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67688",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67686",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67654",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67589",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67675",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67655",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67676",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67664",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67629",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67662",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67677",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27649"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066568"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27649",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27649"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/containers/podman",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/podman"
                },
                {
                    "reference_url": "https://github.com/containers/podman/commit/aafa80918a245edcbdaceb1191d749570f1872d0",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/podman/commit/aafa80918a245edcbdaceb1191d749570f1872d0"
                },
                {
                    "reference_url": "https://github.com/containers/podman/releases/tag/v4.0.3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/podman/releases/tag/v4.0.3"
                },
                {
                    "reference_url": "https://github.com/containers/podman/security/advisories/GHSA-qvf8-p83w-v58j",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/podman/security/advisories/GHSA-qvf8-p83w-v58j"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KDETHL5XCT6RZN2BBNOCEXRZ2W3SFU3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KDETHL5XCT6RZN2BBNOCEXRZ2W3SFU3"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DLUJZV3HBP56ADXU6QH2V7RNYUPMVBXQ",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DLUJZV3HBP56ADXU6QH2V7RNYUPMVBXQ"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J5WPM42UR6XIBQNQPNQHM32X7S4LJTRX",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J5WPM42UR6XIBQNQPNQHM32X7S4LJTRX"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27649",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27649"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1020906",
                    "reference_id": "1020906",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1020906"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1407",
                    "reference_id": "RHSA-2022:1407",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1407"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1565",
                    "reference_id": "RHSA-2022:1565",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1565"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1566",
                    "reference_id": "RHSA-2022:1566",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1566"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1762",
                    "reference_id": "RHSA-2022:1762",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1762"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4651",
                    "reference_id": "RHSA-2022:4651",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4651"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4816",
                    "reference_id": "RHSA-2022:4816",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4816"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928284?format=api",
                    "purl": "pkg:deb/debian/libpod@3.0.1%2Bdfsg1-3%2Bdeb11u2?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@3.0.1%252Bdfsg1-3%252Bdeb11u2%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928276?format=api",
                    "purl": "pkg:deb/debian/libpod@3.0.1%2Bdfsg1-3%2Bdeb11u5?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@3.0.1%252Bdfsg1-3%252Bdeb11u5%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928285?format=api",
                    "purl": "pkg:deb/debian/libpod@3.4.6%2Bds1-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@3.4.6%252Bds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928274?format=api",
                    "purl": "pkg:deb/debian/libpod@4.3.1%2Bds1-8%2Bdeb12u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@4.3.1%252Bds1-8%252Bdeb12u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-27649",
                "GHSA-qvf8-p83w-v58j"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-24f4-v4pk-g7bh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57944?format=api",
            "vulnerability_id": "VCID-3zm9-mtqp-5qdt",
            "summary": "Podman Path Traversal Vulnerability leads to arbitrary file read/write\nA path traversal vulnerability has been discovered in podman before version 1.4.0 in the way it handles symlinks inside containers. An attacker who has compromised an existing container can cause arbitrary files on the host filesystem to be read/written when an administrator tries to copy a file from/to the container.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00001.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10152.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10152.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10152",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57926",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57967",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58023",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58025",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58042",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5802",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5803",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58029",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58006",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5797",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57986",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57969",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57888",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57972",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57991",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10152"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10152",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10152"
                },
                {
                    "reference_url": "https://github.com/containers/libpod",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/libpod"
                },
                {
                    "reference_url": "https://github.com/containers/libpod/blob/master/RELEASE_NOTES.md#140",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/libpod/blob/master/RELEASE_NOTES.md#140"
                },
                {
                    "reference_url": "https://github.com/containers/libpod/issues/3211",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/libpod/issues/3211"
                },
                {
                    "reference_url": "https://github.com/containers/libpod/pull/3214",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/libpod/pull/3214"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10152",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10152"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1715667",
                    "reference_id": "1715667",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1715667"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:1907",
                    "reference_id": "RHSA-2019:1907",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:1907"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928275?format=api",
                    "purl": "pkg:deb/debian/libpod@0?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@0%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928276?format=api",
                    "purl": "pkg:deb/debian/libpod@3.0.1%2Bdfsg1-3%2Bdeb11u5?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@3.0.1%252Bdfsg1-3%252Bdeb11u5%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928274?format=api",
                    "purl": "pkg:deb/debian/libpod@4.3.1%2Bds1-8%2Bdeb12u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@4.3.1%252Bds1-8%252Bdeb12u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2019-10152",
                "GHSA-rh5f-2w6r-q7vj"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3zm9-mtqp-5qdt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55682?format=api",
            "vulnerability_id": "VCID-75hs-t8bs-23e9",
            "summary": "Podman Symlink Vulnerability\nAn issue was discovered in Podman in libpod before 1.6.0. It resolves a symlink in the host context during a copy operation from the container to the host, because an undesired glob operation occurs. An attacker could create a container image containing particular symlinks that, when copied by a victim user to the host filesystem, may overwrite existing files with others from the host.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00040.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00040.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:4269",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2019:4269"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-18466.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-18466.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-18466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00839",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7477",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00839",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74767",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00839",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74761",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00839",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74681",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00839",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74801",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00839",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74773",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00839",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74649",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00839",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74695",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00839",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74725",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00839",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74735",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00839",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74727",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00839",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7469",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00839",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74644",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00839",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74698",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00839",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74719",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00839",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74648",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00839",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74674",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-18466"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1744588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1744588"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/containers/libpod",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/libpod"
                },
                {
                    "reference_url": "https://github.com/containers/libpod/commit/5c09c4d2947a759724f9d5aef6bac04317e03f7e",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/libpod/commit/5c09c4d2947a759724f9d5aef6bac04317e03f7e"
                },
                {
                    "reference_url": "https://github.com/containers/libpod/compare/v1.5.1...v1.6.0",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/libpod/compare/v1.5.1...v1.6.0"
                },
                {
                    "reference_url": "https://github.com/containers/libpod/issues/3829",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/libpod/issues/3829"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:P"
                        },
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18466"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpod_project:libpod:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:libpod_project:libpod:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpod_project:libpod:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1227",
                    "reference_id": "RHSA-2020:1227",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1227"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928275?format=api",
                    "purl": "pkg:deb/debian/libpod@0?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@0%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928276?format=api",
                    "purl": "pkg:deb/debian/libpod@3.0.1%2Bdfsg1-3%2Bdeb11u5?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@3.0.1%252Bdfsg1-3%252Bdeb11u5%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928274?format=api",
                    "purl": "pkg:deb/debian/libpod@4.3.1%2Bds1-8%2Bdeb12u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@4.3.1%252Bds1-8%252Bdeb12u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2019-18466",
                "GHSA-r34v-gqmw-qvgj"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-75hs-t8bs-23e9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48299?format=api",
            "vulnerability_id": "VCID-83z3-5q22-wycr",
            "summary": "Podman Origin Validation Error\nRootless containers run with Podman, receive all traffic with a source IP address of 127.0.0.1 (including from remote hosts). This impacts containerized applications that trust localhost (127.0.01) connections by default and do not require authentication. This issue affects Podman versions from 1.8.0 to 3.0.0.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20199.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20199.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20199",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00279",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51238",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00279",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51187",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00279",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51243",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00279",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5128",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00279",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51272",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00279",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51325",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00279",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51346",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00279",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51338",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00279",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51297",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00279",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51237",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00279",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51252",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00279",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51277",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00279",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51311",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00279",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51332",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00279",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51199",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00279",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51289",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00279",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51292",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20199"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919050",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919050"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20199",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20199"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/containers/podman/issues/5138",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/podman/issues/5138"
                },
                {
                    "reference_url": "https://github.com/containers/podman/pull/9052",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/podman/pull/9052"
                },
                {
                    "reference_url": "https://github.com/containers/podman/pull/9225",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/podman/pull/9225"
                },
                {
                    "reference_url": "https://github.com/containers/podman/releases/tag/v3.0.0-rc3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/podman/releases/tag/v3.0.0-rc3"
                },
                {
                    "reference_url": "https://github.com/rootless-containers/rootlesskit/pull/206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rootless-containers/rootlesskit/pull/206"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20199",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20199"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1517",
                    "reference_id": "AVG-1517",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1517"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1796",
                    "reference_id": "RHSA-2021:1796",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1796"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7954",
                    "reference_id": "RHSA-2022:7954",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7954"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928281?format=api",
                    "purl": "pkg:deb/debian/libpod@3.0.0~rc2%2Bdfsg1-2?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@3.0.0~rc2%252Bdfsg1-2%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928276?format=api",
                    "purl": "pkg:deb/debian/libpod@3.0.1%2Bdfsg1-3%2Bdeb11u5?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@3.0.1%252Bdfsg1-3%252Bdeb11u5%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928274?format=api",
                    "purl": "pkg:deb/debian/libpod@4.3.1%2Bds1-8%2Bdeb12u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@4.3.1%252Bds1-8%252Bdeb12u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2021-20199",
                "GHSA-grh6-q6m2-rh72"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-83z3-5q22-wycr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54832?format=api",
            "vulnerability_id": "VCID-artb-94uw-33c5",
            "summary": "Podman Elevated Container Privileges\nIt has been discovered that podman before version 0.6.1 does not drop capabilities when executing a container as a non-root user. This results in unnecessary privileges being granted to the container.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2037",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2037"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10856.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10856.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10856",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44086",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44083",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44159",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44212",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43953",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43877",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44001",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4418",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44186",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44209",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44141",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44192",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44196",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44121",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4423",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4424",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10856"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10856",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10856"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/containers/podman",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/podman"
                },
                {
                    "reference_url": "https://github.com/projectatomic/libpod/commit/bae80a0b663925ec751ad2784ca32989403cdc24",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/projectatomic/libpod/commit/bae80a0b663925ec751ad2784ca32989403cdc24"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10856",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:P/I:P/A:P"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10856"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1592166",
                    "reference_id": "1592166",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1592166"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpod_project:libpod:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:libpod_project:libpod:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpod_project:libpod:*:*:*:*:*:*:*:*"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928275?format=api",
                    "purl": "pkg:deb/debian/libpod@0?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@0%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928276?format=api",
                    "purl": "pkg:deb/debian/libpod@3.0.1%2Bdfsg1-3%2Bdeb11u5?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@3.0.1%252Bdfsg1-3%252Bdeb11u5%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928274?format=api",
                    "purl": "pkg:deb/debian/libpod@4.3.1%2Bds1-8%2Bdeb12u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@4.3.1%252Bds1-8%252Bdeb12u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2018-10856",
                "GHSA-wp7w-vx86-vj9h"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-artb-94uw-33c5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/13218?format=api",
            "vulnerability_id": "VCID-ckg3-5czq-t7ek",
            "summary": "Information disclosure in podman\nAn information disclosure vulnerability was found in containers/podman in versions before 2.0.5. When using the deprecated Varlink API or the Docker-compatible REST API, if multiple containers are created in a short duration, the environment variables from the first container will get leaked into subsequent containers. An attacker who has control over the subsequent containers could use this flaw to gain access to sensitive information stored in such variables.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14370.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14370.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3888",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38808",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38934",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39374",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39351",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39288",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39016",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39035",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39251",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39338",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39366",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39314",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39332",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39371",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39164",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3936",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39343",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14370"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874268",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874268"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14370"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/containers/podman",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/podman"
                },
                {
                    "reference_url": "https://github.com/containers/podman/commit/a7e864e6e7de894d4edde4fff00e53dc6a0b5074",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/podman/commit/a7e864e6e7de894d4edde4fff00e53dc6a0b5074"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G6BPCZX4ASKNONL3MSCK564IVXNYSKLP",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G6BPCZX4ASKNONL3MSCK564IVXNYSKLP"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y74V7HGQBNLT6XECCSNZNFZIB7G7XSAR",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y74V7HGQBNLT6XECCSNZNFZIB7G7XSAR"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4Y2FSGQWP4AFT5AZ6UBN6RKHVXUBRFV",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4Y2FSGQWP4AFT5AZ6UBN6RKHVXUBRFV"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14370"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202009-11",
                    "reference_id": "ASA-202009-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202009-11"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1233",
                    "reference_id": "AVG-1233",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1233"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4297",
                    "reference_id": "RHSA-2020:4297",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4297"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5056",
                    "reference_id": "RHSA-2020:5056",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5056"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0531",
                    "reference_id": "RHSA-2021:0531",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0531"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928278?format=api",
                    "purl": "pkg:deb/debian/libpod@2.0.6%2Bdfsg1-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@2.0.6%252Bdfsg1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928276?format=api",
                    "purl": "pkg:deb/debian/libpod@3.0.1%2Bdfsg1-3%2Bdeb11u5?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@3.0.1%252Bdfsg1-3%252Bdeb11u5%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928274?format=api",
                    "purl": "pkg:deb/debian/libpod@4.3.1%2Bds1-8%2Bdeb12u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@4.3.1%252Bds1-8%252Bdeb12u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2020-14370",
                "GHSA-c3wv-qmjj-45r6"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ckg3-5czq-t7ek"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55876?format=api",
            "vulnerability_id": "VCID-d9r8-53zf-vqbr",
            "summary": "Podman has Files or Directories Accessible to External Parties\nA flaw was discovered in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only. When a user runs a malicious container or a container based on a malicious image with an attached volume that is used for the first time, it is possible to trigger the flaw and overwrite files in the volume. This issue was introduced in version 1.6.0.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00097.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00097.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00103.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00103.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0680",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0680"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1650",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1650"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1726.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1726.json"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2020-1726",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2020-1726"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1726",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3676",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37242",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37209",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37182",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37228",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37211",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37154",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36929",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36897",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3681",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36692",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37144",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37313",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37338",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37166",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37218",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37232",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1726"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1801152",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1801152"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1726",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1726"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1726",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1726"
                },
                {
                    "reference_url": "https://github.com/containers/podman",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/podman"
                },
                {
                    "reference_url": "https://github.com/containers/podman/commit/c140ecdc9b416ab4efd4d21d14acd63b6adbdd42",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/podman/commit/c140ecdc9b416ab4efd4d21d14acd63b6adbdd42"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1726",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1726"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961421",
                    "reference_id": "961421",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961421"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928279?format=api",
                    "purl": "pkg:deb/debian/libpod@1.6.4%2Bdfsg1-3?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@1.6.4%252Bdfsg1-3%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928276?format=api",
                    "purl": "pkg:deb/debian/libpod@3.0.1%2Bdfsg1-3%2Bdeb11u5?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@3.0.1%252Bdfsg1-3%252Bdeb11u5%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928274?format=api",
                    "purl": "pkg:deb/debian/libpod@4.3.1%2Bds1-8%2Bdeb12u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@4.3.1%252Bds1-8%252Bdeb12u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2020-1726",
                "GHSA-vmhj-p9hw-vgrf"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d9r8-53zf-vqbr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31520?format=api",
            "vulnerability_id": "VCID-gzfd-vguv-dqa1",
            "summary": "Podman Time-of-check Time-of-use (TOCTOU) Race Condition\nA Time-of-check Time-of-use (TOCTOU) flaw was found in podman. This issue may allow a malicious user to replace a normal file in a volume with a symlink while exporting the volume, allowing for access to arbitrary files on the host file system.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0778.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0778.json"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2023-0778",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2023-0778"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0778",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26532",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26484",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26542",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26587",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26581",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26634",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26678",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26463",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29514",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29541",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34651",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34884",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34631",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00157",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36059",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00157",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36127",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00157",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36176",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0778"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168256",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-24T17:25:23Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168256"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/containers/podman",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/podman"
                },
                {
                    "reference_url": "https://github.com/containers/podman/commit/6ca857feb07a5fdc96fd947afef03916291673d8",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/podman/commit/6ca857feb07a5fdc96fd947afef03916291673d8"
                },
                {
                    "reference_url": "https://github.com/containers/podman/pull/17528",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/podman/pull/17528"
                },
                {
                    "reference_url": "https://github.com/containers/podman/pull/17532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/podman/pull/17532"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0778",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0778"
                },
                {
                    "reference_url": "https://pkg.go.dev/vuln/GO-2023-1681",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://pkg.go.dev/vuln/GO-2023-1681"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032099",
                    "reference_id": "1032099",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032099"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202407-12",
                    "reference_id": "GLSA-202407-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202407-12"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:1325",
                    "reference_id": "RHSA-2023:1325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:1325"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2758",
                    "reference_id": "RHSA-2023:2758",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2758"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2802",
                    "reference_id": "RHSA-2023:2802",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2802"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928275?format=api",
                    "purl": "pkg:deb/debian/libpod@0?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@0%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928276?format=api",
                    "purl": "pkg:deb/debian/libpod@3.0.1%2Bdfsg1-3%2Bdeb11u5?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@3.0.1%252Bdfsg1-3%252Bdeb11u5%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928287?format=api",
                    "purl": "pkg:deb/debian/libpod@4.3.1%2Bds1-7?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@4.3.1%252Bds1-7%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928274?format=api",
                    "purl": "pkg:deb/debian/libpod@4.3.1%2Bds1-8%2Bdeb12u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@4.3.1%252Bds1-8%252Bdeb12u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2023-0778",
                "GHSA-qwqv-rqgf-8qh8"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gzfd-vguv-dqa1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52550?format=api",
            "vulnerability_id": "VCID-mzjw-b6mh-nugs",
            "summary": "Exposure of Sensitive Information to an Unauthorized Actor and Origin Validation Error in podman\nA flaw was found in podman. The `podman machine` function (used to create and manage Podman virtual machine containing a Podman process) spawns a `gvproxy` process on the host system. The `gvproxy` API is accessible on port 7777 on all IP addresses on the host. If that port is open on the host's firewall, an attacker can potentially use the `gvproxy` API to forward ports on the host to ports in the VM, making private services on the VM accessible to the network. This issue could be also used to interrupt the host's services by forwarding all ports to the VM.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4024.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4024.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4024",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26197",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2649",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26539",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26546",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26499",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26442",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26449",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26419",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26383",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26318",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26311",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26259",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26131",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26541",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26592",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26636",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26421",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4024"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026675,",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026675,"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/containers/podman",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/podman"
                },
                {
                    "reference_url": "https://github.com/containers/podman/releases/tag/v3.4.3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/podman/releases/tag/v3.4.3"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QFFVJ6S3ZRMPDYB7KYAWEMDHXFZYQPU3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QFFVJ6S3ZRMPDYB7KYAWEMDHXFZYQPU3"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4024",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4024"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1000844",
                    "reference_id": "1000844",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1000844"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026675",
                    "reference_id": "2026675",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026675"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2591",
                    "reference_id": "AVG-2591",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2591"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202407-12",
                    "reference_id": "GLSA-202407-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202407-12"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7954",
                    "reference_id": "RHSA-2022:7954",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7954"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10289",
                    "reference_id": "RHSA-2024:10289",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10289"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928275?format=api",
                    "purl": "pkg:deb/debian/libpod@0?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@0%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928276?format=api",
                    "purl": "pkg:deb/debian/libpod@3.0.1%2Bdfsg1-3%2Bdeb11u5?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@3.0.1%252Bdfsg1-3%252Bdeb11u5%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928282?format=api",
                    "purl": "pkg:deb/debian/libpod@3.4.3%2Bds1-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@3.4.3%252Bds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928274?format=api",
                    "purl": "pkg:deb/debian/libpod@4.3.1%2Bds1-8%2Bdeb12u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@4.3.1%252Bds1-8%252Bdeb12u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2021-4024",
                "GHSA-3cf2-x423-x582"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mzjw-b6mh-nugs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48535?format=api",
            "vulnerability_id": "VCID-pgjv-k7e2-9qde",
            "summary": "Improper Authorization in github.com/containers/libpod\nA flaw was found in podman before 1.7.0. File permissions for non-root users running in a privileged container are not correctly checked. This flaw can be abused by a low-privileged user inside the container to access any other file in the container, even if owned by the root user inside the container. It does not allow to directly escape the container, though being a privileged container means that a lot of security features are disabled when running the container. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20188.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20188.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20188",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24508",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24765",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24778",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24737",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2468",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24693",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24685",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24664",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24608",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24596",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24553",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24431",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24761",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24837",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24876",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2465",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24718",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20188"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20188",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20188"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/containers/podman/commit/2c7b579fe7328dc6db48bdaf60d0ddd9136b1e24",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/podman/commit/2c7b579fe7328dc6db48bdaf60d0ddd9136b1e24"
                },
                {
                    "reference_url": "https://github.com/containers/podman/commit/c8bd4746151e6ae37d49c4688f2f64e03db429fc",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/podman/commit/c8bd4746151e6ae37d49c4688f2f64e03db429fc"
                },
                {
                    "reference_url": "https://github.com/containers/podman/commit/dcf3c742b1ac4d641d66810113f3d17441a412f4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/podman/commit/dcf3c742b1ac4d641d66810113f3d17441a412f4"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20188",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20188"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3053",
                    "reference_id": "RHSA-2020:3053",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3053"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0681",
                    "reference_id": "RHSA-2021:0681",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0681"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0705",
                    "reference_id": "RHSA-2021:0705",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0705"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0706",
                    "reference_id": "RHSA-2021:0706",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0706"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0710",
                    "reference_id": "RHSA-2021:0710",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0710"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928280?format=api",
                    "purl": "pkg:deb/debian/libpod@2.0.2%2Bdfsg1-3?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@2.0.2%252Bdfsg1-3%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928276?format=api",
                    "purl": "pkg:deb/debian/libpod@3.0.1%2Bdfsg1-3%2Bdeb11u5?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@3.0.1%252Bdfsg1-3%252Bdeb11u5%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928274?format=api",
                    "purl": "pkg:deb/debian/libpod@4.3.1%2Bds1-8%2Bdeb12u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@4.3.1%252Bds1-8%252Bdeb12u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2021-20188",
                "GHSA-9h63-7qf6-mv6r"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pgjv-k7e2-9qde"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52019?format=api",
            "vulnerability_id": "VCID-tgmf-r176-juce",
            "summary": "Podman publishes a malicious image to public registries\nPodman is a tool for managing OCI containers and pods. A privilege escalation flaw was found in Podman. This flaw allows an attacker to publish a malicious image to a public registry. Once this image is downloaded by a potential victim, the vulnerability is triggered after a user runs the 'podman top' command. This action gives the attacker access to the host filesystem, leading to information disclosure or denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1227.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1227.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1227",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.33719",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96974",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.33719",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9697",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.33719",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96966",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.33719",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96916",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.33719",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96954",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.33719",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96947",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.33719",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96946",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.33719",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96945",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.33719",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96943",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.33719",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96941",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.33719",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96932",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.33719",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96929",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.33719",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96924",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.33719",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96963",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.33719",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96961",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.33719",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96958",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1227"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2070368",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2070368"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1227",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1227"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/containers/podman",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/podman"
                },
                {
                    "reference_url": "https://github.com/containers/podman/issues/10941",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/podman/issues/10941"
                },
                {
                    "reference_url": "https://github.com/containers/podman/pull/13862",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/podman/pull/13862"
                },
                {
                    "reference_url": "https://github.com/containers/podman/pull/13862/commits/79a3e149c10f74db4cebff624287385c90179d09",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/podman/pull/13862/commits/79a3e149c10f74db4cebff624287385c90179d09"
                },
                {
                    "reference_url": "https://github.com/containers/psgo/pull/92",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/psgo/pull/92"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DLUJZV3HBP56ADXU6QH2V7RNYUPMVBXQ",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DLUJZV3HBP56ADXU6QH2V7RNYUPMVBXQ"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DLUJZV3HBP56ADXU6QH2V7RNYUPMVBXQ",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DLUJZV3HBP56ADXU6QH2V7RNYUPMVBXQ"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1227",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1227"
                },
                {
                    "reference_url": "https://pkg.go.dev/vuln/GO-2022-0558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://pkg.go.dev/vuln/GO-2022-0558"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240628-0001",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240628-0001"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1020907",
                    "reference_id": "1020907",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1020907"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1762",
                    "reference_id": "RHSA-2022:1762",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1762"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:2143",
                    "reference_id": "RHSA-2022:2143",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:2143"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:2190",
                    "reference_id": "RHSA-2022:2190",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:2190"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:2263",
                    "reference_id": "RHSA-2022:2263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:2263"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4651",
                    "reference_id": "RHSA-2022:4651",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4651"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4816",
                    "reference_id": "RHSA-2022:4816",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4816"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5622",
                    "reference_id": "RHSA-2022:5622",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5622"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928284?format=api",
                    "purl": "pkg:deb/debian/libpod@3.0.1%2Bdfsg1-3%2Bdeb11u2?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@3.0.1%252Bdfsg1-3%252Bdeb11u2%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928276?format=api",
                    "purl": "pkg:deb/debian/libpod@3.0.1%2Bdfsg1-3%2Bdeb11u5?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@3.0.1%252Bdfsg1-3%252Bdeb11u5%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928283?format=api",
                    "purl": "pkg:deb/debian/libpod@3.4.7%2Bds1-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@3.4.7%252Bds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928274?format=api",
                    "purl": "pkg:deb/debian/libpod@4.3.1%2Bds1-8%2Bdeb12u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@4.3.1%252Bds1-8%252Bdeb12u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-1227",
                "GHSA-66vw-v2x9-hw75"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tgmf-r176-juce"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52422?format=api",
            "vulnerability_id": "VCID-ttsj-3bd1-tfhu",
            "summary": "Podman's incorrect handling of the supplementary groups may lead to data disclosure, modification\nAn incorrect handling of the supplementary groups in the Podman container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7822",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7822"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8008",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8008"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8431",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8431"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2989.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2989.json"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2022-2989",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2022-2989"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2989",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14206",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14261",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14217",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14091",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13934",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14062",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14179",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14203",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1417",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14095",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14096",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14354",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14346",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.143",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1441",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2989"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2121445",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-05T18:14:40Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2121445"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2989",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2989"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/containers/podman",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/podman"
                },
                {
                    "reference_url": "https://github.com/containers/podman/pull/15618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/podman/pull/15618"
                },
                {
                    "reference_url": "https://github.com/containers/podman/pull/15677",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/podman/pull/15677"
                },
                {
                    "reference_url": "https://github.com/containers/podman/pull/15696",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/podman/pull/15696"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2989",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2989"
                },
                {
                    "reference_url": "https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1019591",
                    "reference_id": "1019591",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1019591"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202407-12",
                    "reference_id": "GLSA-202407-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202407-12"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2802",
                    "reference_id": "RHSA-2023:2802",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2802"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3613",
                    "reference_id": "RHSA-2023:3613",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3613"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6295-1/",
                    "reference_id": "USN-6295-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6295-1/"
                },
                {
                    "reference_url": "https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/",
                    "reference_id": "vulnerability-in-linux-containers-investigation-and-mitigation",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-05T18:14:40Z/"
                        }
                    ],
                    "url": "https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928276?format=api",
                    "purl": "pkg:deb/debian/libpod@3.0.1%2Bdfsg1-3%2Bdeb11u5?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@3.0.1%252Bdfsg1-3%252Bdeb11u5%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928286?format=api",
                    "purl": "pkg:deb/debian/libpod@4.3.1%2Bds1-4?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@4.3.1%252Bds1-4%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928274?format=api",
                    "purl": "pkg:deb/debian/libpod@4.3.1%2Bds1-8%2Bdeb12u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@4.3.1%252Bds1-8%252Bdeb12u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-2989",
                "GHSA-4wjj-jwc9-2x96"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ttsj-3bd1-tfhu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/30118?format=api",
            "vulnerability_id": "VCID-tuub-p4f4-nqer",
            "summary": "Podman Improper Certificate Validation; machine missing TLS verification\n### Impact\nThe podman machine init command fails to verify the TLS certificate when downloading the VM images from an OCI registry (which it does by default since 5.0.0) allowing a possible Man In The Middle attack.\n\n### Patches\nhttps://github.com/containers/podman/commit/726b506acc8a00d99f1a3a1357ecf619a1f798c3\nFixed in v5.5.2\n\n### Workarounds\nDownload the disk image manually via some other tool that verifies the TLS connection. Then pass the local image as file path (podman machine init --image ./somepath)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-24T14:11:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10295"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10549",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-24T14:11:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10549"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-24T14:11:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10550"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10551",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-24T14:11:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10551"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10668",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-24T14:11:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10668"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:11359",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-24T14:11:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2025:11359"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:11363",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-24T14:11:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2025:11363"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:11677",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-24T14:11:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2025:11677"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:11681",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-24T14:11:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2025:11681"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:15397",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-24T14:11:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2025:15397"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:9726",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-24T14:11:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2025:9726"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:9751",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-24T14:11:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2025:9751"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:9766",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-24T14:11:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2025:9766"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6032.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6032.json"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2025-6032",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-24T14:11:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2025-6032"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-6032",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2134",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21093",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21173",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21233",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21287",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22552",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22592",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22498",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22513",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22508",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4507",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45122",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4521",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45033",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45129",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44968",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-6032"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372501",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-24T14:11:17Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372501"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/containers/podman",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/containers/podman"
                },
                {
                    "reference_url": "https://github.com/containers/podman/commit/726b506acc8a00d99f1a3a1357ecf619a1f798c3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-24T14:11:17Z/"
                        }
                    ],
                    "url": "https://github.com/containers/podman/commit/726b506acc8a00d99f1a3a1357ecf619a1f798c3"
                },
                {
                    "reference_url": "https://github.com/containers/podman/security/advisories/GHSA-65gg-3w2w-hr4h",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-24T14:11:17Z/"
                        }
                    ],
                    "url": "https://github.com/containers/podman/security/advisories/GHSA-65gg-3w2w-hr4h"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6032",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6032"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108473",
                    "reference_id": "1108473",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108473"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4",
                    "reference_id": "cpe:/a:redhat:openshift:4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.16::el8",
                    "reference_id": "cpe:/a:redhat:openshift:4.16::el8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.16::el8"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.16::el9",
                    "reference_id": "cpe:/a:redhat:openshift:4.16::el9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.16::el9"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.17::el8",
                    "reference_id": "cpe:/a:redhat:openshift:4.17::el8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.17::el8"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.17::el9",
                    "reference_id": "cpe:/a:redhat:openshift:4.17::el9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.17::el9"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.18::el8",
                    "reference_id": "cpe:/a:redhat:openshift:4.18::el8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.18::el8"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.18::el9",
                    "reference_id": "cpe:/a:redhat:openshift:4.18::el9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.18::el9"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.19::el9",
                    "reference_id": "cpe:/a:redhat:openshift:4.19::el9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.19::el9"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.20::el9",
                    "reference_id": "cpe:/a:redhat:openshift:4.20::el9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.20::el9"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream",
                    "reference_id": "cpe:/a:redhat:rhel_eus:9.4::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:10.0",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928275?format=api",
                    "purl": "pkg:deb/debian/libpod@0?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@0%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928276?format=api",
                    "purl": "pkg:deb/debian/libpod@3.0.1%2Bdfsg1-3%2Bdeb11u5?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@3.0.1%252Bdfsg1-3%252Bdeb11u5%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928274?format=api",
                    "purl": "pkg:deb/debian/libpod@4.3.1%2Bds1-8%2Bdeb12u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@4.3.1%252Bds1-8%252Bdeb12u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2025-6032",
                "GHSA-65gg-3w2w-hr4h"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tuub-p4f4-nqer"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82489?format=api",
            "vulnerability_id": "VCID-zudh-x32u-83by",
            "summary": "podman: Privilege escalation in API component",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-25067.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-25067.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-25067",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74079",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74084",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74111",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74083",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74116",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74131",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74152",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74134",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74128",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74166",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74175",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74201",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74209",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74208",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74202",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74229",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-25067"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25067",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25067"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2097406",
                    "reference_id": "2097406",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2097406"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928277?format=api",
                    "purl": "pkg:deb/debian/libpod@3.0.0%2Bdfsg1-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@3.0.0%252Bdfsg1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928276?format=api",
                    "purl": "pkg:deb/debian/libpod@3.0.1%2Bdfsg1-3%2Bdeb11u5?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@3.0.1%252Bdfsg1-3%252Bdeb11u5%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/928274?format=api",
                    "purl": "pkg:deb/debian/libpod@4.3.1%2Bds1-8%2Bdeb12u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@4.3.1%252Bds1-8%252Bdeb12u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2019-25067"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zudh-x32u-83by"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libpod@4.3.1%252Bds1-8%252Bdeb12u1%3Fdistro=bullseye"
}