Lookup for vulnerabilities affecting packages.

GET /api/vulnerabilities/16564?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/vulnerabilities/16564?format=api",
    "vulnerability_id": "VCID-6nrn-u58x-mben",
    "summary": "Memory leaks in code encrypting and verifying RSA payloads\nUsing crafted public RSA keys which are not compliant with SP 800-56B can cause a small memory leak when encrypting and verifying payloads.\n\nAn attacker can leverage this flaw to gradually erode available memory to the point where the host crashes for lack of resources. Upon restart the attacker would have to begin again, but nevertheless there is the potential to deny service.",
    "aliases": [
        {
            "alias": "CVE-2024-1394"
        },
        {
            "alias": "GHSA-78hx-gp6g-7mj6"
        }
    ],
    "fixed_packages": [
        {
            "url": "http://public2.vulnerablecode.io/api/packages/56065?format=api",
            "purl": "pkg:golang/github.com/golang-fips/openssl/v2@2.0.1",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:golang/github.com/golang-fips/openssl/v2@2.0.1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/56068?format=api",
            "purl": "pkg:golang/github.com/microsoft/go-crypto-openssl/openssl@0.2.9",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:golang/github.com/microsoft/go-crypto-openssl/openssl@0.2.9"
        }
    ],
    "affected_packages": [
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93835?format=api",
            "purl": "pkg:rpm/redhat/buildah@1:1.23.4-5.2.rhaos4.12?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/buildah@1:1.23.4-5.2.rhaos4.12%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93816?format=api",
            "purl": "pkg:rpm/redhat/buildah@1:1.29.1-2.2.rhaos4.13?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/buildah@1:1.29.1-2.2.rhaos4.13%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93846?format=api",
            "purl": "pkg:rpm/redhat/buildah@1:1.29.1-10.4.rhaos4.14?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/buildah@1:1.29.1-10.4.rhaos4.14%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93830?format=api",
            "purl": "pkg:rpm/redhat/buildah@1:1.29.1-20.3.rhaos4.15?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/buildah@1:1.29.1-20.3.rhaos4.15%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93814?format=api",
            "purl": "pkg:rpm/redhat/buildah@2:1.33.7-3?arch=el9_4",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/buildah@2:1.33.7-3%3Farch=el9_4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93860?format=api",
            "purl": "pkg:rpm/redhat/butane@0.16.0-2.2.rhaos4.12?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/butane@0.16.0-2.2.rhaos4.12%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93850?format=api",
            "purl": "pkg:rpm/redhat/butane@0.19.0-1.3.rhaos4.14?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/butane@0.19.0-1.3.rhaos4.14%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93870?format=api",
            "purl": "pkg:rpm/redhat/butane@0.19.0-1.4.rhaos4.14?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/butane@0.19.0-1.4.rhaos4.14%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93862?format=api",
            "purl": "pkg:rpm/redhat/butane@0.20.0-1.1.rhaos4.15?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/butane@0.20.0-1.1.rhaos4.15%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93837?format=api",
            "purl": "pkg:rpm/redhat/collectd-sensubility@0.2.1-3?arch=el9ost",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-5eck-adts-e3de"
                },
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                },
                {
                    "vulnerability": "VCID-7h9j-t7c8-9qfy"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/collectd-sensubility@0.2.1-3%3Farch=el9ost"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93855?format=api",
            "purl": "pkg:rpm/redhat/collectd-sensubility@0.2.1-3?arch=el8ost",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-5eck-adts-e3de"
                },
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                },
                {
                    "vulnerability": "VCID-7h9j-t7c8-9qfy"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/collectd-sensubility@0.2.1-3%3Farch=el8ost"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93868?format=api",
            "purl": "pkg:rpm/redhat/conmon@3:2.1.7-3.4.rhaos4.14?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/conmon@3:2.1.7-3.4.rhaos4.14%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93878?format=api",
            "purl": "pkg:rpm/redhat/containernetworking-plugins@1:1.0.1-6?arch=el9_0",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/containernetworking-plugins@1:1.0.1-6%3Farch=el9_0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93873?format=api",
            "purl": "pkg:rpm/redhat/containernetworking-plugins@1:1.4.0-1.1.rhaos4.12?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/containernetworking-plugins@1:1.4.0-1.1.rhaos4.12%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93858?format=api",
            "purl": "pkg:rpm/redhat/containernetworking-plugins@1:1.4.0-1.1.rhaos4.13?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/containernetworking-plugins@1:1.4.0-1.1.rhaos4.13%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93845?format=api",
            "purl": "pkg:rpm/redhat/containernetworking-plugins@1:1.4.0-1.2.rhaos4.14?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/containernetworking-plugins@1:1.4.0-1.2.rhaos4.14%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93831?format=api",
            "purl": "pkg:rpm/redhat/containernetworking-plugins@1:1.4.0-1.2.rhaos4.15?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/containernetworking-plugins@1:1.4.0-1.2.rhaos4.15%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93826?format=api",
            "purl": "pkg:rpm/redhat/containernetworking-plugins@1:1.4.0-1.3.rhaos4.14?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/containernetworking-plugins@1:1.4.0-1.3.rhaos4.14%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93876?format=api",
            "purl": "pkg:rpm/redhat/containernetworking-plugins@1:1.4.0-4?arch=el9_4",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/containernetworking-plugins@1:1.4.0-4%3Farch=el9_4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93823?format=api",
            "purl": "pkg:rpm/redhat/cri-o@1.25.3-5.2.rhaos4.12.git44a2cb2?arch=el9",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                },
                {
                    "vulnerability": "VCID-bq1t-9nnj-mkes"
                },
                {
                    "vulnerability": "VCID-f8ak-21d8-juff"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/cri-o@1.25.3-5.2.rhaos4.12.git44a2cb2%3Farch=el9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93849?format=api",
            "purl": "pkg:rpm/redhat/cri-o@1.26.5-11.1.rhaos4.13.git919cc6e?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/cri-o@1.26.5-11.1.rhaos4.13.git919cc6e%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93879?format=api",
            "purl": "pkg:rpm/redhat/cri-o@1.27.4-6.1.rhaos4.14.gitd09e4c0?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                },
                {
                    "vulnerability": "VCID-bq1t-9nnj-mkes"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/cri-o@1.27.4-6.1.rhaos4.14.gitd09e4c0%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93821?format=api",
            "purl": "pkg:rpm/redhat/cri-o@1.27.4-7.2.rhaos4.14.git082c52f?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/cri-o@1.27.4-7.2.rhaos4.14.git082c52f%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93875?format=api",
            "purl": "pkg:rpm/redhat/cri-o@1.28.4-8.rhaos4.15.git24f50b9?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                },
                {
                    "vulnerability": "VCID-bq1t-9nnj-mkes"
                },
                {
                    "vulnerability": "VCID-f8ak-21d8-juff"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/cri-o@1.28.4-8.rhaos4.15.git24f50b9%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93877?format=api",
            "purl": "pkg:rpm/redhat/cri-tools@1.25.0-2.2?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/cri-tools@1.25.0-2.2%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93818?format=api",
            "purl": "pkg:rpm/redhat/cri-tools@1.26.0-4.1?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/cri-tools@1.26.0-4.1%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93820?format=api",
            "purl": "pkg:rpm/redhat/cri-tools@1.27.0-3.1?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/cri-tools@1.27.0-3.1%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93812?format=api",
            "purl": "pkg:rpm/redhat/cri-tools@1.27.0-3.2?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/cri-tools@1.27.0-3.2%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93871?format=api",
            "purl": "pkg:rpm/redhat/cri-tools@1.28.0-3.1?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/cri-tools@1.28.0-3.1%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93334?format=api",
            "purl": "pkg:rpm/redhat/etcd@3.3.23-16?arch=el8ost",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-23k2-d1ex-abcn"
                },
                {
                    "vulnerability": "VCID-4c51-73a9-17f9"
                },
                {
                    "vulnerability": "VCID-5eck-adts-e3de"
                },
                {
                    "vulnerability": "VCID-5tae-75u6-pugf"
                },
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                },
                {
                    "vulnerability": "VCID-95zc-mxqu-tyfp"
                },
                {
                    "vulnerability": "VCID-a25b-3vep-y3gm"
                },
                {
                    "vulnerability": "VCID-aj2b-56uj-gkar"
                },
                {
                    "vulnerability": "VCID-x4ux-7vyz-eug9"
                },
                {
                    "vulnerability": "VCID-ybh3-wzu9-dued"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/etcd@3.3.23-16%3Farch=el8ost"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93335?format=api",
            "purl": "pkg:rpm/redhat/etcd@3.4.26-8?arch=el9ost",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-5eck-adts-e3de"
                },
                {
                    "vulnerability": "VCID-5tae-75u6-pugf"
                },
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                },
                {
                    "vulnerability": "VCID-7h9j-t7c8-9qfy"
                },
                {
                    "vulnerability": "VCID-aj2b-56uj-gkar"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/etcd@3.4.26-8%3Farch=el9ost"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93608?format=api",
            "purl": "pkg:rpm/redhat/golang@1.19.13-7?arch=el9_2",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                },
                {
                    "vulnerability": "VCID-aj2b-56uj-gkar"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/golang@1.19.13-7%3Farch=el9_2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93839?format=api",
            "purl": "pkg:rpm/redhat/golang@1.20.12-2?arch=el9_3",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/golang@1.20.12-2%3Farch=el9_3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93600?format=api",
            "purl": "pkg:rpm/redhat/golang@1.21.9-2?arch=el9_4",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-4psv-cefc-7kad"
                },
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                },
                {
                    "vulnerability": "VCID-86md-jx8m-1kck"
                },
                {
                    "vulnerability": "VCID-aj2b-56uj-gkar"
                },
                {
                    "vulnerability": "VCID-djny-bnab-ykaw"
                },
                {
                    "vulnerability": "VCID-h93z-zvkv-cyed"
                },
                {
                    "vulnerability": "VCID-wq29-hzz2-5beh"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/golang@1.21.9-2%3Farch=el9_4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93863?format=api",
            "purl": "pkg:rpm/redhat/go-toolset-1.19-golang@1.19.13-6?arch=el7_9",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/go-toolset-1.19-golang@1.19.13-6%3Farch=el7_9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93842?format=api",
            "purl": "pkg:rpm/redhat/grafana@9.2.10-8?arch=el9_3",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/grafana@9.2.10-8%3Farch=el9_3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93872?format=api",
            "purl": "pkg:rpm/redhat/grafana@9.2.10-8?arch=el8_9",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/grafana@9.2.10-8%3Farch=el8_9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93783?format=api",
            "purl": "pkg:rpm/redhat/grafana@9.2.10-16?arch=el9_4",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-271j-tym1-pkdr"
                },
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/grafana@9.2.10-16%3Farch=el9_4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93782?format=api",
            "purl": "pkg:rpm/redhat/grafana@9.2.10-16?arch=el8_10",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-271j-tym1-pkdr"
                },
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/grafana@9.2.10-16%3Farch=el8_10"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93811?format=api",
            "purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-2?arch=el9_4",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/grafana-pcp@5.1.1-2%3Farch=el9_4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93847?format=api",
            "purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-2?arch=el8_9",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/grafana-pcp@5.1.1-2%3Farch=el8_9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93809?format=api",
            "purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-2?arch=el9_3",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/grafana-pcp@5.1.1-2%3Farch=el9_3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93865?format=api",
            "purl": "pkg:rpm/redhat/gvisor-tap-vsock@6:0.7.3-4?arch=el9_4",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/gvisor-tap-vsock@6:0.7.3-4%3Farch=el9_4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93806?format=api",
            "purl": "pkg:rpm/redhat/ignition@2.14.0-5.2.rhaos4.12?arch=el9",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ignition@2.14.0-5.2.rhaos4.12%3Farch=el9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93867?format=api",
            "purl": "pkg:rpm/redhat/ignition@2.15.0-7.1.rhaos4.13?arch=el9",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ignition@2.15.0-7.1.rhaos4.13%3Farch=el9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93810?format=api",
            "purl": "pkg:rpm/redhat/ignition@2.16.2-2.1.rhaos4.14?arch=el9",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ignition@2.16.2-2.1.rhaos4.14%3Farch=el9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93834?format=api",
            "purl": "pkg:rpm/redhat/ignition@2.16.2-2.1.rhaos4.15?arch=el9",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ignition@2.16.2-2.1.rhaos4.15%3Farch=el9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93825?format=api",
            "purl": "pkg:rpm/redhat/ignition@2.16.2-2.2.rhaos4.14?arch=el9",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ignition@2.16.2-2.2.rhaos4.14%3Farch=el9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93815?format=api",
            "purl": "pkg:rpm/redhat/microshift@4.14.19-202403280926.p0.gc1f8861.assembly.4.14.19?arch=el9",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/microshift@4.14.19-202403280926.p0.gc1f8861.assembly.4.14.19%3Farch=el9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93851?format=api",
            "purl": "pkg:rpm/redhat/microshift@4.15.6-202403280951.p0.g94b1c2a.assembly.4.15.6?arch=el9",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/microshift@4.15.6-202403280951.p0.g94b1c2a.assembly.4.15.6%3Farch=el9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93595?format=api",
            "purl": "pkg:rpm/redhat/openshift@4.14.0-202404160939.p0.g7bee54d.assembly.stream?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                },
                {
                    "vulnerability": "VCID-aj2b-56uj-gkar"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openshift@4.14.0-202404160939.p0.g7bee54d.assembly.stream%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93824?format=api",
            "purl": "pkg:rpm/redhat/openshift4-aws-iso@4.14.0-202404151639.p0.gd2acdd5.assembly.stream?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openshift4-aws-iso@4.14.0-202404151639.p0.gd2acdd5.assembly.stream%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93861?format=api",
            "purl": "pkg:rpm/redhat/openshift-ansible@4.14.0-202404151639.p0.g81558cc.assembly.stream?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openshift-ansible@4.14.0-202404151639.p0.g81558cc.assembly.stream%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93843?format=api",
            "purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202403251017.p0.gd4c9e3c.assembly.stream?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openshift-clients@4.12.0-202403251017.p0.gd4c9e3c.assembly.stream%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93857?format=api",
            "purl": "pkg:rpm/redhat/openshift-clients@4.13.0-202404020737.p0.gd192e90.assembly.stream?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openshift-clients@4.13.0-202404020737.p0.gd192e90.assembly.stream%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93807?format=api",
            "purl": "pkg:rpm/redhat/openshift-clients@4.14.0-202403261640.p0.gf7b14a9.assembly.stream?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openshift-clients@4.14.0-202403261640.p0.gf7b14a9.assembly.stream%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93817?format=api",
            "purl": "pkg:rpm/redhat/openshift-clients@4.14.0-202404151639.p0.gf7b14a9.assembly.stream?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openshift-clients@4.14.0-202404151639.p0.gf7b14a9.assembly.stream%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93866?format=api",
            "purl": "pkg:rpm/redhat/openshift-clients@4.15.0-202403211240.p0.g62c4d45.assembly.stream?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openshift-clients@4.15.0-202403211240.p0.g62c4d45.assembly.stream%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93808?format=api",
            "purl": "pkg:rpm/redhat/openshift-kuryr@4.14.0-202404151639.p0.g8926a29.assembly.stream?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openshift-kuryr@4.14.0-202404151639.p0.g8926a29.assembly.stream%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/92560?format=api",
            "purl": "pkg:rpm/redhat/osbuild-composer@101-2?arch=el8_10",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                },
                {
                    "vulnerability": "VCID-hfxt-nnd8-dfc8"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/osbuild-composer@101-2%3Farch=el8_10"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/92368?format=api",
            "purl": "pkg:rpm/redhat/osbuild-composer@132-1?arch=el9",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                },
                {
                    "vulnerability": "VCID-d97y-w562-fkab"
                },
                {
                    "vulnerability": "VCID-rdqf-wp1t-j7b5"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/osbuild-composer@132-1%3Farch=el9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93869?format=api",
            "purl": "pkg:rpm/redhat/ose-aws-ecr-image-credential-provider@4.14.0-202403251040.p0.g607e2dd.assembly.stream?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ose-aws-ecr-image-credential-provider@4.14.0-202403251040.p0.g607e2dd.assembly.stream%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93852?format=api",
            "purl": "pkg:rpm/redhat/ose-aws-ecr-image-credential-provider@4.14.0-202404151639.p0.g607e2dd.assembly.stream?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ose-aws-ecr-image-credential-provider@4.14.0-202404151639.p0.g607e2dd.assembly.stream%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93854?format=api",
            "purl": "pkg:rpm/redhat/ose-aws-ecr-image-credential-provider@4.15.0-202403211549.p0.g2e3cca1.assembly.stream?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ose-aws-ecr-image-credential-provider@4.15.0-202403211549.p0.g2e3cca1.assembly.stream%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93840?format=api",
            "purl": "pkg:rpm/redhat/podman@2:4.2.0-4?arch=el9_0",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@2:4.2.0-4%3Farch=el9_0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93007?format=api",
            "purl": "pkg:rpm/redhat/podman@2:4.4.1-20?arch=el9_2",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                },
                {
                    "vulnerability": "VCID-fcfw-7u4r-ebf8"
                },
                {
                    "vulnerability": "VCID-k54u-rbhx-bbbu"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@2:4.4.1-20%3Farch=el9_2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93874?format=api",
            "purl": "pkg:rpm/redhat/podman@3:4.2.0-7.2.rhaos4.12?arch=el9",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@3:4.2.0-7.2.rhaos4.12%3Farch=el9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93822?format=api",
            "purl": "pkg:rpm/redhat/podman@3:4.4.1-5.2.rhaos4.13?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@3:4.4.1-5.2.rhaos4.13%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93819?format=api",
            "purl": "pkg:rpm/redhat/podman@3:4.4.1-11.3.rhaos4.14?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@3:4.4.1-11.3.rhaos4.14%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93836?format=api",
            "purl": "pkg:rpm/redhat/podman@3:4.4.1-11.4.rhaos4.14?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@3:4.4.1-11.4.rhaos4.14%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93844?format=api",
            "purl": "pkg:rpm/redhat/podman@3:4.4.1-21.1.rhaos4.15?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@3:4.4.1-21.1.rhaos4.15%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93838?format=api",
            "purl": "pkg:rpm/redhat/podman@4:4.9.4-5?arch=el9_4",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@4:4.9.4-5%3Farch=el9_4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93827?format=api",
            "purl": "pkg:rpm/redhat/receptor@1.4.5-1?arch=el9ap",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-5eck-adts-e3de"
                },
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/receptor@1.4.5-1%3Farch=el9ap"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93859?format=api",
            "purl": "pkg:rpm/redhat/receptor@1.4.5-1?arch=el8ap",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-5eck-adts-e3de"
                },
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/receptor@1.4.5-1%3Farch=el8ap"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93832?format=api",
            "purl": "pkg:rpm/redhat/runc@3:1.1.6-5.2.rhaos4.12?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/runc@3:1.1.6-5.2.rhaos4.12%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93829?format=api",
            "purl": "pkg:rpm/redhat/runc@4:1.1.12-1.1.rhaos4.13?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/runc@4:1.1.12-1.1.rhaos4.13%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93848?format=api",
            "purl": "pkg:rpm/redhat/runc@4:1.1.12-1.1.rhaos4.15?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/runc@4:1.1.12-1.1.rhaos4.15%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93880?format=api",
            "purl": "pkg:rpm/redhat/runc@4:1.1.12-1.2.rhaos4.14?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/runc@4:1.1.12-1.2.rhaos4.14%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93813?format=api",
            "purl": "pkg:rpm/redhat/runc@4:1.1.12-3?arch=el9_4",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/runc@4:1.1.12-3%3Farch=el9_4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93841?format=api",
            "purl": "pkg:rpm/redhat/skopeo@2:1.9.4-3.2.rhaos4.12?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/skopeo@2:1.9.4-3.2.rhaos4.12%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93856?format=api",
            "purl": "pkg:rpm/redhat/skopeo@2:1.11.2-2.2.rhaos4.13?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/skopeo@2:1.11.2-2.2.rhaos4.13%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93833?format=api",
            "purl": "pkg:rpm/redhat/skopeo@2:1.11.2-10.3.rhaos4.14?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/skopeo@2:1.11.2-10.3.rhaos4.14%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93853?format=api",
            "purl": "pkg:rpm/redhat/skopeo@2:1.11.2-10.4.rhaos4.14?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/skopeo@2:1.11.2-10.4.rhaos4.14%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93864?format=api",
            "purl": "pkg:rpm/redhat/skopeo@2:1.11.2-21.2.rhaos4.15?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/skopeo@2:1.11.2-21.2.rhaos4.15%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93828?format=api",
            "purl": "pkg:rpm/redhat/skopeo@2:1.14.3-3?arch=el9_4",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6nrn-u58x-mben"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/skopeo@2:1.14.3-3%3Farch=el9_4"
        }
    ],
    "references": [
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:1462",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:1462"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:1468",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:1468"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:1472",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:1472"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:1501",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:1501"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:1502",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:1502"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:1561",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:1561"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:1563",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:1563"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:1566",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:1566"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:1567",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:1567"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:1574",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:1574"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:1640",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:1640"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:1644",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:1644"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:1646",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:1646"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:1763",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:1763"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:1897",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:1897"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:2562",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:2562"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:2568",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:2568"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:2569",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:2569"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:2729",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:2729"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:2730",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:2730"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:2767",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:2767"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:3265",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:3265"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:3352",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:3352"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:4146",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:4146"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:4371",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:4371"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:4378",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:4378"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:4379",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:4379"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:4502",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:4502"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:4581",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:4581"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:4591",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:4591"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:4672",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:4672"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:4699",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:4699"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:4761",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:4761"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:4762",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:4762"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:4960",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:4960"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:5258",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:5258"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:5634",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:5634"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:7262",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:7262"
        },
        {
            "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1394.json",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                }
            ],
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1394.json"
        },
        {
            "reference_url": "https://access.redhat.com/security/cve/CVE-2024-1394",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://access.redhat.com/security/cve/CVE-2024-1394"
        },
        {
            "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-1394",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "0.01049",
                    "scoring_system": "epss",
                    "scoring_elements": "0.77487",
                    "published_at": "2026-04-07T12:55:00Z"
                },
                {
                    "value": "0.01049",
                    "scoring_system": "epss",
                    "scoring_elements": "0.77516",
                    "published_at": "2026-04-08T12:55:00Z"
                },
                {
                    "value": "0.01049",
                    "scoring_system": "epss",
                    "scoring_elements": "0.77506",
                    "published_at": "2026-04-04T12:55:00Z"
                },
                {
                    "value": "0.01049",
                    "scoring_system": "epss",
                    "scoring_elements": "0.77481",
                    "published_at": "2026-04-02T12:55:00Z"
                },
                {
                    "value": "0.01206",
                    "scoring_system": "epss",
                    "scoring_elements": "0.79019",
                    "published_at": "2026-04-26T12:55:00Z"
                },
                {
                    "value": "0.01206",
                    "scoring_system": "epss",
                    "scoring_elements": "0.78982",
                    "published_at": "2026-04-21T12:55:00Z"
                },
                {
                    "value": "0.01206",
                    "scoring_system": "epss",
                    "scoring_elements": "0.79012",
                    "published_at": "2026-04-24T12:55:00Z"
                },
                {
                    "value": "0.01379",
                    "scoring_system": "epss",
                    "scoring_elements": "0.80292",
                    "published_at": "2026-04-18T12:55:00Z"
                },
                {
                    "value": "0.01379",
                    "scoring_system": "epss",
                    "scoring_elements": "0.80281",
                    "published_at": "2026-04-11T12:55:00Z"
                },
                {
                    "value": "0.01379",
                    "scoring_system": "epss",
                    "scoring_elements": "0.80266",
                    "published_at": "2026-04-12T12:55:00Z"
                },
                {
                    "value": "0.01379",
                    "scoring_system": "epss",
                    "scoring_elements": "0.8026",
                    "published_at": "2026-04-13T12:55:00Z"
                },
                {
                    "value": "0.01379",
                    "scoring_system": "epss",
                    "scoring_elements": "0.8029",
                    "published_at": "2026-04-16T12:55:00Z"
                },
                {
                    "value": "0.01417",
                    "scoring_system": "epss",
                    "scoring_elements": "0.80698",
                    "published_at": "2026-05-09T12:55:00Z"
                },
                {
                    "value": "0.01417",
                    "scoring_system": "epss",
                    "scoring_elements": "0.80564",
                    "published_at": "2026-04-09T12:55:00Z"
                },
                {
                    "value": "0.01417",
                    "scoring_system": "epss",
                    "scoring_elements": "0.80639",
                    "published_at": "2026-04-29T12:55:00Z"
                },
                {
                    "value": "0.01417",
                    "scoring_system": "epss",
                    "scoring_elements": "0.80657",
                    "published_at": "2026-05-05T12:55:00Z"
                },
                {
                    "value": "0.01417",
                    "scoring_system": "epss",
                    "scoring_elements": "0.80678",
                    "published_at": "2026-05-07T12:55:00Z"
                }
            ],
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-1394"
        },
        {
            "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2262921",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2262921"
        },
        {
            "reference_url": "https://github.com/golang-fips/openssl",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://github.com/golang-fips/openssl"
        },
        {
            "reference_url": "https://github.com/golang-fips/openssl/commit/85d31d0d257ce842c8a1e63c4d230ae850348136",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://github.com/golang-fips/openssl/commit/85d31d0d257ce842c8a1e63c4d230ae850348136"
        },
        {
            "reference_url": "https://github.com/golang-fips/openssl/releases/tag/v2.0.1",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://github.com/golang-fips/openssl/releases/tag/v2.0.1"
        },
        {
            "reference_url": "https://github.com/golang-fips/openssl/security/advisories/GHSA-78hx-gp6g-7mj6",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://github.com/golang-fips/openssl/security/advisories/GHSA-78hx-gp6g-7mj6"
        },
        {
            "reference_url": "https://github.com/microsoft/go-crypto-openssl/commit/104fe7f6912788d2ad44602f77a0a0a62f1f259f",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://github.com/microsoft/go-crypto-openssl/commit/104fe7f6912788d2ad44602f77a0a0a62f1f259f"
        },
        {
            "reference_url": "https://github.com/microsoft/go-crypto-openssl/releases/tag/v0.2.9",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://github.com/microsoft/go-crypto-openssl/releases/tag/v0.2.9"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-1394",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-1394"
        },
        {
            "reference_url": "https://pkg.go.dev/vuln/GO-2024-2660",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://pkg.go.dev/vuln/GO-2024-2660"
        },
        {
            "reference_url": "https://vuln.go.dev/ID/GO-2024-2660.json",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:21:05Z/"
                }
            ],
            "url": "https://vuln.go.dev/ID/GO-2024-2660.json"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ansible_automation_platform",
            "reference_id": "cpe:/a:redhat:ansible_automation_platform",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ansible_automation_platform"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ansible_automation_platform:2.4::el8",
            "reference_id": "cpe:/a:redhat:ansible_automation_platform:2.4::el8",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ansible_automation_platform:2.4::el8"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ansible_automation_platform:2.4::el9",
            "reference_id": "cpe:/a:redhat:ansible_automation_platform:2.4::el9",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ansible_automation_platform:2.4::el9"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8",
            "reference_id": "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9",
            "reference_id": "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8",
            "reference_id": "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9",
            "reference_id": "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:certifications:1::el8",
            "reference_id": "cpe:/a:redhat:certifications:1::el8",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:certifications:1::el8"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:certifications:9",
            "reference_id": "cpe:/a:redhat:certifications:9",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:certifications:9"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:container_native_virtualization:4",
            "reference_id": "cpe:/a:redhat:container_native_virtualization:4",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:container_native_virtualization:4"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:devtools:2023::el7",
            "reference_id": "cpe:/a:redhat:devtools:2023::el7",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:devtools:2023::el7"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream",
            "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream",
            "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:network_bound_disk_encryption_tang:1",
            "reference_id": "cpe:/a:redhat:network_bound_disk_encryption_tang:1",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:network_bound_disk_encryption_tang:1"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ocp_tools",
            "reference_id": "cpe:/a:redhat:ocp_tools",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ocp_tools"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4",
            "reference_id": "cpe:/a:redhat:openshift:4",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.12::el8",
            "reference_id": "cpe:/a:redhat:openshift:4.12::el8",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.12::el8"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.12::el9",
            "reference_id": "cpe:/a:redhat:openshift:4.12::el9",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.12::el9"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.13::el8",
            "reference_id": "cpe:/a:redhat:openshift:4.13::el8",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.13::el8"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.13::el9",
            "reference_id": "cpe:/a:redhat:openshift:4.13::el9",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.13::el9"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.14::el8",
            "reference_id": "cpe:/a:redhat:openshift:4.14::el8",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.14::el8"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.14::el9",
            "reference_id": "cpe:/a:redhat:openshift:4.14::el9",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.14::el9"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.15::el8",
            "reference_id": "cpe:/a:redhat:openshift:4.15::el8",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.15::el8"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.15::el9",
            "reference_id": "cpe:/a:redhat:openshift:4.15::el9",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.15::el9"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_container_storage:4",
            "reference_id": "cpe:/a:redhat:openshift_container_storage:4",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_container_storage:4"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_data_foundation:4.16::el9",
            "reference_id": "cpe:/a:redhat:openshift_data_foundation:4.16::el9",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_data_foundation:4.16::el9"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_devspaces:3",
            "reference_id": "cpe:/a:redhat:openshift_devspaces:3",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_devspaces:3"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_gitops:1",
            "reference_id": "cpe:/a:redhat:openshift_gitops:1",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_gitops:1"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_pipelines:1",
            "reference_id": "cpe:/a:redhat:openshift_pipelines:1",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_pipelines:1"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_service_on_aws:1",
            "reference_id": "cpe:/a:redhat:openshift_service_on_aws:1",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_service_on_aws:1"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openstack:16.1",
            "reference_id": "cpe:/a:redhat:openstack:16.1",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openstack:16.1"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openstack:16.2",
            "reference_id": "cpe:/a:redhat:openstack:16.2",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openstack:16.2"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openstack:16.2::el8",
            "reference_id": "cpe:/a:redhat:openstack:16.2::el8",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openstack:16.2::el8"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openstack:17.1",
            "reference_id": "cpe:/a:redhat:openstack:17.1",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openstack:17.1"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openstack:17.1::el8",
            "reference_id": "cpe:/a:redhat:openstack:17.1::el8",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openstack:17.1::el8"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openstack:17.1::el9",
            "reference_id": "cpe:/a:redhat:openstack:17.1::el9",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openstack:17.1::el9"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openstack:18.0",
            "reference_id": "cpe:/a:redhat:openstack:18.0",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openstack:18.0"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream",
            "reference_id": "cpe:/a:redhat:rhel_e4s:9.0::appstream",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream",
            "reference_id": "cpe:/a:redhat:rhel_eus:9.2::appstream",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3",
            "reference_id": "cpe:/a:redhat:rhel_software_collections:3",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:serverless:1",
            "reference_id": "cpe:/a:redhat:serverless:1",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:serverless:1"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:service_interconnect:1",
            "reference_id": "cpe:/a:redhat:service_interconnect:1",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:service_interconnect:1"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3",
            "reference_id": "cpe:/a:redhat:storage:3",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7",
            "reference_id": "cpe:/o:redhat:enterprise_linux:7",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8",
            "reference_id": "cpe:/o:redhat:enterprise_linux:8",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9",
            "reference_id": "cpe:/o:redhat:enterprise_linux:9",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"
        }
    ],
    "weaknesses": [
        {
            "cwe_id": 400,
            "name": "Uncontrolled Resource Consumption",
            "description": "The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources."
        },
        {
            "cwe_id": 401,
            "name": "Missing Release of Memory after Effective Lifetime",
            "description": "The product does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory."
        }
    ],
    "exploits": [],
    "severity_range_score": "7.0 - 8.9",
    "exploitability": "0.5",
    "weighted_severity": "8.0",
    "risk_score": 4.0,
    "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6nrn-u58x-mben"
}