Lookup for vulnerabilities affecting packages.

GET /api/vulnerabilities/36645?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36645?format=api",
    "vulnerability_id": "VCID-k4dy-pv3f-4qas",
    "summary": "Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.",
    "aliases": [
        {
            "alias": "CVE-2022-30629"
        }
    ],
    "fixed_packages": [
        {
            "url": "http://public2.vulnerablecode.io/api/packages/434505?format=api",
            "purl": "pkg:apk/alpine/go@1.18.4-r0?arch=x86&distroversion=v3.16&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/go@1.18.4-r0%3Farch=x86&distroversion=v3.16&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/434500?format=api",
            "purl": "pkg:apk/alpine/go@1.18.4-r0?arch=aarch64&distroversion=v3.16&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/go@1.18.4-r0%3Farch=aarch64&distroversion=v3.16&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/434501?format=api",
            "purl": "pkg:apk/alpine/go@1.18.4-r0?arch=armhf&distroversion=v3.16&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/go@1.18.4-r0%3Farch=armhf&distroversion=v3.16&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/434504?format=api",
            "purl": "pkg:apk/alpine/go@1.18.4-r0?arch=s390x&distroversion=v3.16&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/go@1.18.4-r0%3Farch=s390x&distroversion=v3.16&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/434503?format=api",
            "purl": "pkg:apk/alpine/go@1.18.4-r0?arch=ppc64le&distroversion=v3.16&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/go@1.18.4-r0%3Farch=ppc64le&distroversion=v3.16&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/434506?format=api",
            "purl": "pkg:apk/alpine/go@1.18.4-r0?arch=x86_64&distroversion=v3.16&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/go@1.18.4-r0%3Farch=x86_64&distroversion=v3.16&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/434502?format=api",
            "purl": "pkg:apk/alpine/go@1.18.4-r0?arch=armv7&distroversion=v3.16&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/go@1.18.4-r0%3Farch=armv7&distroversion=v3.16&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/74527?format=api",
            "purl": "pkg:ebuild/dev-lang/go@1.18.5",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/go@1.18.5"
        }
    ],
    "affected_packages": [
        {
            "url": "http://public2.vulnerablecode.io/api/packages/97506?format=api",
            "purl": "pkg:rpm/redhat/buildah@1:1.29.1-1?arch=el9",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-5kkq-5jpf-fqev"
                },
                {
                    "vulnerability": "VCID-k4dy-pv3f-4qas"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/buildah@1:1.29.1-1%3Farch=el9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/98442?format=api",
            "purl": "pkg:rpm/redhat/butane@0.15.0-2.rhaos4.11?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-k4dy-pv3f-4qas"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/butane@0.15.0-2.rhaos4.11%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/97510?format=api",
            "purl": "pkg:rpm/redhat/containernetworking-plugins@1:1.2.0-1?arch=el9",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-5kkq-5jpf-fqev"
                },
                {
                    "vulnerability": "VCID-k4dy-pv3f-4qas"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/containernetworking-plugins@1:1.2.0-1%3Farch=el9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/98435?format=api",
            "purl": "pkg:rpm/redhat/cri-o@1.24.2-4.rhaos4.11.gitd6283df?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-k4dy-pv3f-4qas"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/cri-o@1.24.2-4.rhaos4.11.gitd6283df%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/98436?format=api",
            "purl": "pkg:rpm/redhat/cri-tools@1.24.2-6?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-k4dy-pv3f-4qas"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/cri-tools@1.24.2-6%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/97495?format=api",
            "purl": "pkg:rpm/redhat/etcd@3.3.23-12?arch=el8ost",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-1rsj-pm1p-qbd6"
                },
                {
                    "vulnerability": "VCID-498g-zap2-vqag"
                },
                {
                    "vulnerability": "VCID-5kkq-5jpf-fqev"
                },
                {
                    "vulnerability": "VCID-6189-d1tw-bfcp"
                },
                {
                    "vulnerability": "VCID-65mk-w8rx-zucs"
                },
                {
                    "vulnerability": "VCID-81aw-mk9s-eydd"
                },
                {
                    "vulnerability": "VCID-azr4-u36f-pbew"
                },
                {
                    "vulnerability": "VCID-g8y7-jdy7-afdh"
                },
                {
                    "vulnerability": "VCID-k4dy-pv3f-4qas"
                },
                {
                    "vulnerability": "VCID-ps89-8u5a-kfc8"
                },
                {
                    "vulnerability": "VCID-rtb8-bayb-dfbn"
                },
                {
                    "vulnerability": "VCID-tn6y-xfkz-83e4"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/etcd@3.3.23-12%3Farch=el8ost"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/98151?format=api",
            "purl": "pkg:rpm/redhat/golang@1.17.12-1?arch=el9_0",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-498g-zap2-vqag"
                },
                {
                    "vulnerability": "VCID-5c67-zpsw-cyb2"
                },
                {
                    "vulnerability": "VCID-6189-d1tw-bfcp"
                },
                {
                    "vulnerability": "VCID-7e1n-pvrt-g3fy"
                },
                {
                    "vulnerability": "VCID-81aw-mk9s-eydd"
                },
                {
                    "vulnerability": "VCID-86mk-kwg6-63h6"
                },
                {
                    "vulnerability": "VCID-as38-uuy9-5qhu"
                },
                {
                    "vulnerability": "VCID-dsm8-ck8e-wfdh"
                },
                {
                    "vulnerability": "VCID-g8y7-jdy7-afdh"
                },
                {
                    "vulnerability": "VCID-k4dy-pv3f-4qas"
                },
                {
                    "vulnerability": "VCID-mnxk-x51q-wkfp"
                },
                {
                    "vulnerability": "VCID-ps89-8u5a-kfc8"
                },
                {
                    "vulnerability": "VCID-vxks-1bkp-6bd5"
                },
                {
                    "vulnerability": "VCID-yzsx-6acm-kkb6"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/golang@1.17.12-1%3Farch=el9_0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/98441?format=api",
            "purl": "pkg:rpm/redhat/go-toolset@1.17.12-1?arch=el9_0",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-7e1n-pvrt-g3fy"
                },
                {
                    "vulnerability": "VCID-dsm8-ck8e-wfdh"
                },
                {
                    "vulnerability": "VCID-k4dy-pv3f-4qas"
                },
                {
                    "vulnerability": "VCID-mnxk-x51q-wkfp"
                },
                {
                    "vulnerability": "VCID-yzsx-6acm-kkb6"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/go-toolset@1.17.12-1%3Farch=el9_0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/98437?format=api",
            "purl": "pkg:rpm/redhat/go-toolset-1.17@1.17.12-1?arch=el7_9",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-k4dy-pv3f-4qas"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/go-toolset-1.17@1.17.12-1%3Farch=el7_9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/98139?format=api",
            "purl": "pkg:rpm/redhat/go-toolset-1.17-golang@1.17.12-1?arch=el7_9",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-498g-zap2-vqag"
                },
                {
                    "vulnerability": "VCID-5c67-zpsw-cyb2"
                },
                {
                    "vulnerability": "VCID-6189-d1tw-bfcp"
                },
                {
                    "vulnerability": "VCID-81aw-mk9s-eydd"
                },
                {
                    "vulnerability": "VCID-86mk-kwg6-63h6"
                },
                {
                    "vulnerability": "VCID-as38-uuy9-5qhu"
                },
                {
                    "vulnerability": "VCID-g8y7-jdy7-afdh"
                },
                {
                    "vulnerability": "VCID-k4dy-pv3f-4qas"
                },
                {
                    "vulnerability": "VCID-ps89-8u5a-kfc8"
                },
                {
                    "vulnerability": "VCID-vxks-1bkp-6bd5"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/go-toolset-1.17-golang@1.17.12-1%3Farch=el7_9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/98434?format=api",
            "purl": "pkg:rpm/redhat/ignition@2.14.0-4.rhaos4.11?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-k4dy-pv3f-4qas"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ignition@2.14.0-4.rhaos4.11%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/98149?format=api",
            "purl": "pkg:rpm/redhat/kubevirt@4.12.0-1057?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-2dh6-y93r-2ucc"
                },
                {
                    "vulnerability": "VCID-2zj9-xmsh-xbcn"
                },
                {
                    "vulnerability": "VCID-498g-zap2-vqag"
                },
                {
                    "vulnerability": "VCID-5c67-zpsw-cyb2"
                },
                {
                    "vulnerability": "VCID-6189-d1tw-bfcp"
                },
                {
                    "vulnerability": "VCID-7e1n-pvrt-g3fy"
                },
                {
                    "vulnerability": "VCID-81aw-mk9s-eydd"
                },
                {
                    "vulnerability": "VCID-86mk-kwg6-63h6"
                },
                {
                    "vulnerability": "VCID-as38-uuy9-5qhu"
                },
                {
                    "vulnerability": "VCID-g8y7-jdy7-afdh"
                },
                {
                    "vulnerability": "VCID-k4dy-pv3f-4qas"
                },
                {
                    "vulnerability": "VCID-ps89-8u5a-kfc8"
                },
                {
                    "vulnerability": "VCID-vxks-1bkp-6bd5"
                },
                {
                    "vulnerability": "VCID-w53f-uad6-gqdn"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kubevirt@4.12.0-1057%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/98150?format=api",
            "purl": "pkg:rpm/redhat/kubevirt@4.12.0-1057?arch=el7",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-2dh6-y93r-2ucc"
                },
                {
                    "vulnerability": "VCID-2zj9-xmsh-xbcn"
                },
                {
                    "vulnerability": "VCID-498g-zap2-vqag"
                },
                {
                    "vulnerability": "VCID-5c67-zpsw-cyb2"
                },
                {
                    "vulnerability": "VCID-6189-d1tw-bfcp"
                },
                {
                    "vulnerability": "VCID-7e1n-pvrt-g3fy"
                },
                {
                    "vulnerability": "VCID-81aw-mk9s-eydd"
                },
                {
                    "vulnerability": "VCID-86mk-kwg6-63h6"
                },
                {
                    "vulnerability": "VCID-as38-uuy9-5qhu"
                },
                {
                    "vulnerability": "VCID-g8y7-jdy7-afdh"
                },
                {
                    "vulnerability": "VCID-k4dy-pv3f-4qas"
                },
                {
                    "vulnerability": "VCID-ps89-8u5a-kfc8"
                },
                {
                    "vulnerability": "VCID-vxks-1bkp-6bd5"
                },
                {
                    "vulnerability": "VCID-w53f-uad6-gqdn"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kubevirt@4.12.0-1057%3Farch=el7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/98152?format=api",
            "purl": "pkg:rpm/redhat/openshift-serverless-clients@1.3.1-4?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-498g-zap2-vqag"
                },
                {
                    "vulnerability": "VCID-5c67-zpsw-cyb2"
                },
                {
                    "vulnerability": "VCID-6189-d1tw-bfcp"
                },
                {
                    "vulnerability": "VCID-7e1n-pvrt-g3fy"
                },
                {
                    "vulnerability": "VCID-81aw-mk9s-eydd"
                },
                {
                    "vulnerability": "VCID-86mk-kwg6-63h6"
                },
                {
                    "vulnerability": "VCID-as38-uuy9-5qhu"
                },
                {
                    "vulnerability": "VCID-dsm8-ck8e-wfdh"
                },
                {
                    "vulnerability": "VCID-f5qg-jth9-hycf"
                },
                {
                    "vulnerability": "VCID-g8y7-jdy7-afdh"
                },
                {
                    "vulnerability": "VCID-k4dy-pv3f-4qas"
                },
                {
                    "vulnerability": "VCID-ps89-8u5a-kfc8"
                },
                {
                    "vulnerability": "VCID-vxks-1bkp-6bd5"
                },
                {
                    "vulnerability": "VCID-wqqa-tzs4-kugj"
                },
                {
                    "vulnerability": "VCID-yzsx-6acm-kkb6"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openshift-serverless-clients@1.3.1-4%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/96229?format=api",
            "purl": "pkg:rpm/redhat/podman@2:4.0.2-7.rhaos4.11?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-a473-9skg-tkbn"
                },
                {
                    "vulnerability": "VCID-k4dy-pv3f-4qas"
                },
                {
                    "vulnerability": "VCID-yzsx-6acm-kkb6"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@2:4.0.2-7.rhaos4.11%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/97512?format=api",
            "purl": "pkg:rpm/redhat/podman@2:4.4.1-3?arch=el9",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-5kkq-5jpf-fqev"
                },
                {
                    "vulnerability": "VCID-k4dy-pv3f-4qas"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@2:4.4.1-3%3Farch=el9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/98439?format=api",
            "purl": "pkg:rpm/redhat/servicemesh@2.1.5-1?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-7e1n-pvrt-g3fy"
                },
                {
                    "vulnerability": "VCID-dsm8-ck8e-wfdh"
                },
                {
                    "vulnerability": "VCID-k4dy-pv3f-4qas"
                },
                {
                    "vulnerability": "VCID-yzsx-6acm-kkb6"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/servicemesh@2.1.5-1%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/98440?format=api",
            "purl": "pkg:rpm/redhat/servicemesh-operator@2.1.5-1?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-dsm8-ck8e-wfdh"
                },
                {
                    "vulnerability": "VCID-k4dy-pv3f-4qas"
                },
                {
                    "vulnerability": "VCID-mnxk-x51q-wkfp"
                },
                {
                    "vulnerability": "VCID-yzsx-6acm-kkb6"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/servicemesh-operator@2.1.5-1%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/98334?format=api",
            "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.23.0-9?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-dsm8-ck8e-wfdh"
                },
                {
                    "vulnerability": "VCID-k4dy-pv3f-4qas"
                },
                {
                    "vulnerability": "VCID-kexn-gjxj-uudm"
                },
                {
                    "vulnerability": "VCID-mnxk-x51q-wkfp"
                },
                {
                    "vulnerability": "VCID-ptd4-8f7f-hyg6"
                },
                {
                    "vulnerability": "VCID-yzsx-6acm-kkb6"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/servicemesh-prometheus@2.23.0-9%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/98433?format=api",
            "purl": "pkg:rpm/redhat/servicemesh-proxy@2.1.5-1?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-k4dy-pv3f-4qas"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/servicemesh-proxy@2.1.5-1%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/98438?format=api",
            "purl": "pkg:rpm/redhat/servicemesh-ratelimit@2.1.5-1?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-dsm8-ck8e-wfdh"
                },
                {
                    "vulnerability": "VCID-k4dy-pv3f-4qas"
                },
                {
                    "vulnerability": "VCID-yzsx-6acm-kkb6"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/servicemesh-ratelimit@2.1.5-1%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/96223?format=api",
            "purl": "pkg:rpm/redhat/skopeo@2:1.5.2-4.rhaos4.11?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-a473-9skg-tkbn"
                },
                {
                    "vulnerability": "VCID-k4dy-pv3f-4qas"
                },
                {
                    "vulnerability": "VCID-yzsx-6acm-kkb6"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/skopeo@2:1.5.2-4.rhaos4.11%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/97514?format=api",
            "purl": "pkg:rpm/redhat/skopeo@2:1.11.2-0.1?arch=el9",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-5kkq-5jpf-fqev"
                },
                {
                    "vulnerability": "VCID-k4dy-pv3f-4qas"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/skopeo@2:1.11.2-0.1%3Farch=el9"
        }
    ],
    "references": [
        {
            "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30629.json",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "3.1",
                    "scoring_system": "cvssv3",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
                }
            ],
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30629.json"
        },
        {
            "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-30629",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "0.00066",
                    "scoring_system": "epss",
                    "scoring_elements": "0.20536",
                    "published_at": "2026-04-02T12:55:00Z"
                },
                {
                    "value": "0.00066",
                    "scoring_system": "epss",
                    "scoring_elements": "0.20462",
                    "published_at": "2026-04-09T12:55:00Z"
                },
                {
                    "value": "0.00066",
                    "scoring_system": "epss",
                    "scoring_elements": "0.20487",
                    "published_at": "2026-04-11T12:55:00Z"
                },
                {
                    "value": "0.00066",
                    "scoring_system": "epss",
                    "scoring_elements": "0.20441",
                    "published_at": "2026-04-12T12:55:00Z"
                },
                {
                    "value": "0.00066",
                    "scoring_system": "epss",
                    "scoring_elements": "0.20385",
                    "published_at": "2026-04-13T12:55:00Z"
                },
                {
                    "value": "0.00066",
                    "scoring_system": "epss",
                    "scoring_elements": "0.20374",
                    "published_at": "2026-04-16T12:55:00Z"
                },
                {
                    "value": "0.00066",
                    "scoring_system": "epss",
                    "scoring_elements": "0.20376",
                    "published_at": "2026-04-18T12:55:00Z"
                },
                {
                    "value": "0.00066",
                    "scoring_system": "epss",
                    "scoring_elements": "0.20373",
                    "published_at": "2026-04-21T12:55:00Z"
                },
                {
                    "value": "0.00066",
                    "scoring_system": "epss",
                    "scoring_elements": "0.20248",
                    "published_at": "2026-04-24T12:55:00Z"
                },
                {
                    "value": "0.00066",
                    "scoring_system": "epss",
                    "scoring_elements": "0.20244",
                    "published_at": "2026-04-26T12:55:00Z"
                },
                {
                    "value": "0.00066",
                    "scoring_system": "epss",
                    "scoring_elements": "0.2021",
                    "published_at": "2026-04-29T12:55:00Z"
                },
                {
                    "value": "0.00066",
                    "scoring_system": "epss",
                    "scoring_elements": "0.20122",
                    "published_at": "2026-05-05T12:55:00Z"
                },
                {
                    "value": "0.00066",
                    "scoring_system": "epss",
                    "scoring_elements": "0.20197",
                    "published_at": "2026-05-07T12:55:00Z"
                },
                {
                    "value": "0.00066",
                    "scoring_system": "epss",
                    "scoring_elements": "0.20282",
                    "published_at": "2026-05-09T12:55:00Z"
                },
                {
                    "value": "0.00066",
                    "scoring_system": "epss",
                    "scoring_elements": "0.20246",
                    "published_at": "2026-05-11T12:55:00Z"
                },
                {
                    "value": "0.00066",
                    "scoring_system": "epss",
                    "scoring_elements": "0.20595",
                    "published_at": "2026-04-04T12:55:00Z"
                },
                {
                    "value": "0.00066",
                    "scoring_system": "epss",
                    "scoring_elements": "0.20324",
                    "published_at": "2026-04-07T12:55:00Z"
                },
                {
                    "value": "0.00066",
                    "scoring_system": "epss",
                    "scoring_elements": "0.20405",
                    "published_at": "2026-04-08T12:55:00Z"
                },
                {
                    "value": "0.00068",
                    "scoring_system": "epss",
                    "scoring_elements": "0.20711",
                    "published_at": "2026-05-12T12:55:00Z"
                },
                {
                    "value": "0.00068",
                    "scoring_system": "epss",
                    "scoring_elements": "0.20797",
                    "published_at": "2026-05-14T12:55:00Z"
                }
            ],
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-30629"
        },
        {
            "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30629",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30629"
        },
        {
            "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "3.7",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                }
            ],
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
        },
        {
            "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092793",
            "reference_id": "2092793",
            "reference_type": "",
            "scores": [],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092793"
        },
        {
            "reference_url": "https://go.dev/cl/405994",
            "reference_id": "405994",
            "reference_type": "",
            "scores": [
                {
                    "value": "3.1",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-24T20:38:04Z/"
                }
            ],
            "url": "https://go.dev/cl/405994"
        },
        {
            "reference_url": "https://go.dev/issue/52814",
            "reference_id": "52814",
            "reference_type": "",
            "scores": [
                {
                    "value": "3.1",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-24T20:38:04Z/"
                }
            ],
            "url": "https://go.dev/issue/52814"
        },
        {
            "reference_url": "https://go.googlesource.com/go/+/fe4de36198794c447fbd9d7cc2d7199a506c76a5",
            "reference_id": "fe4de36198794c447fbd9d7cc2d7199a506c76a5",
            "reference_type": "",
            "scores": [
                {
                    "value": "3.1",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-24T20:38:04Z/"
                }
            ],
            "url": "https://go.googlesource.com/go/+/fe4de36198794c447fbd9d7cc2d7199a506c76a5"
        },
        {
            "reference_url": "https://security.gentoo.org/glsa/202208-02",
            "reference_id": "GLSA-202208-02",
            "reference_type": "",
            "scores": [],
            "url": "https://security.gentoo.org/glsa/202208-02"
        },
        {
            "reference_url": "https://pkg.go.dev/vuln/GO-2022-0531",
            "reference_id": "GO-2022-0531",
            "reference_type": "",
            "scores": [
                {
                    "value": "3.1",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-24T20:38:04Z/"
                }
            ],
            "url": "https://pkg.go.dev/vuln/GO-2022-0531"
        },
        {
            "reference_url": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ",
            "reference_id": "IWz5T6x7AAAJ",
            "reference_type": "",
            "scores": [
                {
                    "value": "3.1",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-24T20:38:04Z/"
                }
            ],
            "url": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2022:5775",
            "reference_id": "RHSA-2022:5775",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2022:5775"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2022:5799",
            "reference_id": "RHSA-2022:5799",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2022:5799"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2022:5866",
            "reference_id": "RHSA-2022:5866",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2022:5866"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2022:6040",
            "reference_id": "RHSA-2022:6040",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2022:6040"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2022:6042",
            "reference_id": "RHSA-2022:6042",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2022:6042"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2022:6102",
            "reference_id": "RHSA-2022:6102",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2022:6102"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2022:6103",
            "reference_id": "RHSA-2022:6103",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2022:6103"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2022:6152",
            "reference_id": "RHSA-2022:6152",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2022:6152"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2022:6277",
            "reference_id": "RHSA-2022:6277",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2022:6277"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2022:6290",
            "reference_id": "RHSA-2022:6290",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2022:6290"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2022:6430",
            "reference_id": "RHSA-2022:6430",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2022:6430"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2022:6535",
            "reference_id": "RHSA-2022:6535",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2022:6535"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2022:9047",
            "reference_id": "RHSA-2022:9047",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2022:9047"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2023:0407",
            "reference_id": "RHSA-2023:0407",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2023:0407"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2023:0408",
            "reference_id": "RHSA-2023:0408",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2023:0408"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2023:1275",
            "reference_id": "RHSA-2023:1275",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2023:1275"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2023:1529",
            "reference_id": "RHSA-2023:1529",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2023:1529"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2023:2253",
            "reference_id": "RHSA-2023:2253",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2023:2253"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2023:2282",
            "reference_id": "RHSA-2023:2282",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2023:2282"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2023:2283",
            "reference_id": "RHSA-2023:2283",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2023:2283"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2023:2367",
            "reference_id": "RHSA-2023:2367",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2023:2367"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2023:2758",
            "reference_id": "RHSA-2023:2758",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2023:2758"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2023:3642",
            "reference_id": "RHSA-2023:3642",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2023:3642"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2023:3914",
            "reference_id": "RHSA-2023:3914",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2023:3914"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2023:4488",
            "reference_id": "RHSA-2023:4488",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2023:4488"
        },
        {
            "reference_url": "https://usn.ubuntu.com/6038-1/",
            "reference_id": "USN-6038-1",
            "reference_type": "",
            "scores": [],
            "url": "https://usn.ubuntu.com/6038-1/"
        },
        {
            "reference_url": "https://usn.ubuntu.com/6038-2/",
            "reference_id": "USN-6038-2",
            "reference_type": "",
            "scores": [],
            "url": "https://usn.ubuntu.com/6038-2/"
        }
    ],
    "weaknesses": [
        {
            "cwe_id": 331,
            "name": "Insufficient Entropy",
            "description": "The product uses an algorithm or scheme that produces insufficient entropy, leaving patterns or clusters of values that are more likely to occur than others."
        },
        {
            "cwe_id": 200,
            "name": "Exposure of Sensitive Information to an Unauthorized Actor",
            "description": "The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information."
        }
    ],
    "exploits": [],
    "severity_range_score": "3.1 - 3.7",
    "exploitability": "0.5",
    "weighted_severity": "2.8",
    "risk_score": 1.4,
    "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k4dy-pv3f-4qas"
}