{
  "$schema": "http://cyclonedx.org/schema/bom-1.6.schema.json",
  "bomFormat": "CycloneDX",
  "specVersion": "1.6",
  "serialNumber": "urn:uuid:4a386baa-44e2-471f-bdf3-1b7e74613a8e",
  "version": 1,
  "metadata": {
    "authors": [
      {
        "name": "Dennis Clark"
      }
    ],
    "component": {
      "bom-ref": "34082e55-7e02-4194-8fdb-5c27440e4e02",
      "copyright": "Copyright (c) Starship LLC",
      "description": "Advanced logistics",
      "licenses": [
        {
          "expression": "LicenseRef-scancode-starship-standard-terms"
        }
      ],
      "name": "CargoManager",
      "properties": [
        {
          "name": "aboutcode:homepage_url",
          "value": "https://en.wikipedia.org/wiki/Cargo"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "All rights reserved."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "supplier": {
        "name": "Starship LLC",
        "url": [
          "https://en.wikipedia.org/wiki/Starship"
        ]
      },
      "type": "application",
      "version": "2.9.5"
    },
    "timestamp": "2024-12-17T16:28:35.581345+00:00",
    "tools": [
      {
        "name": "DejaCode",
        "vendor": "nexB",
        "version": "5.2.1"
      }
    ]
  },
  "components": [
    {
      "author": "",
      "bom-ref": "pkg:pypi/aboutcode-toolkit@7.2.0",
      "copyright": "Copyright (c) nexB Inc.",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "6a61239aefb9f2653ba7d8595ac290c8"
        },
        {
          "alg": "SHA-1",
          "content": "1483944a08f28e08cba9543bae2549d5e6ed1942"
        },
        {
          "alg": "SHA-256",
          "content": "7ab9e044d45998e485d60d06939bd3d13e7a7758bc76092a3bc629f8a3183839"
        },
        {
          "alg": "SHA-512",
          "content": "7e6e55caf350669a4f097c069179dfc92012d11121dd1e8460dcab955c6083df49777e87465ed84c90e454032d07b0e887aed86382b524332d659465a7736767"
        }
      ],
      "licenses": [
        {
          "expression": "Apache-2.0"
        }
      ],
      "name": "aboutcode-toolkit",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/a6/59/7275eb850b5510a0e3731f0f859275388988b412b9ca24ed710750a60cb3/aboutcode_toolkit-7.2.0-py3-none-any.whl"
        },
        {
          "name": "aboutcode:filename",
          "value": "aboutcode_toolkit-7.2.0-py3-none-any.whl"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "# Licensed under the Apache License, Version 2.0 (the \"License\");\n# you may not use this file except in compliance with the License.\n# You may obtain a copy of the License at\n#\n#     http://www.apache.org/licenses/LICENSE-2.0\n#\n# Unless required by applicable law or agreed to in writing, software\n# distributed under the License is distributed on an \"AS IS\" BASIS,\n# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n# See the License for the specific language governing permissions and\n# limitations under the License."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/aboutcode-toolkit@7.2.0",
      "type": "library",
      "version": "7.2.0"
    },
    {
      "author": "",
      "bom-ref": "pkg:github/ajaxorg/ace@1.4.12?version_prefix=v",
      "copyright": "",
      "cpe": "",
      "description": "Ajax.org Code Editor is a full featured source code highlighting editor that powers the Cloud9 IDE",
      "hashes": [
        {
          "alg": "MD5",
          "content": "a7bcd799f947f9857fbbee050072e11f"
        },
        {
          "alg": "SHA-1",
          "content": "e017d626e433b1e0ca6b752cd60fb69c5d2af3dc"
        }
      ],
      "licenses": [
        {
          "expression": "BSD-3-Clause"
        }
      ],
      "name": "ace",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/ajaxorg/ace/archive/refs/tags/v1.4.12.tar.gz"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "http://github.com/ajaxorg/ace"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "JavaScript"
        }
      ],
      "purl": "pkg:github/ajaxorg/ace@1.4.12?version_prefix=v",
      "type": "library",
      "version": "1.4.12"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/amqp@2.6.1",
      "copyright": "Copyright (c) 2015-2016 Ask Solem & contributors.",
      "cpe": "",
      "description": "This is a fork of amqplib which was originally written by Barry Pederson. It is maintained by the Celery project, and used by kombu as a pure python alternative when librabbitmq is not available. This library should be API compatible with librabbitmq.",
      "hashes": [
        {
          "alg": "MD5",
          "content": "7e7552f78e16e1d0467af9cfb91ac9d0"
        },
        {
          "alg": "SHA-1",
          "content": "b4ae4bce329860abbd147501438267fae5e9600d"
        },
        {
          "alg": "SHA-256",
          "content": "aa7f313fb887c91f15474c1229907a04dac0b8135822d6603437803424c0aa59"
        },
        {
          "alg": "SHA-512",
          "content": "7bc374a0555d4f4d5813373770eb95456477d3dbacc95a8066c241720de82af1bf3692942e2f81a12c20d640517fa47b5cd64c2f7cf6cb4275e57eb710dd210e"
        }
      ],
      "licenses": [
        {
          "expression": "BSD-3-Clause"
        }
      ],
      "name": "amqp",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/bc/90/bb5ce93521772f083cb2d7a413bb82eda5afc62b4192adb7ea4c7b4858b9/amqp-2.6.1-py2.py3-none-any.whl#sha256=aa7f313fb887c91f15474c1229907a04dac0b8135822d6603437803424c0aa59"
        },
        {
          "name": "aboutcode:filename",
          "value": "amqp-2.6.1-py2.py3-none-any.whl"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "http://github.com/celery/py-amqp"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "py-amqp is licensed under The BSD License (3 Clause, also known as\nthe new BSD license).  The license is an OSI approved Open Source\nlicense and is GPL-compatible(1)."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/amqp@2.6.1",
      "type": "library",
      "version": "2.6.1"
    },
    {
      "author": "",
      "bom-ref": "pkg:github/openannotation/annotator@1.2.10?download_url=https://github.com/openannotation/annotator/releases/download/v1.2.10/annotator-full.1.2.10.zip&version_prefix=v",
      "copyright": "Copyright (c) Annotator Authors",
      "cpe": "",
      "description": "Annotation tools for the web. Select text, images, or (nearly) anything else, and add your notes.",
      "hashes": [
        {
          "alg": "MD5",
          "content": "4590b73fe316532bf7139bcc7e898c70"
        },
        {
          "alg": "SHA-1",
          "content": "fd2404f8e47ffd5156123a77d30292506d20c1de"
        },
        {
          "alg": "SHA-256",
          "content": "ae0ea8b391053acd78f0a9c11808100475fa701e09fa24cbabfe30f3f6f9bcc3"
        },
        {
          "alg": "SHA-512",
          "content": "36412b38724e4e0ec45450893dd3f5549de1d8e21309abd1ab561f9b7d12c55b9ebdea38dc6e3dcb4c996ef5f7b482e1e9ab8d5f2a472a4db62fed196531cc44"
        }
      ],
      "licenses": [
        {
          "expression": "MIT"
        }
      ],
      "name": "annotator",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/openannotation/annotator/releases/download/v1.2.10/annotator-full.1.2.10.zip"
        },
        {
          "name": "aboutcode:filename",
          "value": "annotator-full.1.2.10.zip"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "http://okfnlabs.org/projects/annotator/"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "# Annotator licensing terms\n\nAnnotator is free software, and you may use it under the terms of either the\nMIT or the GNU GPL licenses:\n\n## GNU GPLv3\n\nYou can redistribute this program and/or modify it under the terms of the\nGNU General Public License as published by the Free Software Foundation,\neither version 3 of the License, or (at your option) any later version.\n\nThis program is distributed in the hope that it will be useful,\nbut WITHOUT ANY WARRANTY; without even the implied warranty of\nMERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the\nGNU General Public License for more details.\n\nYou should have received a copy of the GNU General Public License\nalong with this program. See LICENSE-GPL, or, if this file is missing,\n<http://www.gnu.org/licenses/>.\n\n## MIT\n\nYou may use the software under the terms of the MIT license, which can be\nfound in LICENSE-MIT, or, if this file is missing,\n<http://www.opensource.org/licenses/mit-license>."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "JavaScript"
        }
      ],
      "purl": "pkg:github/openannotation/annotator@1.2.10?download_url=https://github.com/openannotation/annotator/releases/download/v1.2.10/annotator-full.1.2.10.zip&version_prefix=v",
      "type": "library",
      "version": "1.2.10"
    },
    {
      "author": "",
      "bom-ref": "pkg:github/leaverou/awesomplete@1.1.5?version_prefix=v",
      "copyright": "Copyright (c) Lea Verou",
      "cpe": "",
      "description": "Ultra lightweight, usable autocomplete with zero dependencies.",
      "hashes": [
        {
          "alg": "MD5",
          "content": "d61941125d7a7ee8166bfbb732ca659e"
        },
        {
          "alg": "SHA-1",
          "content": "9e251d749e4b0068ecb9f51ef37a62f4387b5ba4"
        },
        {
          "alg": "SHA-256",
          "content": "2bdb997ae302d67e75dfb025ae79d63588b4493f502ed124c25560218b814cba"
        },
        {
          "alg": "SHA-512",
          "content": "35c79eff5e9971962e89310736360d3e2e3c83c6735189d53524d4d02e156daa643dd217db54579ccd8b89ecea28c059c01236bd312cbab6d6277014bfcfd47f"
        }
      ],
      "licenses": [
        {
          "expression": "MIT"
        }
      ],
      "name": "awesomplete",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/LeaVerou/awesomplete/archive/v1.1.5.tar.gz"
        },
        {
          "name": "aboutcode:filename",
          "value": "awesomplete-1.1.5.tar.gz"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "https://github.com/LeaVerou/awesomplete"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "The MIT License (MIT)\n\nPermission is hereby granted, free of charge, to any person obtaining a copy\nof this software and associated documentation files (the \"Software\"), to deal\nin the Software without restriction, including without limitation the rights\nto use, copy, modify, merge, publish, distribute, sublicense, and/or sell\ncopies of the Software, and to permit persons to whom the Software is\nfurnished to do so, subject to the following conditions:\n\nThe above copyright notice and this permission notice shall be included in all\ncopies or substantial portions of the Software.\n\nTHE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR\nIMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,\nFITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE\nAUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER\nLIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,\nOUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE\nSOFTWARE."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "JavaScript"
        }
      ],
      "purl": "pkg:github/leaverou/awesomplete@1.1.5?version_prefix=v",
      "type": "library",
      "version": "1.1.5"
    },
    {
      "author": "",
      "bom-ref": "pkg:github/naver/billboard.js@3.0.1",
      "copyright": "",
      "cpe": "",
      "description": "Re-usable easy interface JavaScript chart library, based on D3 v4+",
      "hashes": [
        {
          "alg": "MD5",
          "content": "819c12ce068a2d675ba05dbdd3f8ab67"
        },
        {
          "alg": "SHA-1",
          "content": "258561af57fb2bd85cd2b332a45132ea32e7e636"
        }
      ],
      "licenses": [
        {
          "expression": "MIT"
        }
      ],
      "name": "billboard.js",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/naver/billboard.js/archive/refs/tags/3.0.1.zip"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "https://naver.github.io/billboard.js/"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "JavaScript"
        }
      ],
      "purl": "pkg:github/naver/billboard.js@3.0.1",
      "type": "library",
      "version": "3.0.1"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/billiard@3.6.3.0",
      "copyright": "Copyright (c) 2006-2008, R Oudkerk and Contributors",
      "cpe": "",
      "description": "Multiprocessing Pool Extensions",
      "hashes": [
        {
          "alg": "MD5",
          "content": "ef0831df429e9ec89f3b40fea4e143d4"
        },
        {
          "alg": "SHA-1",
          "content": "c9100731b41e1bcb3bbaffd777f991057d3bd09b"
        },
        {
          "alg": "SHA-256",
          "content": "bff575450859a6e0fbc2f9877d9b715b0bbc07c3565bb7ed2280526a0cdf5ede"
        },
        {
          "alg": "SHA-512",
          "content": "e5f4aed465a1075045a2c64efe45c32689d0655ff9a87f4b7dee949f53ccbeae27fb6829792d62f31595a126015a8677cd48165342ebfda34f4d870fb42b87f3"
        }
      ],
      "licenses": [
        {
          "expression": "BSD-3-Clause"
        }
      ],
      "name": "billiard",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/e8/5e/7591866ff45b370354bd20291cb6f87ddb2eef1f1c88c890a38412037e11/billiard-3.6.3.0-py3-none-any.whl#sha256=bff575450859a6e0fbc2f9877d9b715b0bbc07c3565bb7ed2280526a0cdf5ede"
        },
        {
          "name": "aboutcode:filename",
          "value": "billiard-3.6.3.0-py3-none-any.whl"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "http://github.com/celery/billiard"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "Copyright (c) 2006-2008, R Oudkerk and Contributors\n\nAll rights reserved.\n\nRedistribution and use in source and binary forms, with or without\nmodification, are permitted provided that the following conditions\nare met:\n\n1. Redistributions of source code must retain the above copyright\n   notice, this list of conditions and the following disclaimer.\n2. Redistributions in binary form must reproduce the above copyright\n   notice, this list of conditions and the following disclaimer in the\n   documentation and/or other materials provided with the distribution.\n3. Neither the name of author nor the names of any contributors may be\n   used to endorse or promote products derived from this software\n   without specific prior written permission.\n\nTHIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\" AND\nANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE\nIMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE\nARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE\nFOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL\nDAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS\nOR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)\nHOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT\nLIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY\nOUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF\nSUCH DAMAGE."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/billiard@3.6.3.0",
      "type": "library",
      "version": "3.6.3.0"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/boolean.py@3.8",
      "copyright": "Copyright (c) Sebastian Kraemer, basti.kr@gmail.com and others",
      "cpe": "",
      "description": "Implements boolean algebra in one module.",
      "hashes": [
        {
          "alg": "MD5",
          "content": "fa308ca6a746135feb248097cc35c107"
        },
        {
          "alg": "SHA-1",
          "content": "9bfaf3104f7beb2a762b9b494c8849358d46bbfc"
        },
        {
          "alg": "SHA-256",
          "content": "d75da0fd0354425fa64f6bbc6cec6ae1485d0eec3447b73187ff8cbf9b572e26"
        },
        {
          "alg": "SHA-512",
          "content": "7d0a99dd7f257562bc5d6c26614615e3aa7281e45bdedda9385cf142405a7ab797bf0da8bbcfc66a670b9084f9427135252dd29499d7d2740f50a93d6f2a8d7a"
        }
      ],
      "licenses": [
        {
          "expression": "BSD-2-Clause"
        }
      ],
      "name": "boolean.py",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/eb/5b/f82983127b1a1a4db83ee290e00a94a2b08c566fa6c58466e82ed7b0a76f/boolean.py-3.8-py2.py3-none-any.whl#sha256=d75da0fd0354425fa64f6bbc6cec6ae1485d0eec3447b73187ff8cbf9b572e26"
        },
        {
          "name": "aboutcode:filename",
          "value": "boolean.py-3.8-py2.py3-none-any.whl"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "https://github.com/bastikr/boolean.py"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "SPDX-License-Identifier: BSD-2-Clause"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/boolean.py@3.8",
      "type": "library",
      "version": "3.8"
    },
    {
      "author": "",
      "bom-ref": "pkg:maven/tomcat/bootstrap@5.5.23?classifier=sources",
      "copyright": "",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "8414635976c3da571c63eb452534fb69"
        },
        {
          "alg": "SHA-1",
          "content": "cc092efab7ab317d19fb0899a5af2eb428a786a7"
        },
        {
          "alg": "SHA-256",
          "content": "f5ca4cb9599d50209dc8804af611314794d41a8023006ee8f5b8275e33211ca8"
        },
        {
          "alg": "SHA-512",
          "content": "7246f4e82adc6f536efe4ac48612eadfb9c24c3eaa2a21835018d703b3e749c66a4650f40ebd2c5f97e6a77ae41dd0bf641085550151e10968701bf7f51952e5"
        }
      ],
      "name": "bootstrap",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://repo1.maven.org/maven2/tomcat/bootstrap/5.5.23/bootstrap-5.5.23-sources.jar"
        }
      ],
      "purl": "pkg:maven/tomcat/bootstrap@5.5.23?classifier=sources",
      "type": "library",
      "version": "5.5.23"
    },
    {
      "author": "",
      "bom-ref": "pkg:github/twbs/bootstrap@e5643aaa89eb67327a5b4abe7db976f0ea276b70",
      "copyright": "",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "f26069c703ebf433cd297c4036efb5b1"
        },
        {
          "alg": "SHA-1",
          "content": "7c0b82ea1f8efb3caff8a7aacc941061af16a49e"
        },
        {
          "alg": "SHA-256",
          "content": "e5edd86af712f1ddef732da70bc7f6059c37ac616688a86152f9f2047e6b04c4"
        },
        {
          "alg": "SHA-512",
          "content": "f68fd049e37236c0de3be968dd254e21b39dfa212dae80175c5e96f7deb685b8ebca657fabaf21327bdb6e2da90de1b303c4658c9d59526df76e829379e0fb31"
        }
      ],
      "licenses": [
        {
          "expression": "MIT"
        }
      ],
      "name": "bootstrap",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/twbs/bootstrap/archive/e5643aaa89eb67327a5b4abe7db976f0ea276b70.zip"
        },
        {
          "name": "aboutcode:filename",
          "value": "bootstrap-e5643aaa89eb67327a5b4abe7db976f0ea276b70.zip"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "https://getbootstrap.com/"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "PHP"
        }
      ],
      "purl": "pkg:github/twbs/bootstrap@e5643aaa89eb67327a5b4abe7db976f0ea276b70",
      "type": "library",
      "version": "e5643aaa89eb67327a5b4abe7db976f0ea276b70"
    },
    {
      "author": "",
      "bom-ref": "pkg:github/cyclonedx/cdxgen@8.1.5?version_prefix=v",
      "copyright": "",
      "cpe": "",
      "description": "Creates CycloneDX Software Bill-of-Materials (SBOM) from source or container image",
      "hashes": [
        {
          "alg": "MD5",
          "content": "22224e614b3b2183316c0e9b5ff1f689"
        },
        {
          "alg": "SHA-1",
          "content": "2ad7d0de5a57a5eb2585b84c70de02789308f6e9"
        },
        {
          "alg": "SHA-256",
          "content": "def9475ffdbf06bf903bc5ccfd25d7d292e9aabad04da93fd28004b671b5bcda"
        },
        {
          "alg": "SHA-512",
          "content": "2ad74d4c8a70af9f35cad341fffb4179141bdc59f6e1be2d239f08825fdabeebb96e243ba6d8d1ae44817ce5240f8d3a387cf2cbf0b60015a1d12a477e51d2a9"
        }
      ],
      "licenses": [
        {
          "expression": "Apache-2.0"
        }
      ],
      "name": "cdxgen",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/CycloneDX/cdxgen/archive/refs/tags/v8.1.5.tar.gz"
        },
        {
          "name": "aboutcode:filename",
          "value": "cdxgen-8.1.5.tar.gz"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "http://github.com/cyclonedx/cdxgen"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "JavaScript"
        }
      ],
      "purl": "pkg:github/cyclonedx/cdxgen@8.1.5?version_prefix=v",
      "type": "library",
      "version": "8.1.5"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/celery@4.3.0",
      "copyright": "Copyright (c) Ask Solem & contributors.",
      "cpe": "",
      "description": "Celery: Distributed Task Queue\r\n\r\nCelery is an asynchronous task queue/job queue based on distributed message passing. It is focused on real-time operation, but supports scheduling as well.\r\n\r\nThe execution units, called tasks, are executed concurrently on a single or more worker servers using multiprocessing, Eventlet, or gevent. Tasks can execute asynchronously (in the background) or synchronously (wait until ready).",
      "hashes": [
        {
          "alg": "MD5",
          "content": "f1a0221fdd2666837bd6b879f577e715"
        },
        {
          "alg": "SHA-1",
          "content": "33693b689d84b7961ca079fabc68cae49d8483e2"
        },
        {
          "alg": "SHA-256",
          "content": "528e56767ae7e43a16cfef24ee1062491f5754368d38fcfffa861cdb9ef219be"
        },
        {
          "alg": "SHA-512",
          "content": "3accd1eefc4e4fcb045836d83e7b47cf985b1355ed3d1b372ec7f02f421fb2cb72b00c58f8a3508f7de2bd02f235695e702f9b52a43589deacd3ee431e70261a"
        }
      ],
      "licenses": [
        {
          "expression": "BSD-3-Clause"
        }
      ],
      "name": "celery",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/5c/a1/a3dd9d8bfa09156ec2cba37f90accf35c0f4ecc3980d96cb4fb99e56504b/celery-4.3.0-py2.py3-none-any.whl#sha256=528e56767ae7e43a16cfef24ee1062491f5754368d38fcfffa861cdb9ef219be"
        },
        {
          "name": "aboutcode:filename",
          "value": "celery-4.3.0-py2.py3-none-any.whl"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "http://celeryproject.org/"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "Copyright (c) 2015-2016 Ask Solem & contributors.  All rights reserved.\nCopyright (c) 2012-2014 GoPivotal, Inc.  All rights reserved.\nCopyright (c) 2009, 2010, 2011, 2012 Ask Solem, and individual contributors.  All rights reserved.\n\nCelery is licensed under The BSD License (3 Clause, also known as\nthe new BSD license).  The license is an OSI approved Open Source\nlicense and is GPL-compatible(1).\n\nThe license text can also be found here:\nhttp://www.opensource.org/licenses/BSD-3-Clause\n\nLicense\n=======\n\nRedistribution and use in source and binary forms, with or without\nmodification, are permitted provided that the following conditions are met:\n    * Redistributions of source code must retain the above copyright\n      notice, this list of conditions and the following disclaimer.\n    * Redistributions in binary form must reproduce the above copyright\n      notice, this list of conditions and the following disclaimer in the\n      documentation and/or other materials provided with the distribution.\n    * Neither the name of Ask Solem, nor the\n      names of its contributors may be used to endorse or promote products\n      derived from this software without specific prior written permission.\n\nTHIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS \"AS IS\"\nAND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\nTHE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\nPURPOSE ARE DISCLAIMED. IN NO EVENT SHALL Ask Solem OR CONTRIBUTORS\nBE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR\nCONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF\nSUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS\nINTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN\nCONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)\nARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE\nPOSSIBILITY OF SUCH DAMAGE.\n\nDocumentation License\n=====================\n\nThe documentation portion of Celery (the rendered contents of the\n\"docs\" directory of a software distribution or checkout) is supplied\nunder the \"Creative Commons Attribution-ShareAlike 4.0\nInternational\" (CC BY-SA 4.0) License as described by\nhttps://creativecommons.org/licenses/by-sa/4.0/\n\nFootnotes\n=========\n(1) A GPL-compatible license makes it possible to\n    combine Celery with other software that is released\n    under the GPL, it does not mean that we're distributing\n    Celery under the GPL license.  The BSD license, unlike the GPL,\n    let you distribute a modified version without making your\nchanges open source."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/celery@4.3.0",
      "type": "library",
      "version": "4.3.0"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/certifi@2022.12.7",
      "copyright": "",
      "cpe": "",
      "description": "Python package for providing Mozilla's CA Bundle.\nCertifi: Python SSL Certificates\n================================\n\nCertifi provides Mozilla's carefully curated collection of Root Certificates for\nvalidating the trustworthiness of SSL certificates while verifying the identity\nof TLS hosts. It has been extracted from the `Requests`_ project.\n\nInstallation\n------------\n\n``certifi`` is available on PyPI. Simply install it with ``pip``::\n\n    $ pip install certifi\n\nUsage\n-----\n\nTo reference the installed certificate authority (CA) bundle, you can use the\nbuilt-in function::\n\n    >>> import certifi\n\n    >>> certifi.where()\n    '/usr/local/lib/python3.7/site-packages/certifi/cacert.pem'\n\nOr from the command line::\n\n    $ python -m certifi\n    /usr/local/lib/python3.7/site-packages/certifi/cacert.pem\n\nEnjoy!\n\n1024-bit Root Certificates\n~~~~~~~~~~~~~~~~~~~~~~~~~~\n\nBrowsers and certificate authorities have concluded that 1024-bit keys are\nunacceptably weak for certificates, particularly root certificates. For this\nreason, Mozilla has removed any weak (i.e. 1024-bit key) certificate from its\nbundle, replacing it with an equivalent strong (i.e. 2048-bit or greater key)\ncertificate from the same CA. Because Mozilla removed these certificates from\nits bundle, ``certifi`` removed them as well.\n\nIn previous versions, ``certifi`` provided the ``certifi.old_where()`` function\nto intentionally re-add the 1024-bit roots back into your bundle. This was not\nrecommended in production and therefore was removed at the end of 2018.\n\n.. _`Requests`: https://requests.readthedocs.io/en/master/\n\nAddition/Removal of Certificates\n--------------------------------\n\nCertifi does not support any addition/removal or other modification of the\nCA trust store content. This project is intended to provide a reliable and\nhighly portable root of trust to python deployments. Look to upstream projects\nfor methods to use alternate trust.",
      "hashes": [
        {
          "alg": "MD5",
          "content": "d00966473b8ac42c2c033b75f4bed6f4"
        },
        {
          "alg": "SHA-256",
          "content": "35824b4c3a97115964b408844d64aa14db1cc518f6562e8d7261699d1350a9e3"
        }
      ],
      "licenses": [
        {
          "expression": "MPL-2.0"
        }
      ],
      "name": "certifi",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/37/f7/2b1b0ec44fdc30a3d31dfebe52226be9ddc40cd6c0f34ffc8923ba423b69/certifi-2022.12.7.tar.gz"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "https://github.com/certifi/python-certifi"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/certifi@2022.12.7",
      "type": "library",
      "version": "2022.12.7"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/certifi@2022.5.18.1",
      "copyright": "Copyright (c) Entrust, Inc.",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "2b90958efe9ba9766b8f9cf9b618810a"
        },
        {
          "alg": "SHA-1",
          "content": "ff3fedde55abb524991d1e5360dd4695b48c9081"
        },
        {
          "alg": "SHA-256",
          "content": "f1d53542ee8cbedbe2118b5686372fb33c297fcd6379b050cca0ef13a597382a"
        },
        {
          "alg": "SHA-512",
          "content": "7be189c26ad4d43699e03b2dbdb468acbb066b34836d2d8c4006097c75745ce950756b64d440152b2f2c7f33b9b70e7962246b9e84ca4f7ac555f6862fbb57e6"
        }
      ],
      "licenses": [
        {
          "expression": "MPL-2.0"
        }
      ],
      "name": "certifi",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/11/dd/e015f3780f42dd9af62cf0107b44ea1298926627ecd70c17b0e484e95bcd/certifi-2022.5.18.1-py3-none-any.whl"
        },
        {
          "name": "aboutcode:filename",
          "value": "certifi-2022.5.18.1-py3-none-any.whl"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "This Source Code Form is subject to the terms of the Mozilla Public License,\nv. 2.0. If a copy of the MPL was not distributed with this file, You can obtain\none at http://mozilla.org/MPL/2.0/."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/certifi@2022.5.18.1",
      "type": "library",
      "version": "2022.5.18.1"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/cffi@1.15.0",
      "copyright": "Copyright (c) cffi project conributors",
      "cpe": "",
      "description": "CFFI\r\n====\r\n\r\nForeign Function Interface for Python calling C code.\r\nPlease see the `Documentation <http://cffi.readthedocs.org/>`_.\r\n\r\nContact\r\n-------\r\n\r\n`Mailing list <https://groups.google.com/forum/#!forum/python-cffi>`_",
      "hashes": [
        {
          "alg": "MD5",
          "content": "f3a3f26cd3335fc597479c9475da0a0b"
        },
        {
          "alg": "SHA-1",
          "content": "9c51c29e35510adf7f94542e1f8e05611930b07b"
        },
        {
          "alg": "SHA-256",
          "content": "920f0d66a896c2d99f0adbb391f990a84091179542c205fa53ce5787aff87954"
        },
        {
          "alg": "SHA-512",
          "content": "ee83efde6f77f4a0c5889088c4c208ed7b9071fe06dfc16a8d2396de07f78fe859e1e39866760198a9d700f3b7359e8715e8a3e4907feb81d3fc4b8dd0dbaca1"
        }
      ],
      "licenses": [
        {
          "expression": "MIT"
        }
      ],
      "name": "cffi",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/00/9e/92de7e1217ccc3d5f352ba21e52398372525765b2e0c4530e6eb2ba9282a/cffi-1.15.0.tar.gz"
        },
        {
          "name": "aboutcode:filename",
          "value": "cffi-1.15.0.tar.gz"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "http://cffi.readthedocs.org"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "Except when otherwise stated (look for LICENSE files in directories or\ninformation at the beginning of each file) all software and\ndocumentation is licensed as follows: \n\n    The MIT License\n\n    Permission is hereby granted, free of charge, to any person \n    obtaining a copy of this software and associated documentation \n    files (the \"Software\"), to deal in the Software without \n    restriction, including without limitation the rights to use, \n    copy, modify, merge, publish, distribute, sublicense, and/or \n    sell copies of the Software, and to permit persons to whom the \n    Software is furnished to do so, subject to the following conditions:\n\n    The above copyright notice and this permission notice shall be included \n    in all copies or substantial portions of the Software.\n\n    THE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS \n    OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, \n    FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL \n    THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER \n    LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING \n    FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER \n    DEALINGS IN THE SOFTWARE.\n"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/cffi@1.15.0",
      "type": "library",
      "version": "1.15.0"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/click@8.1.3",
      "copyright": "Copyright (c) Gregory P. Ward",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "7a8260e7bdac219be27f0bdda48e79ce"
        },
        {
          "alg": "SHA-1",
          "content": "6176609edd5d6dc5258c1aaa32f4dc72b5a008a9"
        },
        {
          "alg": "SHA-256",
          "content": "bb4d8133cb15a609f44e8213d9b391b0809795062913b383c62be0ee95b1db48"
        },
        {
          "alg": "SHA-512",
          "content": "ce7e25725b3edfd0f336f3ebc8ace3977539f0d063f3439c4a1af517263cc1058cd9c0f687819ba319811dd0f376148372444dbaf082797d1dfe2c1c1c856dfb"
        }
      ],
      "licenses": [
        {
          "expression": "BSD-3-Clause"
        }
      ],
      "name": "click",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/c2/f1/df59e28c642d583f7dacffb1e0965d0e00b218e0186d7858ac5233dce840/click-8.1.3-py3-none-any.whl"
        },
        {
          "name": "aboutcode:filename",
          "value": "click-8.1.3-py3-none-any.whl"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "License: BSD-3-Clause"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/click@8.1.3",
      "type": "library",
      "version": "8.1.3"
    },
    {
      "author": "",
      "bom-ref": "pkg:maven/com.clickhouse/clickhouse-jdbc@0.3.2-patch8?classifier=grpc&type=jar",
      "copyright": "",
      "cpe": "",
      "description": "JDBC driver for ClickHouse",
      "hashes": [
        {
          "alg": "MD5",
          "content": "0794746f88872840bf87dd9dc2908168"
        },
        {
          "alg": "SHA-1",
          "content": "74bc55dcb7fa5e68a84b8ec606e86a1a3300d76f"
        },
        {
          "alg": "SHA-256",
          "content": "9efe5b95e3f18fdf10cb6ccdc915981584126ddf1249bc40ceb4313f26645b16"
        },
        {
          "alg": "SHA-512",
          "content": "c47d18696684a8cc173ffad492f77d7f231364d09c1c2d20aecfd9f2828e9c4a080423fbd778cf517fe58af099256b36d7e89eaa1647267f27670d6fe8e46d68"
        }
      ],
      "licenses": [
        {
          "expression": "Apache-2.0"
        }
      ],
      "name": "clickhouse-jdbc",
      "purl": "pkg:maven/com.clickhouse/clickhouse-jdbc@0.3.2-patch8?classifier=grpc&type=jar",
      "type": "library",
      "version": "0.3.2-patch8"
    },
    {
      "author": "",
      "bom-ref": "pkg:github/zloirock/core-js@3.28.0?version_prefix=v",
      "copyright": "Copyright (c) Denis Pushkarev",
      "cpe": "",
      "description": "JavaScript Standard Library",
      "hashes": [
        {
          "alg": "MD5",
          "content": "ecdb45f4bb20d8a74d504faf223a396c"
        },
        {
          "alg": "SHA-1",
          "content": "a1cac21bc8e205b2c9cb4cc27883d7dc68454256"
        },
        {
          "alg": "SHA-256",
          "content": "b671dd55c21012971ff6d1e7fe5ecd4eeec044330199cbf9785857b97a783384"
        },
        {
          "alg": "SHA-512",
          "content": "e2a6d779f605455f4a28573f86eeeaed0080ffdc85af424e44ecd1625132ba33a105300906e542b5fc4346a7cd0ed4a1996b3a863909b25b98e596d63343002b"
        }
      ],
      "licenses": [
        {
          "expression": "MIT"
        }
      ],
      "name": "core-js",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/zloirock/core-js/archive/refs/tags/v3.28.0.tar.gz"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "JavaScript"
        }
      ],
      "purl": "pkg:github/zloirock/core-js@3.28.0?version_prefix=v",
      "type": "library",
      "version": "3.28.0"
    },
    {
      "author": "",
      "bom-ref": "pkg:github/crystal-lang/crystal@1.0.0",
      "copyright": "Copyright (c) Manas Technology Solutions.",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "15b834fbe0aefab043ba117d68292e1a"
        },
        {
          "alg": "SHA-1",
          "content": "d3e4f640b798977b3356379288310f5281a3184c"
        }
      ],
      "licenses": [
        {
          "expression": "MIT AND BSD-3-Clause AND OFL-1.1 AND Apache-2.0 AND Swift-exception"
        }
      ],
      "name": "crystal",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/crystal-lang/crystal/archive/refs/tags/1.0.0.tar.gz"
        },
        {
          "name": "aboutcode:filename",
          "value": "crystal-1.0.0.tar.gz"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "# Crystal Programming Language\n\nCopyright 2012-2021 Manas Technology Solutions.\n\nThis product includes software developed at Manas Technology Solutions (<https://manas.tech/>).\n\nApache License v2.0 applies to all works.\n\nPlease see [LICENSE](/LICENSE) for additional copyright and licensing information.\n\n## External libraries information\n\nCrystal compiler links the following libraries, which have their own license:\n\n  * [LLVM][] - [BSD-3, effectively][]\n  * [PCRE][] - [BSD-3][]\n  * [libevent2][] - [BSD-3][]\n  * [libiconv][] - [LGPLv3][]\n  * [bdwgc][] - [MIT][]\n\nCrystal compiler calls the following tools as external process on compiling, which have their own license:\n\n  * [pkg-config](https://www.freedesktop.org/wiki/Software/pkg-config/) - [GPLv3]\n\nCrystal standard library uses the following libraries, which have their own licenses:\n\n  * [LLVM][] - [BSD-3, effectively][]\n  * [PCRE][] - [BSD-3][]\n  * [libevent2][] - [BSD-3][]\n  * [libiconv][] - [LGPLv3][]\n  * [bdwgc][] - [MIT][]\n  * [Zlib][] - [Zlib][Zlib-license]\n  * [OpenSSL][] - [Apache-2.0][]\n  * [Libxml2][] - [MIT][]\n  * [LibYAML][] - [MIT][]\n  * [readline][] - [GPLv3][]\n  * [GMP][] - [LGPLv3][]\n\nCrystal playground includes the following libraries, which have their own licenses.\n(There are these files under [/src/compiler/crystal/tools/playground/public/vendor](/src/compiler/crystal/tools/playground/public/vendor)):\n\n   * [jQuery][] - [MIT][]\n     `Copyright JS Foundation and other contributors, https://js.foundation/`\n   * [Octicons][] - [MIT][] (for codes) or [OFL-1.1][] (for fonts) `(c) 2012-2016 GitHub, Inc.`\n   * [Materialize][] - [MIT][] `Copyright (c) 2014-2015 Materialize`\n   * [CodeMirror][] - [MIT][] `Copyright (C) 2016 by Marijn Haverbeke <marijnh@gmail.com> and others`\n   * [ansi\\_up][] - [MIT][] `Copyright (c) 2011 Dru Nelson`\n\n<!-- licenses -->\n[Apache-2.0]: https://www.openssl.org/source/apache-license-2.0.txt\n[BSD-3]: https://opensource.org/licenses/BSD-3-Clause\n[BSD-3, effectively]: http://releases.llvm.org/2.8/LICENSE.TXT\n[GPLv3]: https://www.gnu.org/licenses/gpl-3.0.en.html\n[LGPLv3]: https://www.gnu.org/licenses/lgpl-3.0.en.html\n[MIT]: https://opensource.org/licenses/MIT\n[OFL-1.1]: https://opensource.org/licenses/OFL-1.1\n[Zlib-license]: https://opensource.org/licenses/Zlib\n<!-- libraries -->\n[ansi\\_up]: https://github.com/drudru/ansi\\_up\n[bdwgc]: http://www.hboehm.info/gc/\n[CodeMirror]: https://codemirror.net/\n[jQuery]: https://jquery.com/\n[GMP]: https://gmplib.org/\n[libevent2]: http://libevent.org/\n[libiconv]: https://www.gnu.org/software/libiconv/\n[Libxml2]: http://xmlsoft.org/\n[LibYAML]: http://pyyaml.org/wiki/LibYAML\n[LLVM]: http://llvm.org/\n[Materialize]: http://materializecss.com/\n[Octicons]: https://octicons.github.com/\n[OpenSSL]: https://www.openssl.org/\n[PCRE]: http://pcre.org/\n[readline]: https://tiswww.case.edu/php/chet/readline/rltop.html\n[Zlib]: http://www.zlib.net/"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "TypeScript"
        }
      ],
      "purl": "pkg:github/crystal-lang/crystal@1.0.0",
      "type": "library",
      "version": "1.0.0"
    },
    {
      "author": "",
      "bom-ref": "pkg:github/curl/curl@7_88_1",
      "copyright": "",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "44284c5bd8f39935f0e4c4c263672a1f"
        },
        {
          "alg": "SHA-1",
          "content": "eac4b0a46cb1f6f32fa059ac2039bfbf690f66a4"
        },
        {
          "alg": "SHA-256",
          "content": "eb9f2ca79e2c39b89827cf2cf21f39181f6a537f50dc1df9c33d705913009ac4"
        },
        {
          "alg": "SHA-512",
          "content": "c5caa1f95580ddbf2041c9c4b885f84d4f5c5fcb905a5ea59f9dbb58a98fc292260f95cb935e963bf83d7dcecf98561deef5ce3ff91cdcb29a080559cff0ed64"
        }
      ],
      "licenses": [
        {
          "expression": "curl"
        }
      ],
      "name": "curl",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/curl/curl/archive/refs/tags/curl-7_88_1.tar.gz"
        },
        {
          "name": "aboutcode:filename",
          "value": "curl-curl-7_88_1.tar.gz"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "C"
        }
      ],
      "purl": "pkg:github/curl/curl@7_88_1",
      "type": "library",
      "version": "7_88_1"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/defusedxml@0.7.1",
      "copyright": "Copyright (c) Christian Heimes",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "f0f8408ec7056772fe2872cc31b55640"
        },
        {
          "alg": "SHA-1",
          "content": "e23475023105199c3e59753407e921869e04720d"
        },
        {
          "alg": "SHA-256",
          "content": "a352e7e428770286cc899e2542b6cdaedb2b4953ff269a210103ec58f6198a61"
        },
        {
          "alg": "SHA-512",
          "content": "2a7b2ca6a68b6078009aabeafbd8ea258f8e806ea2d0ccf2053b044b7f60a6a72ec427ef12c72d901a231602888550478ccb4924df9fd6e1d663cca2c48fe48f"
        }
      ],
      "licenses": [
        {
          "expression": "Python-2.0"
        }
      ],
      "name": "defusedxml",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/07/6c/aa3f2f849e01cb6a001cd8554a88d4c77c5c1a31c95bdf1cf9301e6d9ef4/defusedxml-0.7.1-py2.py3-none-any.whl"
        },
        {
          "name": "aboutcode:filename",
          "value": "defusedxml-0.7.1-py2.py3-none-any.whl"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "# Licensed to PSF under a Contributor Agreement.\n# See https://www.python.org/psf/license for licensing details.\n"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/defusedxml@0.7.1",
      "type": "library",
      "version": "0.7.1"
    },
    {
      "author": "",
      "bom-ref": "pkg:github/bitwarden/desktop@1.25.1?version_prefix=v",
      "copyright": "",
      "cpe": "",
      "description": "A secure and free password manager for all of your devices.",
      "hashes": [
        {
          "alg": "MD5",
          "content": "1ff816c0c56b1a67828f641d3bf89888"
        },
        {
          "alg": "SHA-1",
          "content": "89e804418549eabad0a16a720bbce2abfe8ea640"
        }
      ],
      "licenses": [
        {
          "expression": "GPL-3.0-only"
        }
      ],
      "name": "desktop",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/bitwarden/desktop/archive/refs/tags/v1.25.1.tar.gz"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "https://bitwarden.com"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "TypeScript"
        }
      ],
      "purl": "pkg:github/bitwarden/desktop@1.25.1?version_prefix=v",
      "type": "library",
      "version": "1.25.1"
    },
    {
      "author": "",
      "bom-ref": "pkg:github/discordjs/discord.js@12.5.3",
      "copyright": "",
      "cpe": "",
      "description": "A powerful library for interacting with the Discord API",
      "hashes": [
        {
          "alg": "MD5",
          "content": "2f097a36554d2247c659c97302154538"
        },
        {
          "alg": "SHA-1",
          "content": "7571bb24099cd0cb8a02055a0d0b5f85008ab32a"
        }
      ],
      "licenses": [
        {
          "expression": "Apache-2.0 AND MIT"
        }
      ],
      "name": "discord.js",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/discordjs/discord.js/archive/refs/tags/12.5.3.tar.gz"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "https://github.com/discordjs/discord.js#readme"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "JavaScript"
        }
      ],
      "purl": "pkg:github/discordjs/discord.js@12.5.3",
      "type": "library",
      "version": "12.5.3"
    },
    {
      "author": "",
      "bom-ref": "pkg:github/rapptz/discord.py@1.7.0?version_prefix=v",
      "copyright": "Copyright (c) Rapptz",
      "cpe": "",
      "description": "A Python wrapper for the Discord API",
      "hashes": [
        {
          "alg": "MD5",
          "content": "fff5b79a17c6744d967cc87d1dcf33f3"
        },
        {
          "alg": "SHA-1",
          "content": "4815e8bb632a724530efdb56f095bb8c9e94a020"
        }
      ],
      "licenses": [
        {
          "expression": "MIT"
        }
      ],
      "name": "discord.py",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/Rapptz/discord.py/archive/refs/tags/v1.7.0.tar.gz"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "https://github.com/Rapptz/discord.py"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:github/rapptz/discord.py@1.7.0?version_prefix=v",
      "type": "library",
      "version": "1.7.0"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/django@4.0.8",
      "copyright": "Copyright (c) Django Software Foundation and individual contributors",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "386349753c386e574dceca5067e2788a"
        },
        {
          "alg": "SHA-1",
          "content": "4cc6f7abda928a0b12cd1f1cd8ad3677519ca04e"
        },
        {
          "alg": "SHA-256",
          "content": "27cb08fa6458c1eff8b97c4c2d03774646fb26feeaa4587dca10c49e6d4fc6a3"
        },
        {
          "alg": "SHA-512",
          "content": "6ed9e63681c7e92c8016b4f902911eaa253a13028671e01e56c66b0dbb61ed957beddef38f3f614efbd8d1ff722e482526edc90f420b7d9470d30235bd6bf628"
        }
      ],
      "licenses": [
        {
          "expression": "BSD-3-Clause"
        }
      ],
      "name": "django",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/e1/d0/d90528978da16288d470bb423abad307ed7ae724090132ff6bf67d6a5579/Django-4.0.8-py3-none-any.whl"
        },
        {
          "name": "aboutcode:filename",
          "value": "Django-4.0.8-py3-none-any.whl"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "Permission is hereby granted, free of charge, to any person obtaining a copy\nof this software and associated documentation files (the \"Software\"), to deal\nin the Software without restriction, including without limitation the rights\nto use, copy, modify, merge, publish, distribute, sublicense, and/or sell\ncopies of the Software, and to permit persons to whom the Software is\nfurnished to do so, subject to the following conditions:\n\nThe above copyright notice and this permission notice shall be included in\nall copies or substantial portions of the Software.\n\nTHE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR\nIMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,\nFITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE\nAUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER\nLIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,\nOUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN\nTHE SOFTWARE."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/django@4.0.8",
      "type": "library",
      "version": "4.0.8"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/django-auth-ldap@4.1.0",
      "copyright": "Copyright (c) Peter Sagerson",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "47f7980b14b4eafa022fb7d70bd5fc0f"
        },
        {
          "alg": "SHA-1",
          "content": "e9b7c4cefc0d6e085ae74f3f7204494a9c7293d8"
        },
        {
          "alg": "SHA-256",
          "content": "68870e7921e84b1a9867e268a9c8a3e573e8a0d95ea08bcf31be178f5826ff36"
        },
        {
          "alg": "SHA-512",
          "content": "7805c21aa49445d9689baee06aceed176f7793a4fe6486cfd163485c7b99996b140881a9a52c31ca7d2fef51d77b1cb82060be6a7967f98867e66afeaa76e29c"
        }
      ],
      "licenses": [
        {
          "expression": "BSD-2-Clause"
        }
      ],
      "name": "django-auth-ldap",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/d1/34/e519840e68108c452d9ed559fb0ac091dcddf70db860c0d1c808d78c46fc/django_auth_ldap-4.1.0-py3-none-any.whl"
        },
        {
          "name": "aboutcode:filename",
          "value": "django_auth_ldap-4.1.0-py3-none-any.whl"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "Redistribution and use in source and binary forms, with or without modification,\nare permitted provided that the following conditions are met:\n\n- Redistributions of source code must retain the above copyright notice, this\n  list of conditions and the following disclaimer.\n\n- Redistributions in binary form must reproduce the above copyright notice, this\n  list of conditions and the following disclaimer in the documentation and/or\n  other materials provided with the distribution.\n\nTHIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS \"AS IS\" AND\nANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED\nWARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE\nDISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR\nANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES\n(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;\nLOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON\nANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT\n(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS\nSOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/django-auth-ldap@4.1.0",
      "type": "library",
      "version": "4.1.0"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/django-crispy-forms@1.13.0",
      "copyright": "Copyright (c) Miguel Araujo, Daniel Feldroy and contributors",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "4943ece1722c56e63ac0d2d0e8a9fd53"
        },
        {
          "alg": "SHA-1",
          "content": "146cfa382ee6455a53c1d46670ab517b546ebfd0"
        },
        {
          "alg": "SHA-256",
          "content": "9c49d29dd9e98dc2e6e3a8b02670d72deb6edf7bc616986ca412d72c306b36a0"
        },
        {
          "alg": "SHA-512",
          "content": "f01b2ccce9b6c997bf3bee827c0c5cac9648fc1f12afae51f544773b9d2f3bb9b8e60511cde1f3783ed394e997fa78a5b6965c5aaf2777306218d1f7db0d9ac3"
        }
      ],
      "licenses": [
        {
          "expression": "MIT"
        }
      ],
      "name": "django-crispy-forms",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/ed/b5/8e1ea4b9dfff8956035866b0b528794d5c6d1257c6696afa47c4d48f7c07/django_crispy_forms-1.13.0-py3-none-any.whl"
        },
        {
          "name": "aboutcode:filename",
          "value": "django_crispy_forms-1.13.0-py3-none-any.whl"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "Permission is hereby granted, free of charge, to any person\nobtaining a copy of this software and associated documentation\nfiles (the \"Software\"), to deal in the Software without\nrestriction, including without limitation the rights to use,\ncopy, modify, merge, publish, distribute, sublicense, and/or sell\ncopies of the Software, and to permit persons to whom the\nSoftware is furnished to do so, subject to the following\nconditions:\n\nThe above copyright notice and this permission notice shall be\nincluded in all copies or substantial portions of the Software.\n\nTHE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND,\nEXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES\nOF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND\nNONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT\nHOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY,\nWHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING\nFROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR\nOTHER DEALINGS IN THE SOFTWARE."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "HTML"
        }
      ],
      "purl": "pkg:pypi/django-crispy-forms@1.13.0",
      "type": "library",
      "version": "1.13.0"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/django-environ@0.4.5",
      "copyright": "Copyright (c) Daniele Faraglia",
      "cpe": "",
      "description": "Django-environ allows you to utilize 12factor inspired environment variables to configure your Django application.",
      "hashes": [
        {
          "alg": "MD5",
          "content": "6877c282082fb4e3a7bd90ef18cf1623"
        },
        {
          "alg": "SHA-1",
          "content": "8154e8637c2d222034f0b3e66d1e882149e45b9c"
        },
        {
          "alg": "SHA-256",
          "content": "c57b3c11ec1f319d9474e3e5a79134f40174b17c7cc024bbb2fad84646b120c4"
        },
        {
          "alg": "SHA-512",
          "content": "919aab6595440c2fe3970d3b791cf2a0a17c5d0aba17c181d9bf3fccfcce5c683c00ee5eb74447820636bdeb14543112ecfe2e7d0e1854070e8af2a5000688cf"
        }
      ],
      "licenses": [
        {
          "expression": "MIT"
        }
      ],
      "name": "django-environ",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/9f/32/76295a1a5d00bf556c495216581c6997e7fa5f533b2229e0a9d6cbaa95ae/django_environ-0.4.5-py2.py3-none-any.whl"
        },
        {
          "name": "aboutcode:filename",
          "value": "django_environ-0.4.5-py2.py3-none-any.whl"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "https://github.com/joke2k/django-environ/"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "This project is licensed under the MIT License"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/django-environ@0.4.5",
      "type": "library",
      "version": "0.4.5"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/django-grappelli@3.0.3",
      "copyright": "Copyright (c) django-grappelli project contributors",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "cda71cef8331336d7ffd214b0aa22520"
        },
        {
          "alg": "SHA-1",
          "content": "b69f4cf689ab4ef6d1c404b29b5bbfa426beb236"
        },
        {
          "alg": "SHA-256",
          "content": "a98883407f995896f4c4d108ef3ef6cfc00e581211738c5a13c536950a95bcc8"
        },
        {
          "alg": "SHA-512",
          "content": "03b8957c7ed70324da6df205a732ee8bbe902f53e54c6a5975c9d1d1ea99c640aba2deff46db3c7b40a5ef8cc6eb52972cf8a0fddbf04c2d763bc0bce1cae31c"
        }
      ],
      "licenses": [
        {
          "expression": "BSD-3-Clause AND MIT"
        }
      ],
      "name": "django-grappelli",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/28/41/7b1ee518fe1bc60baa1bbf35b465419176192c76dc0f9169ca06bb06f494/django_grappelli-3.0.3-py2.py3-none-any.whl"
        },
        {
          "name": "aboutcode:filename",
          "value": "django_grappelli-3.0.3-py2.py3-none-any.whl"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "Released under the MIT license AND BSD-3-Clause"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "JavaScript"
        }
      ],
      "purl": "pkg:pypi/django-grappelli@3.0.3",
      "type": "library",
      "version": "3.0.3"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/django-guardian@2.4.0",
      "copyright": "Copyright (c) Lukasz Balcerzak, Code Charm Ltd",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "dfe84f444671fd8769099fb6e7746a6a"
        },
        {
          "alg": "SHA-1",
          "content": "ea0c714588f900d1011bb2f0aa1fe0b5e6b40710"
        },
        {
          "alg": "SHA-256",
          "content": "440ca61358427e575323648b25f8384739e54c38b3d655c81d75e0cd0d61b697"
        },
        {
          "alg": "SHA-512",
          "content": "0e7ce10500e8167b5d06c941dff5bc9302cbb10015b4d8c3eb144b068ce185b88b6968c07041ee360abc3724a0b186e0521ee045dff670f95ac61bb11463e58a"
        }
      ],
      "licenses": [
        {
          "expression": "BSD-2-Clause AND MIT"
        }
      ],
      "name": "django-guardian",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/a2/25/869df12e544b51f583254aadbba6c1a95e11d2d08edeb9e58dd715112db5/django_guardian-2.4.0-py3-none-any.whl"
        },
        {
          "name": "aboutcode:filename",
          "value": "django_guardian-2.4.0-py3-none-any.whl"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "Released under the MIT license and BSD-2-Clause"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/django-guardian@2.4.0",
      "type": "library",
      "version": "2.4.0"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/django-notifications-hq@1.7.0",
      "copyright": "Copyright (c) django-notifications team",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "9efc4acd9747f1e9a68f885c7bdb18fd"
        },
        {
          "alg": "SHA-1",
          "content": "29f495feabced98e10fb678db85e83d34974ab8a"
        },
        {
          "alg": "SHA-256",
          "content": "5540a99681c0e73399726d662ab74f23c45ba385036431ecd75ffc962f02c793"
        },
        {
          "alg": "SHA-512",
          "content": "e113dcb709da5b9bca371ab19433b076cd7acb6d7ad14ec3b11c5f458fe06b6fc9931886fbf4e7e148e5728b3a22078ac8b8de470704d5328b4d1719f4fa97ba"
        }
      ],
      "licenses": [
        {
          "expression": "BSD-3-Clause"
        }
      ],
      "name": "django-notifications-hq",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/08/26/207075a81cd8b58191aeadf0a336d11a6c47cc0454e66ab1661d92835e96/django_notifications_hq-1.7.0-py2.py3-none-any.whl"
        },
        {
          "name": "aboutcode:filename",
          "value": "django_notifications_hq-1.7.0-py2.py3-none-any.whl"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "Redistribution and use in source and binary forms, with or without\nmodification, are permitted provided that the following conditions are\nmet:\n\n    * Redistributions of source code must retain the above copyright\n      notice, this list of conditions and the following disclaimer.\n    * Redistributions in binary form must reproduce the above\n      copyright notice, this list of conditions and the following\n      disclaimer in the documentation and/or other materials provided\n      with the distribution.\n    * Neither the name of the author nor the names of other\n      contributors may be used to endorse or promote products derived\n      from this software without specific prior written permission.\n\nTHIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS\n\"AS IS\" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT\nLIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR\nA PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT\nOWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,\nSPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT\nLIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,\nDATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY\nTHEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT\n(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE\nOF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/django-notifications-hq@1.7.0",
      "type": "library",
      "version": "1.7.0"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/django-registration@3.3",
      "copyright": "Copyright (c) django-registration team",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "d357d0a4ec527111e1d4d8222de47943"
        },
        {
          "alg": "SHA-1",
          "content": "e5101837ba72b506aad2cea3db92cc21b20f8d22"
        },
        {
          "alg": "SHA-256",
          "content": "dfa176f594fb465c93495caa55686be723a15829769511383e25172d2efbd0e6"
        },
        {
          "alg": "SHA-512",
          "content": "6dfe002a6713ea4de215c19df280a78b92e8a7198f61a94b4a21718aaa2cc2dcfcdd443c51ed17c788c57d7d34bff72f5302a9886d6e650ff53dbbcbb5489a9b"
        }
      ],
      "licenses": [
        {
          "expression": "BSD-3-Clause"
        }
      ],
      "name": "django-registration",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/3f/21/95c0ef9415d26ade9467341b7826caf5024af87aa9d9b6834dfa26ff9cc5/django_registration-3.3-py3-none-any.whl"
        },
        {
          "name": "aboutcode:filename",
          "value": "django_registration-3.3-py3-none-any.whl"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "Redistribution and use in source and binary forms, with or without\nmodification, are permitted provided that the following conditions are\nmet:\n\n    * Redistributions of source code must retain the above copyright\n      notice, this list of conditions and the following disclaimer.\n    * Redistributions in binary form must reproduce the above\n      copyright notice, this list of conditions and the following\n      disclaimer in the documentation and/or other materials provided\n      with the distribution.\n    * Neither the name of the author nor the names of other\n      contributors may be used to endorse or promote products derived\n      from this software without specific prior written permission.\n\nTHIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS\n\"AS IS\" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT\nLIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR\nA PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT\nOWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,\nSPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT\nLIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,\nDATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY\nTHEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT\n(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE\nOF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/django-registration@3.3",
      "type": "library",
      "version": "3.3"
    },
    {
      "author": "",
      "bom-ref": "pkg:github/zapier/django-rest-hooks@1.6.0?version_prefix=v",
      "copyright": "Copyright (c) Zapier Inc.",
      "cpe": "",
      "description": "A powerful mechanism for sending real time API notifications via a new subscription model.",
      "hashes": [
        {
          "alg": "MD5",
          "content": "798175ec2c6f1d26c76ab7318ea91e16"
        },
        {
          "alg": "SHA-1",
          "content": "ffc427f42fd87cc4b909f5e52439f64ad33e4463"
        },
        {
          "alg": "SHA-256",
          "content": "643cf2c55f3a9e13b4fc0c4ff5e0b39c65495991738fe39d1602351229f49d43"
        },
        {
          "alg": "SHA-512",
          "content": "02879c5c9882f17a5cc76506af11625b4fad78ff6179b09456aa38012c7db2408d1fb1579301fe2bde7a36e18e2a10b8693acb6ec5cd767b090570de0c92f07d"
        }
      ],
      "licenses": [
        {
          "expression": "ISC"
        }
      ],
      "name": "django-rest-hooks",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/zapier/django-rest-hooks/archive/refs/tags/v1.6.0.tar.gz"
        },
        {
          "name": "aboutcode:filename",
          "value": "django-rest-hooks-1.6.0.tar.gz"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "http://github.com/zapier/django-rest-hooks"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "Permission to use, copy, modify, and/or distribute this software for any\npurpose with or without fee is hereby granted, provided that the above\ncopyright notice and this permission notice appear in all copies.\n\nTHE SOFTWARE IS PROVIDED \"AS IS\" AND THE AUTHOR DISCLAIMS ALL WARRANTIES\nWITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF\nMERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR\nANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES\nWHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN\nACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF\nOR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.\n"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:github/zapier/django-rest-hooks@1.6.0?version_prefix=v",
      "type": "library",
      "version": "1.6.0"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/djangorestframework@3.13.1",
      "copyright": "Copyright (c) Encode OSS Ltd (https://www.encode.io/)",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "8ce0d1431eda42390413679b6415e140"
        },
        {
          "alg": "SHA-1",
          "content": "a9a7564895002e7c2d830a554657b8d43d3dd6e8"
        },
        {
          "alg": "SHA-256",
          "content": "24c4bf58ed7e85d1fe4ba250ab2da926d263cd57d64b03e8dcef0ac683f8b1aa"
        },
        {
          "alg": "SHA-512",
          "content": "69a9a639fe9a1a03a3f776c43fc806072aa98d56f130a8d38f5e1807ee8750f64d272f76a33801983a5d8adb887bae3de6f52b5935a0a91dbf1fdd671477a3e0"
        }
      ],
      "licenses": [
        {
          "expression": "BSD-3-Clause"
        }
      ],
      "name": "djangorestframework",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/c8/45/2588c7c5a01a7da6822c6ffbc9a731d498c318a803a29ae780ec635ea41d/djangorestframework-3.13.1-py3-none-any.whl"
        },
        {
          "name": "aboutcode:filename",
          "value": "djangorestframework-3.13.1-py3-none-any.whl"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "# License\nRedistribution and use in source and binary forms, with or without\nmodification, are permitted provided that the following conditions are met:\n\n* Redistributions of source code must retain the above copyright notice, this\n  list of conditions and the following disclaimer.\n\n* Redistributions in binary form must reproduce the above copyright notice,\n  this list of conditions and the following disclaimer in the documentation\n  and/or other materials provided with the distribution.\n\n* Neither the name of the copyright holder nor the names of its\n  contributors may be used to endorse or promote products derived from\n  this software without specific prior written permission.\n\nTHIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS \"AS IS\" AND\nANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED\nWARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE\nDISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE\nFOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL\nDAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR\nSERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER\nCAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,\nOR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE\nOF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/djangorestframework@3.13.1",
      "type": "library",
      "version": "3.13.1"
    },
    {
      "author": "",
      "bom-ref": "pkg:github/ffmpeg/ffmpeg@n4.4",
      "copyright": "",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "8c52b3e3926fdbac1e7be3761035741d"
        },
        {
          "alg": "SHA-1",
          "content": "61725b8ca9298816b7485a7bf4ba0b54bc9ea2f6"
        }
      ],
      "licenses": [
        {
          "expression": "(LGPL-2.1-only OR LGPL-3.0-only) AND GPL-2.0-or-later AND LicenseRef-scancode-other-permissive"
        }
      ],
      "name": "ffmpeg",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/FFmpeg/FFmpeg/archive/refs/tags/n4.4.tar.gz"
        },
        {
          "name": "aboutcode:filename",
          "value": "FFmpeg-n4.4.tar.gz"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "C++"
        }
      ],
      "purl": "pkg:github/ffmpeg/ffmpeg@n4.4",
      "type": "library",
      "version": "n4.4"
    },
    {
      "author": "",
      "bom-ref": "pkg:generic/ffmpeg-6.0.tar.xz?download_url=https://www.ffmpeg.org/releases/ffmpeg-6.0.tar.xz",
      "copyright": "Copyright (c) Fabrice Bellard, Diego Biurrun, Mans Rullgard",
      "cpe": "",
      "description": "A complete, cross-platform solution to record, convert and stream audio and video.",
      "hashes": [
        {
          "alg": "MD5",
          "content": "47b6c5d930937413c3e308e2fdb3dfb5"
        },
        {
          "alg": "SHA-1",
          "content": "e934c379c99fb02c3cb7bb89c041ea2c028fb66b"
        },
        {
          "alg": "SHA-256",
          "content": "57be87c22d9b49c112b6d24bc67d42508660e6b718b3db89c44e47e289137082"
        },
        {
          "alg": "SHA-512",
          "content": "4d0e8f635d5a1633710f30cb3e0a854b6ca3bf85e33a289d1ec7aca2ad55dc4910010bc9cf3f13eee9f6decb9d50a0df6d7aa5a342f308c3868d2730f3a6b980"
        }
      ],
      "licenses": [
        {
          "expression": "Apache-2.0 AND GPL-2.0-or-later AND GPL-3.0-or-later AND IJG AND LGPL-2.0-or-later AND LGPL-2.1-or-later AND LGPL-3.0-or-later AND MIT AND LicenseRef-scancode-other-permissive"
        }
      ],
      "name": "ffmpeg-6.0.tar.xz",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://www.ffmpeg.org/releases/ffmpeg-6.0.tar.xz"
        },
        {
          "name": "aboutcode:filename",
          "value": "ffmpeg-6.0.tar.xz"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "# License\n\nMost files in FFmpeg are under the GNU Lesser General Public License version 2.1\nor later (LGPL v2.1+). Read the file `COPYING.LGPLv2.1` for details. Some other\nfiles have MIT/X11/BSD-style licenses. In combination the LGPL v2.1+ applies to\nFFmpeg.\n\nSome optional parts of FFmpeg are licensed under the GNU General Public License\nversion 2 or later (GPL v2+). See the file `COPYING.GPLv2` for details. None of\nthese parts are used by default, you have to explicitly pass `--enable-gpl` to\nconfigure to activate them. In this case, FFmpeg's license changes to GPL v2+.\n\nSpecifically, the GPL parts of FFmpeg are:\n\n- libpostproc\n- optional x86 optimization in the files\n    - `libavcodec/x86/flac_dsp_gpl.asm`\n    - `libavcodec/x86/idct_mmx.c`\n    - `libavfilter/x86/vf_removegrain.asm`\n- the following building and testing tools\n    - `compat/solaris/make_sunver.pl`\n    - `doc/t2h.pm`\n    - `doc/texi2pod.pl`\n    - `libswresample/tests/swresample.c`\n    - `tests/checkasm/*`\n    - `tests/tiny_ssim.c`\n- the following filters in libavfilter:\n    - `signature_lookup.c`\n    - `vf_blackframe.c`\n    - `vf_boxblur.c`\n    - `vf_colormatrix.c`\n    - `vf_cover_rect.c`\n    - `vf_cropdetect.c`\n    - `vf_delogo.c`\n    - `vf_eq.c`\n    - `vf_find_rect.c`\n    - `vf_fspp.c`\n    - `vf_histeq.c`\n    - `vf_hqdn3d.c`\n    - `vf_kerndeint.c`\n    - `vf_lensfun.c` (GPL version 3 or later)\n    - `vf_mcdeint.c`\n    - `vf_mpdecimate.c`\n    - `vf_nnedi.c`\n    - `vf_owdenoise.c`\n    - `vf_perspective.c`\n    - `vf_phase.c`\n    - `vf_pp.c`\n    - `vf_pp7.c`\n    - `vf_pullup.c`\n    - `vf_repeatfields.c`\n    - `vf_sab.c`\n    - `vf_signature.c`\n    - `vf_smartblur.c`\n    - `vf_spp.c`\n    - `vf_stereo3d.c`\n    - `vf_super2xsai.c`\n    - `vf_tinterlace.c`\n    - `vf_uspp.c`\n    - `vf_vaguedenoiser.c`\n    - `vsrc_mptestsrc.c`\n\nShould you, for whatever reason, prefer to use version 3 of the (L)GPL, then\nthe configure parameter `--enable-version3` will activate this licensing option\nfor you. Read the file `COPYING.LGPLv3` or, if you have enabled GPL parts,\n`COPYING.GPLv3` to learn the exact legal terms that apply in this case.\n\nThere are a handful of files under other licensing terms, namely:\n\n* The files `libavcodec/jfdctfst.c`, `libavcodec/jfdctint_template.c` and\n  `libavcodec/jrevdct.c` are taken from libjpeg, see the top of the files for\n  licensing details. Specifically note that you must credit the IJG in the\n  documentation accompanying your program if you only distribute executables.\n  You must also indicate any changes including additions and deletions to\n  those three files in the documentation.\n* `tests/reference.pnm` is under the expat license.\n\n\n## External libraries\n\nFFmpeg can be combined with a number of external libraries, which sometimes\naffect the licensing of binaries resulting from the combination.\n\n### Compatible libraries\n\nThe following libraries are under GPL version 2:\n- avisynth\n- frei0r\n- libcdio\n- libdavs2\n- librubberband\n- libvidstab\n- libx264\n- libx265\n- libxavs\n- libxavs2\n- libxvid\n\nWhen combining them with FFmpeg, FFmpeg needs to be licensed as GPL as well by\npassing `--enable-gpl` to configure.\n\nThe following libraries are under LGPL version 3:\n- gmp\n- libaribb24\n- liblensfun\n\nWhen combining them with FFmpeg, use the configure option `--enable-version3` to\nupgrade FFmpeg to the LGPL v3.\n\nThe VMAF, mbedTLS, RK MPI, OpenCORE and VisualOn libraries are under the Apache License\n2.0. That license is incompatible with the LGPL v2.1 and the GPL v2, but not with\nversion 3 of those licenses. So to combine these libraries with FFmpeg, the\nlicense version needs to be upgraded by passing `--enable-version3` to configure.\n\nThe smbclient library is under the GPL v3, to combine it with FFmpeg,\nthe options `--enable-gpl` and `--enable-version3` have to be passed to\nconfigure to upgrade FFmpeg to the GPL v3.\n\n### Incompatible libraries\n\nThere are certain libraries you can combine with FFmpeg whose licenses are not\ncompatible with the GPL and/or the LGPL. If you wish to enable these\nlibraries, even in circumstances that their license may be incompatible, pass\n`--enable-nonfree` to configure. This will cause the resulting binary to be\nunredistributable.\n\nThe Fraunhofer FDK AAC and OpenSSL libraries are under licenses which are\nincompatible with the GPLv2 and v3. To the best of our knowledge, they are\ncompatible with the LGPL."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "C"
        }
      ],
      "purl": "pkg:generic/ffmpeg-6.0.tar.xz?download_url=https://www.ffmpeg.org/releases/ffmpeg-6.0.tar.xz",
      "type": "library",
      "version": ""
    },
    {
      "author": "",
      "bom-ref": "pkg:github/datatables/fixedheader@2.1.0",
      "copyright": "Copyright 2008-2012 Allan Jardine.",
      "cpe": "",
      "description": "\"Fix\" a header at the top of the table, so it scrolls with the table.",
      "hashes": [
        {
          "alg": "MD5",
          "content": "82bac258da8dbef2e61991ec25e0a44a"
        },
        {
          "alg": "SHA-1",
          "content": "3506f4e36fea07e779dadb2b72a01b1badb3487e"
        },
        {
          "alg": "SHA-256",
          "content": "640aee5fa815a7ddf8be7e5d084f9f87f114dad83ec90d0bf3c6d207ed11bbc1"
        },
        {
          "alg": "SHA-512",
          "content": "889a864cf21d200876caa690b2a1ef2c0bc1386c611c4b3618a95315fd3b9036b4bc40d816ced6acd4c6e54bbeb97a4613e218e7072bb2a477c7a7883c3342b4"
        }
      ],
      "licenses": [
        {
          "expression": "BSD-3-Clause"
        }
      ],
      "name": "fixedheader",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/DataTables/FixedHeader/archive/2.1.0.zip"
        },
        {
          "name": "aboutcode:filename",
          "value": "FixedHeader-2.1.0.zip"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "http://datatables.net/"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "* File:        FixedHeader.js\n * Version:     2.1.0-dev\n * Description: \"Fix\" a header at the top of the table, so it scrolls with the table\n * Author:      Allan Jardine (www.sprymedia.co.uk)\n * Created:     Wed 16 Sep 2009 19:46:30 BST\n * Language:    Javascript\n * License:     GPL v2 or BSD 3 point style\n * Project:     Just a little bit of fun - enjoy :-)\n * Contact:     www.sprymedia.co.uk/contact\n\n * Copyright 2009-2013 Allan Jardine.\n * This source file is free software, under either the GPL v2 license or a\n * BSD style license, available at:\n *   http://datatables.net/license_gpl2\n *   http://datatables.net/license_bsd"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "JavaScript"
        }
      ],
      "purl": "pkg:github/datatables/fixedheader@2.1.0",
      "type": "library",
      "version": "2.1.0"
    },
    {
      "author": "",
      "bom-ref": "pkg:github/flatpickr/flatpickr@4.5.2?version_prefix=v",
      "copyright": "Copyright (c) Gregory Petrosyan",
      "cpe": "",
      "description": "lightweight, powerful javascript datetimepicker with no dependencies",
      "hashes": [
        {
          "alg": "MD5",
          "content": "385091d9ee59656ba200cb6010295c4d"
        },
        {
          "alg": "SHA-1",
          "content": "1a327d9397c3ae1908b96710a02d729c538f7a91"
        },
        {
          "alg": "SHA-256",
          "content": "22192cb89f6eddac35891427f8dd6e0ebe406ddd1c8d4bb35bca238788601172"
        },
        {
          "alg": "SHA-512",
          "content": "3e642cccc676a74d92caa6496f551ea856389be31ff906d2690a95c44fde3c9a9d407061c629a245dacab46cc146861fc6577450a5b3a573d6128e40f79309e5"
        }
      ],
      "licenses": [
        {
          "expression": "MIT"
        }
      ],
      "name": "flatpickr",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/flatpickr/flatpickr/archive/v4.5.2.tar.gz"
        },
        {
          "name": "aboutcode:filename",
          "value": "flatpickr-4.5.2.tar.gz"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "https://flatpickr.js.org/"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "The MIT License (MIT)\n\nPermission is hereby granted, free of charge, to any person obtaining a copy\nof this software and associated documentation files (the \"Software\"), to deal\nin the Software without restriction, including without limitation the rights\nto use, copy, modify, merge, publish, distribute, sublicense, and/or sell\ncopies of the Software, and to permit persons to whom the Software is\nfurnished to do so, subject to the following conditions:\n\nThe above copyright notice and this permission notice shall be included in all\ncopies or substantial portions of the Software.\n\nTHE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR\nIMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,\nFITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE\nAUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER\nLIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,\nOUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE\nSOFTWARE.\n"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "TypeScript"
        }
      ],
      "purl": "pkg:github/flatpickr/flatpickr@4.5.2?version_prefix=v",
      "type": "library",
      "version": "4.5.2"
    },
    {
      "author": "",
      "bom-ref": "pkg:generic/fontawesome-free-5.13.0-web.zip?download_url=https://use.fontawesome.com/releases/v5.13.0/fontawesome-free-5.13.0-web.zip",
      "copyright": "Copyright (c) Font Awesome by Dave Gandy - http://fontawesome.io",
      "cpe": "",
      "description": "The iconic SVG, font, and CSS toolkit",
      "hashes": [
        {
          "alg": "MD5",
          "content": "f1a0d77d969e8ef5726e3d7f7209aefc"
        },
        {
          "alg": "SHA-1",
          "content": "69a70ce9013dc238e08e013095edb7011bd79ecf"
        },
        {
          "alg": "SHA-256",
          "content": "3b8684515c1a5dda74c55e8137d70403754aa3224addaf37459624cb5a41f65b"
        },
        {
          "alg": "SHA-512",
          "content": "3a019cd7c49021cb8afee5939a376cb92142d257c253b79930ec5475e392d6f175cee8af2cf7fe6ec0e841cf39d7438954f08a818cfa5df775545ede11a26c2b"
        }
      ],
      "licenses": [
        {
          "expression": "OFL-1.1 AND MIT AND CC-BY-3.0"
        }
      ],
      "name": "fontawesome-free-5.13.0-web.zip",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://use.fontawesome.com/releases/v5.13.0/fontawesome-free-5.13.0-web.zip"
        },
        {
          "name": "aboutcode:filename",
          "value": "fontawesome-free-5.13.0-web.zip"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "https://github.com/FortAwesome/Font-Awesome"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "Font Awesome Free License\n-------------------------\n\nFont Awesome Free is free, open source, and GPL friendly. You can use it for\ncommercial projects, open source projects, or really almost whatever you want.\nFull Font Awesome Free license: https://fontawesome.com/license.\n\n# Icons: CC BY 4.0 License (https://creativecommons.org/licenses/by/4.0/)\nIn the Font Awesome Free download, the CC BY 4.0 license applies to all icons\npackaged as SVG and JS file types.\n\n# Fonts: SIL OFL 1.1 License (https://scripts.sil.org/OFL)\nIn the Font Awesome Free download, the SIL OLF license applies to all icons\npackaged as web and desktop font files.\n\n# Code: MIT License (https://opensource.org/licenses/MIT)\nIn the Font Awesome Free download, the MIT license applies to all non-font and\nnon-icon files.\n\n# Attribution\nAttribution is required by MIT, SIL OLF, and CC BY licenses. Downloaded Font\nAwesome Free files already contain embedded comments with sufficient\nattribution, so you shouldn't need to do anything additional when using these\nfiles normally."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "CSS"
        }
      ],
      "purl": "pkg:generic/fontawesome-free-5.13.0-web.zip?download_url=https://use.fontawesome.com/releases/v5.13.0/fontawesome-free-5.13.0-web.zip",
      "type": "library",
      "version": ""
    },
    {
      "author": "",
      "bom-ref": "pkg:github/foundation/foundation-sites@6.4.1?version_prefix=v",
      "copyright": "",
      "cpe": "",
      "description": "The most advanced responsive front-end framework in the world.",
      "hashes": [
        {
          "alg": "MD5",
          "content": "779cd008c0cf59fcc0cceda610e0497d"
        },
        {
          "alg": "SHA-1",
          "content": "364bd4d218d78b9254ec4aa2ccb5bce35b20e552"
        },
        {
          "alg": "SHA-256",
          "content": "6c986c9c4cf7e117b056da6dfc2817f9b9bcfcbf6615e2e8620bbf5acad446f8"
        },
        {
          "alg": "SHA-512",
          "content": "0e21b58798664ab3ae2815533a6bb4194cd56728717138830e9247538ab5e5b13beb0b09860e45d8039160756e24abc48048870b4316617ac05359e2012d4e5b"
        }
      ],
      "licenses": [
        {
          "expression": "MIT"
        }
      ],
      "name": "foundation-sites",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/foundation/foundation-sites/archive/refs/tags/v6.4.1.zip"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "http://foundation.zurb.com/sites"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "JavaScript"
        }
      ],
      "purl": "pkg:github/foundation/foundation-sites@6.4.1?version_prefix=v",
      "type": "library",
      "version": "6.4.1"
    },
    {
      "author": "",
      "bom-ref": "pkg:github/foundation/foundation-sites@6.7.5?version_prefix=v",
      "copyright": "",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "0303a4d9dda88737b687477feb150b45"
        },
        {
          "alg": "SHA-1",
          "content": "6a0ec851772c71cd75163255f39455e5603269d9"
        },
        {
          "alg": "SHA-256",
          "content": "14cd34ab34fe69dd45d458e3d9c789da35541cef353af624c2846d4c68337696"
        },
        {
          "alg": "SHA-512",
          "content": "012e47f3188e655c244363318d8cadc5ee0d12be6bee0622a7e9fbbc3cd89a6004fc6a66168a2f1b5bf2477a8d8c7af92bac85938224015666508f8aba9de376"
        }
      ],
      "licenses": [
        {
          "expression": "MIT"
        }
      ],
      "name": "foundation-sites",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/foundation/foundation-sites/archive/refs/tags/v6.7.5.zip"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "https://get.foundation"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "PHP"
        }
      ],
      "purl": "pkg:github/foundation/foundation-sites@6.7.5?version_prefix=v",
      "type": "library",
      "version": "6.7.5"
    },
    {
      "author": "",
      "bom-ref": "pkg:github/ethereum/go-ethereum@1.10.1?version_prefix=v",
      "copyright": "Copyright (c) go-ethereum project contributors",
      "cpe": "",
      "description": "Official Golang implementation of the Ethereum protocol",
      "hashes": [
        {
          "alg": "MD5",
          "content": "cf31bc3457bea20abf5bea8bc1b2b6b5"
        },
        {
          "alg": "SHA-1",
          "content": "d7be25033f1aeb0eba7aedb73b1dd8215f8070dd"
        },
        {
          "alg": "SHA-256",
          "content": "485ff7b9e5a34457ab424d7e2cb8d377dc571e8daf666e065a0a327b9e413cab"
        },
        {
          "alg": "SHA-512",
          "content": "94626dbddb4da44e8c6695734cff940f4bbb7baafa23cf34d7fd2a48270d0f6e3df0a171b38df077eba6b4dcdaf526ec12c755a159ef27a5dab8656fe3c013e4"
        }
      ],
      "licenses": [
        {
          "expression": "LGPL-3.0-or-later AND GPL-3.0-or-later AND LicenseRef-scancode-other-permissive"
        }
      ],
      "name": "go-ethereum",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/ethereum/go-ethereum/archive/refs/tags/v1.10.1.tar.gz"
        },
        {
          "name": "aboutcode:filename",
          "value": "go-ethereum-1.10.1.tar.gz"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "## License\n\nThe go-ethereum library (i.e. all code outside of the `cmd` directory) is licensed under the\n[GNU Lesser General Public License v3.0](https://www.gnu.org/licenses/lgpl-3.0.en.html),\nalso included in our repository in the `COPYING.LESSER` file.\n\nThe go-ethereum binaries (i.e. all code inside of the `cmd` directory) is licensed under the\n[GNU General Public License v3.0](https://www.gnu.org/licenses/gpl-3.0.en.html), also\nincluded in our repository in the `COPYING` file."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Go"
        }
      ],
      "purl": "pkg:github/ethereum/go-ethereum@1.10.1?version_prefix=v",
      "type": "library",
      "version": "1.10.1"
    },
    {
      "author": "",
      "bom-ref": "pkg:github/harmony-one/harmony@3.1.3?version_prefix=v",
      "copyright": "Harmony (c)",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "11fe6147d3d1c97de6b68a5faea5a715"
        },
        {
          "alg": "SHA-1",
          "content": "10f5672f4e7bc47b5d5e96cb82769734f502ec32"
        }
      ],
      "licenses": [
        {
          "expression": "LGPL-3.0-or-later AND LicenseRef-scancode-other-permissive"
        }
      ],
      "name": "harmony",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/harmony-one/harmony/archive/refs/tags/v3.1.3.tar.gz"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Go"
        }
      ],
      "purl": "pkg:github/harmony-one/harmony@3.1.3?version_prefix=v",
      "type": "library",
      "version": "3.1.3"
    },
    {
      "author": "",
      "bom-ref": "pkg:github/chinchang/hint.css@2.3.2?version_prefix=v",
      "copyright": "Copyright (c) Kushagra Gour",
      "cpe": "",
      "description": "A CSS only tooltip library for your lovely websites.",
      "hashes": [
        {
          "alg": "MD5",
          "content": "80ba82515eb6aae7369a2c91f3c54cc1"
        },
        {
          "alg": "SHA-1",
          "content": "ab50d1ff28e42bda0c87e1f91d5549f5897b6282"
        },
        {
          "alg": "SHA-256",
          "content": "c1d5df351bc2e97d01e721f674511b8fea794a0dfb4697880877a7a607c7a060"
        },
        {
          "alg": "SHA-512",
          "content": "a1d53b44a6bb3a70d5c2923b405cf909449da2c4b52129792d0b08a37d5a60a974aa5200d38a2d4bff2f4721b306f1e353492494b1d822356754144ff1fa23f5"
        }
      ],
      "licenses": [
        {
          "expression": "MIT"
        }
      ],
      "name": "hint.css",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/chinchang/hint.css/archive/v2.3.2.tar.gz"
        },
        {
          "name": "aboutcode:filename",
          "value": "hint.css-2.3.2.tar.gz"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "http://kushagragour.in/lab/hint/"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "Permission is hereby granted, free of charge, to any person\nobtaining a copy of this software and associated documentation\nfiles (the \"Software\"), to deal in the Software without\nrestriction, including without limitation the rights to use,\ncopy, modify, merge, publish, distribute, sublicense, and/or sell\ncopies of the Software, and to permit persons to whom the\nSoftware is furnished to do so, subject to the following\nconditions:\n\nThe above copyright notice and this permission notice shall be\nincluded in all copies or substantial portions of the Software.\n\nTHE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND,\nEXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES\nOF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND\nNONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT\nHOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY,\nWHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING\nFROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR\nOTHER DEALINGS IN THE SOFTWARE."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "CSS"
        }
      ],
      "purl": "pkg:github/chinchang/hint.css@2.3.2?version_prefix=v",
      "type": "library",
      "version": "2.3.2"
    },
    {
      "author": "",
      "bom-ref": "pkg:github/ipmitool/ipmitool@IPMITOOL_1_8_19",
      "copyright": "",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "0aa41c99d93ce129cf00a9b8803ed8c9"
        },
        {
          "alg": "SHA-1",
          "content": "92620c40a0f2d5fbe72e774385a55a53aa4ec448"
        },
        {
          "alg": "SHA-256",
          "content": "48b010e7bcdf93e4e4b6e43c53c7f60aa6873d574cbd45a8d86fa7aaeebaff9c"
        },
        {
          "alg": "SHA-512",
          "content": "2d91706e9feba4b2ce4808eca087b81b842c4292a5840830001919c06ec8babd8f8761b74bb9dcf8fbc7765f028a5b1a192a3c1b643f2adaa157fed6fb0d1ee3"
        }
      ],
      "licenses": [
        {
          "expression": "BSD-3-Clause-Sun AND BSD-3-Clause"
        }
      ],
      "name": "ipmitool",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/ipmitool/ipmitool/archive/refs/tags/IPMITOOL_1_8_19.tar.gz"
        },
        {
          "name": "aboutcode:filename",
          "value": "ipmitool-IPMITOOL_1_8_19.tar.gz"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "C"
        }
      ],
      "purl": "pkg:github/ipmitool/ipmitool@IPMITOOL_1_8_19",
      "type": "library",
      "version": "IPMITOOL_1_8_19"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/isort@5.10.1",
      "copyright": "Copyright (c) Taneli Hukkinen, Timothy Edmund Crosley",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "da9d912dc0b12468db6f88a4e2a2f04e"
        },
        {
          "alg": "SHA-1",
          "content": "1f1883fc6704c594e14aa125d52a20c6fdef56fb"
        },
        {
          "alg": "SHA-256",
          "content": "6f62d78e2f89b4500b080fe3a81690850cd254227f27f75c3a0c491a1f351ba7"
        },
        {
          "alg": "SHA-512",
          "content": "11d69ee1bd7aabc9c0324d395981b0c3c6750ff3794ebd10a2f923076893438e34d2ef41caf46d70c2189f80c9db342f882c28bf5d0a6de05c989aec999b809e"
        }
      ],
      "licenses": [
        {
          "expression": "MIT"
        }
      ],
      "name": "isort",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/b8/5b/f18e227df38b94b4ee30d2502fd531bebac23946a2497e5595067a561274/isort-5.10.1-py3-none-any.whl"
        },
        {
          "name": "aboutcode:filename",
          "value": "isort-5.10.1-py3-none-any.whl"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "Classifier: License :: OSI Approved :: MIT License"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/isort@5.10.1",
      "type": "library",
      "version": "5.10.1"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/itypes@1.2.0",
      "copyright": "Copyright (c) Tom Christie",
      "cpe": "",
      "description": "Basic immutable container types for Python.",
      "hashes": [
        {
          "alg": "MD5",
          "content": "c5fe660c8dda870f7e64896c8f324bc4"
        },
        {
          "alg": "SHA-1",
          "content": "96cf83ac83f3788aa55caaf851416ba486cd0566"
        },
        {
          "alg": "SHA-256",
          "content": "03da6872ca89d29aef62773672b2d408f490f80db48b23079a4b194c86dd04c6"
        },
        {
          "alg": "SHA-512",
          "content": "873272aea891f18527fed807e23046650cf43ab34fd49923e6522f408cc0cf0feb152d35a41878dab99c870e1329af18bb3b11c4e19c85c1979232186e237756"
        }
      ],
      "licenses": [
        {
          "expression": "BSD-2-Clause"
        }
      ],
      "name": "itypes",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/3f/bb/3bd99c7cd34d4a123b2903e16da364f6d2078b1c3a3530a8ad105c668104/itypes-1.2.0-py2.py3-none-any.whl#sha256=03da6872ca89d29aef62773672b2d408f490f80db48b23079a4b194c86dd04c6"
        },
        {
          "name": "aboutcode:filename",
          "value": "itypes-1.2.0-py2.py3-none-any.whl"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "https://github.com/tomchristie/itypes"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "Metadata-Version: 2.1\nName: itypes\nVersion: 1.2.0\nSummary: Simple immutable types for python.\nHome-page: http://github.com/PavanTatikonda/itypes\nAuthor: Tom Christie\nAuthor-email: tom@tomchristie.com\nLicense: BSD\nDescription: # itypes"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/itypes@1.2.0",
      "type": "library",
      "version": "1.2.0"
    },
    {
      "author": "",
      "bom-ref": "pkg:generic/jdk11u.tar.gz?download_url=https://download.visualstudio.microsoft.com/download/pr/df5d5fd6-decb-4eea-8c08-895c5b088439/fda8734493035d0bc7dd823bdf10302e/jdk11u.tar.gz",
      "copyright": "",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "37d9dbaa050d3d0bdf1d91691e4a6ef9"
        },
        {
          "alg": "SHA-1",
          "content": "0d85d2e9dfbbaa93d95929b0329e5a1971d17089"
        }
      ],
      "licenses": [
        {
          "expression": "GPL-2.0-only WITH Classpath-exception-2.0 AND MPL-2.0 AND Apache-2.0 AND LicenseRef-scancode-unicode AND LicenseRef-scancode-proprietary-license AND BSD-3-Clause AND LicenseRef-scancode-taligent-jdk AND FTL AND MIT AND CC0-1.0 AND blessing AND SAX-PD AND Zlib AND IJG"
        }
      ],
      "name": "jdk11u.tar.gz",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://download.visualstudio.microsoft.com/download/pr/df5d5fd6-decb-4eea-8c08-895c5b088439/fda8734493035d0bc7dd823bdf10302e/jdk11u.tar.gz"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Java"
        }
      ],
      "purl": "pkg:generic/jdk11u.tar.gz?download_url=https://download.visualstudio.microsoft.com/download/pr/df5d5fd6-decb-4eea-8c08-895c5b088439/fda8734493035d0bc7dd823bdf10302e/jdk11u.tar.gz",
      "type": "library",
      "version": ""
    },
    {
      "author": "",
      "bom-ref": "pkg:github/eclipse/jetty.project@jetty-11.0.2",
      "copyright": "Copyright (c) Mort Bay Consulting Pty Ltd and others",
      "cpe": "",
      "description": "Jetty :: Project\r\nThe Eclipse Jetty Project",
      "hashes": [
        {
          "alg": "MD5",
          "content": "12373afeecde990b580c5ee9b09f96ef"
        },
        {
          "alg": "SHA-1",
          "content": "24ea3ec0cbee407bc1342f8f94db7a8d111539b8"
        }
      ],
      "licenses": [
        {
          "expression": "(EPL-2.0 OR Apache-2.0) AND (CDDL-1.0 OR GPL-2.0-only WITH Classpath-exception-2.0)"
        }
      ],
      "name": "jetty.project",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/eclipse/jetty.project/archive/refs/tags/jetty-11.0.2.tar.gz"
        },
        {
          "name": "aboutcode:filename",
          "value": "jetty.project-jetty-11.0.2.tar.gz"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "https://eclipse.org/jetty"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "Notices for Eclipse Jetty\n=========================\nThis content is produced and maintained by the Eclipse Jetty project.\n\nProject home: https://www.eclipse.org/jetty/\n\nTrademarks\n----------\nEclipse Jetty, and Jetty are trademarks of the Eclipse Foundation.\n\nCopyright\n---------\nAll contributions are the property of the respective authors or of\nentities to which copyright has been assigned by the authors (eg. employer).\n\nDeclared Project Licenses\n-------------------------\nThis artifacts of this project are made available under the terms of:\n\n  * the Eclipse Public License v2.0\n    https://www.eclipse.org/legal/epl-2.0\n    SPDX-License-Identifier: EPL-2.0\n\n  or\n\n  * the Apache License, Version 2.0\n    https://www.apache.org/licenses/LICENSE-2.0\n    SPDX-License-Identifier: Apache-2.0\n\nThe following dependencies are EPL.\n * org.eclipse.jetty.orbit:org.eclipse.jdt.core\n\nThe following dependencies are EPL and ASL2.\n * org.eclipse.jetty.orbit:javax.security.auth.message\n\nThe following dependencies are EPL and CDDL 1.0.\n * org.eclipse.jetty.orbit:javax.mail.glassfish\n\nThe following dependencies are CDDL + GPLv2 with classpath exception.\nhttps://glassfish.dev.java.net/nonav/public/CDDL+GPL.html\n\n * jakarta.servlet:jakarta.servlet-api\n * javax.annotation:javax.annotation-api\n * javax.transaction:javax.transaction-api\n * javax.websocket:javax.websocket-api\n\nThe following dependencies are licensed by the OW2 Foundation according to the\nterms of http://asm.ow2.org/license.html\n\n * org.ow2.asm:asm-commons\n * org.ow2.asm:asm\n\nThe following dependencies are ASL2 licensed.\n\n * org.apache.taglibs:taglibs-standard-spec\n * org.apache.taglibs:taglibs-standard-impl\n\nThe following dependencies are ASL2 licensed.  Based on selected classes from\nfollowing Apache Tomcat jars, all ASL2 licensed.\n\n * org.mortbay.jasper:apache-jsp\n * org.apache.tomcat:tomcat-jasper\n * org.apache.tomcat:tomcat-juli\n * org.apache.tomcat:tomcat-jsp-api\n * org.apache.tomcat:tomcat-el-api\n * org.apache.tomcat:tomcat-jasper-el\n * org.apache.tomcat:tomcat-api\n * org.apache.tomcat:tomcat-util-scan\n * org.apache.tomcat:tomcat-util\n * org.mortbay.jasper:apache-el\n * org.apache.tomcat:tomcat-jasper-el\n * org.apache.tomcat:tomcat-el-api\n\nThe following artifacts are CDDL + GPLv2 with classpath exception.\nhttps://glassfish.dev.java.net/nonav/public/CDDL+GPL.html\n\n * org.eclipse.jetty.toolchain:jetty-schemas\n\nCryptography\n------------\nContent may contain encryption software. The country in which you are currently\nmay have restrictions on the import, possession, and use, and/or re-export to\nanother country, of encryption software. BEFORE using any encryption software,\nplease check the country's laws, regulations and policies concerning the import,\npossession, or use, and re-export of encryption software, to see if this is\npermitted.\n\nThe UnixCrypt.java code implements the one way cryptography used by\nUnix systems for simple password protection.  Copyright 1996 Aki Yoshida,\nmodified April 2001  by Iris Van den Broeke, Daniel Deville.\nPermission to use, copy, modify and distribute UnixCrypt\nfor non-commercial or commercial purposes and without fee is\ngranted provided that the copyright notice appears in all copies."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Java"
        }
      ],
      "purl": "pkg:github/eclipse/jetty.project@jetty-11.0.2",
      "type": "library",
      "version": "jetty-11.0.2"
    },
    {
      "author": "",
      "bom-ref": "pkg:generic/jquery-3.5.1.js?download_url=https://code.jquery.com/jquery-3.5.1.js",
      "copyright": "Copyright JS Foundation and other contributors",
      "cpe": "",
      "description": "jQuery is a fast, small, and feature-rich JavaScript library. It makes things like HTML document traversal and manipulation, event handling, animation, and Ajax much simpler with an easy-to-use API that works across a multitude of browsers.",
      "hashes": [
        {
          "alg": "MD5",
          "content": "23c7c5d2d1317508e807a6c7f777d6ed"
        },
        {
          "alg": "SHA-1",
          "content": "ad16c4a132ad2a03b4951185fed46d55397b5e88"
        },
        {
          "alg": "SHA-256",
          "content": "416a3b2c3bf16d64f6b5b6d0f7b079df2267614dd6847fc2f3271b4409233c37"
        },
        {
          "alg": "SHA-512",
          "content": "58d2f17cfffc71560bf6c8fc267a7a7add0192e6cb3f7d638531bdbe12ff179b84666839c04ccaa17a75909b25ccf416c0f4f57b23224b194a0a0cc72ce4ce4d"
        }
      ],
      "licenses": [
        {
          "expression": "MIT"
        }
      ],
      "name": "jquery-3.5.1.js",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://code.jquery.com/jquery-3.5.1.js"
        },
        {
          "name": "aboutcode:filename",
          "value": "jquery-3.5.1.js"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "https://jquery.com/"
        },
        {
          "name": "aboutcode:notice_text",
          "value": " * Copyright JS Foundation and other contributors\n * Released under the MIT license\n * https://jquery.org/license"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "JavaScript"
        }
      ],
      "purl": "pkg:generic/jquery-3.5.1.js?download_url=https://code.jquery.com/jquery-3.5.1.js",
      "type": "library",
      "version": ""
    },
    {
      "author": "",
      "bom-ref": "pkg:github/sporritt/jsplumb@1.7.2",
      "copyright": "Copyright (c) 2010 - 2014 jsPlumb, http://jsplumbtoolkit.com/",
      "cpe": "",
      "description": "Visual connectivity for webapps",
      "hashes": [
        {
          "alg": "MD5",
          "content": "4240e1765eafd7e59652f7553d00a5a1"
        },
        {
          "alg": "SHA-1",
          "content": "7728e13a12fd1aba083a5876df1e62f1f0d71532"
        }
      ],
      "licenses": [
        {
          "expression": "MIT"
        }
      ],
      "name": "jsplumb",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/sporritt/jsPlumb/archive/1.7.2.tar.gz"
        },
        {
          "name": "aboutcode:filename",
          "value": "jsPlumb-1.7.2.tar.gz"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "http://jsplumbtoolkit.com"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "Copyright (c) 2010 - 2014 jsPlumb, http://jsplumbtoolkit.com/\n\nAll 1.x.x and 2.x.x versions of jsPlumb Community edition are dual-licensed under both MIT and GPLv2.\n\njsplumb Toolkit is only available under a commercial license - based on number of developers or Enterprise or OEM."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "JavaScript"
        }
      ],
      "purl": "pkg:github/sporritt/jsplumb@1.7.2",
      "type": "library",
      "version": "1.7.2"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/kombu@4.6.7",
      "copyright": "copyright (c) 2010 - 2013 by Mahendra M.\r\ncopyright 2009-2019', publisher Celery Project\r\nCopyright (c) 2015-2016 Ask Solem & contributors.\r\nCopyright (c) 2009-2012, Ask Solem & contributors.\r\ncopyright (c) 2010 - 2013 by Flavio Percoco Premoli.\r\nCopyright (c) 2012-2014 GoPivotal Inc & contributors.",
      "cpe": "",
      "description": "Messaging library for Python.\r\nUNKNOWN",
      "hashes": [
        {
          "alg": "MD5",
          "content": "7fe3e4e60926625b9a47a07e4f3ade2d"
        },
        {
          "alg": "SHA-1",
          "content": "976984d06022d386f6e34388c234e0fe3d1ab598"
        },
        {
          "alg": "SHA-256",
          "content": "67b32ccb6fea030f8799f8fd50dd08e03a4b99464ebc4952d71d8747b1a52ad1"
        },
        {
          "alg": "SHA-512",
          "content": "04b55b5508673a2e55ccda3c2f025e563889dda13ee36993f256eac780320279e8493703fe88475b35d506e0b6018648e04cb0e3505e5d0ef1f62a3b587f4459"
        }
      ],
      "licenses": [
        {
          "expression": "BSD-2-Clause"
        }
      ],
      "name": "kombu",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/14/98/00cc71801381775fbc6ad17e25d815344a44cdcdda7c0bbccbd92373bb4c/kombu-4.6.7.tar.gz"
        },
        {
          "name": "aboutcode:filename",
          "value": "kombu-4.6.7.tar.gz"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "https://kombu.readthedocs.io"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/kombu@4.6.7",
      "type": "library",
      "version": "4.6.7"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/license-expression@21.6.14",
      "copyright": "Copyright (c) nexB Inc. and others",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "523e9c47c5ae80367bbe5068a5b25070"
        },
        {
          "alg": "SHA-1",
          "content": "05f6d7c57f1bf51a80aefc35ea97b203309c5bc6"
        },
        {
          "alg": "SHA-256",
          "content": "324246eed8e138b4139fefdc0e9dc4161d5075e3929e56983966d37298dca30e"
        },
        {
          "alg": "SHA-512",
          "content": "958d8eda03785926352d2449bc669de33153650f982fccb8b6abed489a135add4ec93d2e8d328f0163a2ba8c51bbfb2babdaf3820e589c9c2585fccb504e3b00"
        }
      ],
      "licenses": [
        {
          "expression": "Apache-2.0"
        }
      ],
      "name": "license-expression",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/32/20/84b153347691fb850d3eb96f7836b7f25251657e48456497ded4b63886f9/license_expression-21.6.14-py3-none-any.whl"
        },
        {
          "name": "aboutcode:filename",
          "value": "license_expression-21.6.14-py3-none-any.whl"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "# SPDX-License-Identifier: Apache-2.0\n#\n# Visit https://aboutcode.org and https://github.com/nexB/license-expression\n# for support and download.\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");\n# you may not use this file except in compliance with the License.\n# You may obtain a copy of the License at\n#\n#     http://www.apache.org/licenses/LICENSE-2.0\n#\n# Unless required by applicable law or agreed to in writing, software\n# distributed under the License is distributed on an \"AS IS\" BASIS,\n# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n# See the License for the specific language governing permissions and\n# limitations under the License."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/license-expression@21.6.14",
      "type": "library",
      "version": "21.6.14"
    },
    {
      "author": "",
      "bom-ref": "pkg:maven/log4j/log4j@1.2.17",
      "copyright": "",
      "cpe": "cpe:2.3:a:apache:log4j:1.2.17:*:*:*:*:*:*:*",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "04a41f0a068986f0f73485cf507c0f40"
        },
        {
          "alg": "SHA-1",
          "content": "5af35056b4d257e4b64b9e8069c0746e8b08629f"
        }
      ],
      "licenses": [
        {
          "expression": "Apache-2.0"
        }
      ],
      "name": "log4j",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://repo1.maven.org/maven2/log4j/log4j/1.2.17/log4j-1.2.17.jar"
        },
        {
          "name": "aboutcode:filename",
          "value": "log4j-1.2.17.jar"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Java"
        }
      ],
      "purl": "pkg:maven/log4j/log4j@1.2.17",
      "type": "library",
      "version": "1.2.17"
    },
    {
      "author": "Julian K\u00fchnel",
      "bom-ref": "pkg:github/julmot/mark.js@8.11.1",
      "copyright": "Copyright (c) Julian K\u00fchnel",
      "cpe": "",
      "description": "JavaScript keyword highlighting. Mark text with with options that fit every application. Also available as jQuery plugin.",
      "hashes": [
        {
          "alg": "MD5",
          "content": "76d6fc6f1108d931aea314962a58b444"
        },
        {
          "alg": "SHA-1",
          "content": "c52b2e00f8d7430829e7018dd5078937b16df696"
        },
        {
          "alg": "SHA-256",
          "content": "4ce0a8eb76f909476e6caee07e4ec3ab65c8287a5163d7cf6da21444227f099c"
        },
        {
          "alg": "SHA-512",
          "content": "4254070e0ac15e60027dd86effedc8ba481a5d69e87dee3e84035b5d91da79f1c6ef66f4abed56bba2a2757c065bd15da14aacb2dbb3e53a24be37ba0392e2da"
        }
      ],
      "licenses": [
        {
          "expression": "MIT"
        }
      ],
      "name": "mark.js",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/julmot/mark.js/archive/8.11.1.zip"
        },
        {
          "name": "aboutcode:filename",
          "value": "mark.js-8.11.1.zip"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "https://markjs.io/"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "The MIT License (MIT)\n\nCopyright (c) Julian K\u00fchnel\n\nPermission is hereby granted, free of charge, to any person obtaining a copy\nof this software and associated documentation files (the \"Software\"), to deal\nin the Software without restriction, including without limitation the rights\nto use, copy, modify, merge, publish, distribute, sublicense, and/or sell\ncopies of the Software, and to permit persons to whom the Software is\nfurnished to do so, subject to the following conditions:\n\nThe above copyright notice and this permission notice shall be included in all\ncopies or substantial portions of the Software.\n\nTHE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR\nIMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,\nFITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE\nAUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER\nLIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,\nOUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE\nSOFTWARE."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "JavaScript"
        }
      ],
      "purl": "pkg:github/julmot/mark.js@8.11.1",
      "type": "library",
      "version": "8.11.1"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/markdown@3.3.7",
      "copyright": "Copyright (c) The Python Markdown Project",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "2dfb70f52701f059740a8f2e5703bf49"
        },
        {
          "alg": "SHA-1",
          "content": "5617dcf21cd3606ef768fe649f9aa14eaa942f35"
        },
        {
          "alg": "SHA-256",
          "content": "f5da449a6e1c989a4cea2631aa8ee67caa5a2ef855d551c88f9e309f4634c621"
        },
        {
          "alg": "SHA-512",
          "content": "5e7b28cde4afa7d96099f008d5328b7cb24cc42a6c549f1fdc4a4f2581cd8022b6531c880b2a49b8938ed8f88cab74beb6bca33b147382515c40b97b7aa92f35"
        }
      ],
      "licenses": [
        {
          "expression": "BSD-3-Clause"
        }
      ],
      "name": "markdown",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/f3/df/ca72f352e15b6f8ce32b74af029f1189abffb906f7c137501ffe69c98a65/Markdown-3.3.7-py3-none-any.whl"
        },
        {
          "name": "aboutcode:filename",
          "value": "Markdown-3.3.7-py3-none-any.whl"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "Redistribution and use in source and binary forms, with or without\nmodification, are permitted provided that the following conditions are met:\n\n* Redistributions of source code must retain the above copyright\n  notice, this list of conditions and the following disclaimer.\n* Redistributions in binary form must reproduce the above copyright\n  notice, this list of conditions and the following disclaimer in the\n  documentation and/or other materials provided with the distribution.\n* Neither the name of the Python Markdown Project nor the\n  names of its contributors may be used to endorse or promote products\n  derived from this software without specific prior written permission.\n\nTHIS SOFTWARE IS PROVIDED BY THE PYTHON MARKDOWN PROJECT ''AS IS'' AND ANY\nEXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED\nWARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE\nDISCLAIMED. IN NO EVENT SHALL ANY CONTRIBUTORS TO THE PYTHON MARKDOWN PROJECT\nBE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR\nCONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF\nSUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS\nINTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN\nCONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)\nARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE\nPOSSIBILITY OF SUCH DAMAGE."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/markdown@3.3.7",
      "type": "library",
      "version": "3.3.7"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/mod-wsgi@4.9.0",
      "copyright": "Copyright (c) mod-wsgi project team",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "8042e8db0e9873422aebb5375b0b6933"
        },
        {
          "alg": "SHA-1",
          "content": "cb85b3c6632818d3695798b79b3247f685c066fe"
        },
        {
          "alg": "SHA-256",
          "content": "1f1a22511e7700c7d4d26b14768937c919ae5f53e80f5352226a218d866156ec"
        },
        {
          "alg": "SHA-512",
          "content": "d8c391f6d99becc92ae87ee7e75345f81161dec1fcea3346ceb7b66c7078ac31d6c0b057b31be00059cb96f1c37917d32929156fc3ecc5f9f7cbdd50b5a485eb"
        }
      ],
      "licenses": [
        {
          "expression": "Apache-2.0"
        }
      ],
      "name": "mod-wsgi",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/b6/54/4359de02da3581ea4a17340d87fd2c5a47adc4c8e626f9809e2697b2d33f/mod_wsgi-4.9.0.tar.gz"
        },
        {
          "name": "aboutcode:filename",
          "value": "mod_wsgi-4.9.0.tar.gz"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "   Licensed under the Apache License, Version 2.0 (the \"License\");\n   you may not use this file except in compliance with the License.\n   You may obtain a copy of the License at\n\n       http://www.apache.org/licenses/LICENSE-2.0\n\n   Unless required by applicable law or agreed to in writing, software\n   distributed under the License is distributed on an \"AS IS\" BASIS,\n   WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n   See the License for the specific language governing permissions and\n   limitations under the License."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/mod-wsgi@4.9.0",
      "type": "library",
      "version": "4.9.0"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/mod-wsgi@4.9.4",
      "copyright": "",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "a9e770d95311c26c4c1582f4722f830e"
        },
        {
          "alg": "SHA-1",
          "content": "7a8617ef6df2a915a1c2a15b38223201e425ef01"
        },
        {
          "alg": "SHA-256",
          "content": "8e762662ea5b01afc386bbcfbaa079748eb6203ab1d6d3a3dac9237f5666cfc9"
        },
        {
          "alg": "SHA-512",
          "content": "e99c062a8fa9fdb9ce50f8d902ff9c9b572f7c470bfad6db0ad34b52ee476814845331ebded86c62e335bbfd8887c56a3a62109c332a951f883314b8350a3ae4"
        }
      ],
      "licenses": [
        {
          "expression": "Apache-2.0"
        }
      ],
      "name": "mod-wsgi",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/fe/12/b3756f3b72ae3410a83a9b98862925aea64e854c93ef16c1e46b11e32d59/mod_wsgi-4.9.4.tar.gz"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "C"
        }
      ],
      "purl": "pkg:pypi/mod-wsgi@4.9.4",
      "type": "library",
      "version": "4.9.4"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/model-bakery@1.5.0",
      "copyright": "Copyright (c) Vanderson Mota",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "36523ad10b6190f2a450209d1fb3ae59"
        },
        {
          "alg": "SHA-1",
          "content": "08260161ec156ba30e257099cc697520a9e1c5e4"
        },
        {
          "alg": "SHA-256",
          "content": "e4e09e1c536e3b7d5e7a827d4d1ccd4540dea56062d766b506d86067d3a94dea"
        },
        {
          "alg": "SHA-512",
          "content": "f8631d912e4fcd4bc7512eeea5181e5c5da3ca0109831d18361e0c575e67014d28e5ef530015e77ab0d419c323cb33d693b9c18a118575dd78fc5515ab730d6b"
        }
      ],
      "licenses": [
        {
          "expression": "Apache-2.0"
        }
      ],
      "name": "model-bakery",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/b8/26/c843ea513a97a6ba95bcd86541808796fa7b398b7126d56e374dc3837c9d/model_bakery-1.5.0-py2.py3-none-any.whl"
        },
        {
          "name": "aboutcode:filename",
          "value": "model_bakery-1.5.0-py2.py3-none-any.whl"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "   Licensed under the Apache License, Version 2.0 (the \"License\");\n   you may not use this file except in compliance with the License.\n   You may obtain a copy of the License at\n\n       http://www.apache.org/licenses/LICENSE-2.0\n\n   Unless required by applicable law or agreed to in writing, software\n   distributed under the License is distributed on an \"AS IS\" BASIS,\n   WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n   See the License for the specific language governing permissions and\n   limitations under the License."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/model-bakery@1.5.0",
      "type": "library",
      "version": "1.5.0"
    },
    {
      "author": "",
      "bom-ref": "pkg:github/modelscope/modelscope@1.4.1?version_prefix=v",
      "copyright": "",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "e25c1bc7322f308b158de7c3ea34dee0"
        },
        {
          "alg": "SHA-1",
          "content": "b78d0da1c5c6e5f7d898d94bf776e79ec807a8f5"
        },
        {
          "alg": "SHA-256",
          "content": "4d68f21de8d158da89f37ec2f6e4f8e0122f449033b103f25afc48c764905479"
        },
        {
          "alg": "SHA-512",
          "content": "0d1a64da3994b93709a2c4abeddc6c387cc7a7aa47cb425eeb718abaaa022884739838fdd3c0a280655caf98bbce609fd83d293e3b95f47762247c5c9a8b4405"
        }
      ],
      "licenses": [
        {
          "expression": "Apache-2.0"
        }
      ],
      "name": "modelscope",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/modelscope/modelscope/archive/refs/tags/v1.4.1.tar.gz"
        },
        {
          "name": "aboutcode:filename",
          "value": "modelscope-1.4.1.tar.gz"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "https://github.com/modelscope/modelscope"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:github/modelscope/modelscope@1.4.1?version_prefix=v",
      "type": "library",
      "version": "1.4.1"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/natsort@8.1.0",
      "copyright": "Copyright (c) Seth M. Morton",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "9acd1371d135869b9d6ebd90e7110fe2"
        },
        {
          "alg": "SHA-1",
          "content": "48cd1d92a8fb02799869fe3b72d39db010e5a5af"
        },
        {
          "alg": "SHA-256",
          "content": "f59988d2f24e77b6b56f8a8f882d5df6b3b637e09e075abc67b486d59fba1a4b"
        },
        {
          "alg": "SHA-512",
          "content": "35c35da00ff1a7c23fea5e284f971c4ffc855bc5de72430b7fb656d5678662d9455d7ef77f4bd3d9732ff77f5fd6094b5457e1ab328c2a878501936b3cc748f7"
        }
      ],
      "licenses": [
        {
          "expression": "MIT"
        }
      ],
      "name": "natsort",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/a9/76/0f624b7326f4458a249580c55e5654756084ec4572ce37a05f799b96bc24/natsort-8.1.0-py3-none-any.whl"
        },
        {
          "name": "aboutcode:filename",
          "value": "natsort-8.1.0-py3-none-any.whl"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "Permission is hereby granted, free of charge, to any person obtaining a copy of\nthis software and associated documentation files (the \"Software\"), to deal in\nthe Software without restriction, including without limitation the rights to\nuse, copy, modify, merge, publish, distribute, sublicense, and/or sell copies\nof the Software, and to permit persons to whom the Software is furnished to do\nso, subject to the following conditions:\n\nThe above copyright notice and this permission notice shall be included in all\ncopies or substantial portions of the Software.\n\nTHE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR\nIMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,\nFITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE\nAUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER\nLIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,\nOUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE\nSOFTWARE."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/natsort@8.1.0",
      "type": "library",
      "version": "8.1.0"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/oauthlib@3.2.0",
      "copyright": "Copyright (c) The OAuthlib Community",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "394d33047806a011d6dc11ced665485d"
        },
        {
          "alg": "SHA-1",
          "content": "67037002fc6432c5eade26dae5206e28717513ae"
        },
        {
          "alg": "SHA-256",
          "content": "6db33440354787f9b7f3a6dbd4febf5d0f93758354060e802f6c06cb493022fe"
        },
        {
          "alg": "SHA-512",
          "content": "754966d22567eabdb273edb799338078e2006186c5988d60885c2bafeffd32a32bedbe6cdf7a95cceb39a83e96743d2f37add7772acfc104b33c9db8059e886d"
        }
      ],
      "licenses": [
        {
          "expression": "BSD-3-Clause"
        }
      ],
      "name": "oauthlib",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/1d/46/5ee2475e1b46a26ca0fa10d3c1d479577fde6ee289f8c6aa6d7ec33e31fd/oauthlib-3.2.0-py3-none-any.whl"
        },
        {
          "name": "aboutcode:filename",
          "value": "oauthlib-3.2.0-py3-none-any.whl"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "OAuthLib is yours to use and abuse according to the terms of the BSD license."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/oauthlib@3.2.0",
      "type": "library",
      "version": "3.2.0"
    },
    {
      "author": "",
      "bom-ref": "pkg:github/git-learning-game/oh-my-git@0.6.4",
      "copyright": "Copyright The Cabin Project",
      "cpe": "",
      "description": "An interactive Git learning game",
      "hashes": [
        {
          "alg": "MD5",
          "content": "20779a6618a0e97287d119f677b0027f"
        },
        {
          "alg": "SHA-1",
          "content": "82595b7bb2e6adfea7dcce9a046fe85cc0d77878"
        }
      ],
      "licenses": [
        {
          "expression": "BlueOak-1.0.0"
        }
      ],
      "name": "oh-my-git",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/git-learning-game/oh-my-git/archive/refs/tags/0.6.4.tar.gz"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "https://ohmygit.org/"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "GDScript"
        }
      ],
      "purl": "pkg:github/git-learning-game/oh-my-git@0.6.4",
      "type": "library",
      "version": "0.6.4"
    },
    {
      "author": "",
      "bom-ref": "pkg:github/openai/openai-python@0.27.2?version_prefix=v",
      "copyright": "Copyright OpenAI",
      "cpe": "",
      "description": "The OpenAI Python library provides convenient access to the OpenAI API\r\nfrom applications written in the Python language. It includes a\r\npre-defined set of classes for API resources that initialize\r\nthemselves dynamically from API responses which makes it compatible\r\nwith a wide range of versions of the OpenAI API.",
      "hashes": [
        {
          "alg": "MD5",
          "content": "c437d5f048604eb5b2a5baa345fd6700"
        },
        {
          "alg": "SHA-1",
          "content": "0d28162354dfd190f05e587e3969ed65a7495797"
        },
        {
          "alg": "SHA-256",
          "content": "d19f5ec4ef01dbeedd6287c2aae16ebbc1dafc8507298f63349c3c7cf34ed8fc"
        },
        {
          "alg": "SHA-512",
          "content": "60d1efed228e2e473ba6a6815f973ea5c6c642765f9d7d2eeebe10cfd262637c51fb9aebe445aa0f69fd6e9ae75250afa9cae8b81bf3e671f404c0f8c25c4533"
        }
      ],
      "licenses": [
        {
          "expression": "MIT"
        }
      ],
      "name": "openai-python",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/openai/openai-python/archive/refs/tags/v0.27.2.tar.gz"
        },
        {
          "name": "aboutcode:filename",
          "value": "openai-python-0.27.2.tar.gz"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "https://github.com/openai/openai-python"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "The MIT License\n\nCopyright (c) OpenAI (https://openai.com)\n\nPermission is hereby granted, free of charge, to any person obtaining a copy\nof this software and associated documentation files (the \"Software\"), to deal\nin the Software without restriction, including without limitation the rights\nto use, copy, modify, merge, publish, distribute, sublicense, and/or sell\ncopies of the Software, and to permit persons to whom the Software is\nfurnished to do so, subject to the following conditions:\n\nThe above copyright notice and this permission notice shall be included in\nall copies or substantial portions of the Software.\n\nTHE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR\nIMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,\nFITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE\nAUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER\nLIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,\nOUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN\nTHE SOFTWARE."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:github/openai/openai-python@0.27.2?version_prefix=v",
      "type": "library",
      "version": "0.27.2"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/packageurl-python@0.10.4",
      "copyright": "Copyright (c) the purl authors",
      "cpe": "",
      "description": "A purl aka. Package URL parser and builder\r\n=================\r\npackageurl-python\r\n=================\r\n\r\nPython library to parse and build \"purl\" aka. Package URLs.\r\nSee https://github.com/package-url/purl-spec for details.\r\n\r\nJoin the discussion at https://gitter.im/package-url/Lobby or enter a ticket for support.\r\n\r\nLicense: MIT\r\n\r\nTests and build status\r\n======================\r\n\r\n+----------------------+\r\n| **Tests and build**  |\r\n+======================+\r\n| |ci-tests|           |\r\n+----------------------+\r\n\r\nInstall\r\n=======\r\n::\r\n\r\n    pip install packageurl-python\r\n\r\nUsage\r\n=====\r\n::\r\n\r\n    >>> from packageurl import PackageURL\r\n\r\n    >>> purl = PackageURL.from_string(\"pkg:maven/org.apache.commons/io@1.3.4\")\r\n    >>> print(purl.to_dict())\r\n    {'type': 'maven', 'namespace': 'org.apache.commons', 'name': 'io', 'version': '1.3.4', 'qualifiers': None, 'subpath': None}\r\n\r\n    >>> print(purl.to_string())\r\n    pkg:maven/org.apache.commons/io@1.3.4\r\n\r\n    >>> print(str(purl))\r\n    pkg:maven/org.apache.commons/io@1.3.4\r\n\r\n    >>> print(repr(purl))\r\n    PackageURL(type='maven', namespace='org.apache.commons', name='io', version='1.3.4', qualifiers={}, subpath=None)\r\n\r\nUtilities\r\n=========\r\n\r\nDjango models\r\n^^^^^^^^^^^^^\r\n\r\n`packageurl.contrib.django_models.PackageURLMixin` is a Django abstract model mixin to use Package URLs in Django.\r\n\r\nURL to PURL\r\n^^^^^^^^^^^\r\n\r\n`packageurl.contrib.url2purl.get_purl(url)` returns a Package URL inferred from an URL.\r\n\r\n::\r\n\r\n    >>> from packageurl.contrib import url2purl\r\n    >>> url2purl.get_purl(\"https://github.com/package-url/packageurl-python\")\r\n    PackageURL(type='github', namespace='package-url', name='packageurl-python', version=None, qualifiers={}, subpath=None)\r\n\r\nPURL to URL\r\n^^^^^^^^^^^\r\n\r\n- `packageurl.contrib.purl2url.get_repo_url(purl)` returns a repository URL inferred from a Package URL.\r\n- `packageurl.contrib.purl2url.get_download_url(purl)` returns a download URL inferred from a Package URL.\r\n- `packageurl.contrib.purl2url.get_inferred_urls(purl)` return all inferred URLs (repository, download) from a Package URL.\r\n\r\n::\r\n\r\n    >>> from packageurl.contrib import purl2url\r\n\r\n    >>> purl2url.get_repo_url(\"pkg:rubygems/bundler@2.3.23\")\r\n    \"https://rubygems.org/gems/bundler/versions/2.3.23\"\r\n\r\n    >>> purl2url.get_download_url(\"pkg:rubygems/bundler@2.3.23\")\r\n    \"https://rubygems.org/downloads/bundler-2.3.23.gem\"\r\n\r\n    >>> purl2url.get_inferred_urls(\"pkg:rubygems/bundler@2.3.23\")\r\n    [\"https://rubygems.org/gems/bundler/versions/2.3.23\", \"https://rubygems.org/downloads/bundler-2.3.23.gem\",]\r\n\r\nRun tests\r\n=========\r\n\r\nInstall test dependencies::\r\n\r\n    python3 thirdparty/virtualenv.pyz --never-download --no-periodic-update .\r\n    bin/pip install -e .\"[test]\"\r\n\r\nRun tests::\r\n\r\n    bin/py.test tests\r\n\r\nMake a new release\r\n==================\r\n\r\n- start a new release branch\r\n- update the CHANGELOG.rst and AUTHORS.rst\r\n- update README.rst if needed\r\n- bump version in setup.cfg\r\n- run all tests\r\n- install restview and validate that all .rst docs are correct\r\n- commit and push this branch\r\n- tag and push that tag\r\n- make a PR to merge branch\r\n- once merged, run::\r\n\r\n    bin/pip install --upgrade pip wheel twine setuptools\r\n\r\n- delete the \"dist\" and \"build\" directories::\r\n\r\n    rm -rf dist/ build/\r\n\r\n- create a source distribution and wheel with::\r\n\r\n    bin/python setup.py sdist bdist_wheel\r\n\r\n- finally, upload to PyPI::\r\n\r\n    bin/twine upload dist/*\r\n\r\n\r\n.. |ci-tests| image:: https://github.com/package-url/packageurl-python/actions/workflows/ci.yml/badge.svg?branch=main\r\n    :target: https://github.com/package-url/packageurl-python/actions/workflows/ci.yml\r\n    :alt: CI Tests and build status",
      "hashes": [
        {
          "alg": "MD5",
          "content": "c55a9096e4274239eb0e64951c3c59f2"
        },
        {
          "alg": "SHA-1",
          "content": "821dae242a34a96a627251e67d56ce4e992d7fd9"
        },
        {
          "alg": "SHA-256",
          "content": "5c91334f942cd55d45eb0c67dd339a535ef90e25f05b9ec016ad188ed0ef9048"
        },
        {
          "alg": "SHA-512",
          "content": "d997c209870c45d0842164d3ae82c32ebb702409a3a65949430dbaccf1d8feb22ee6214b41b7a93bacfa0afe809f0be34b300355d390cc7c2728efee58a41e3d"
        }
      ],
      "licenses": [
        {
          "expression": "MIT"
        }
      ],
      "name": "packageurl-python",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/59/ee/1e22fde9f8210b1bad0ada2a629d0e0c145627f546f793f0e5237109fe86/packageurl-python-0.10.4.tar.gz"
        },
        {
          "name": "aboutcode:filename",
          "value": "packageurl-python-0.10.4.tar.gz"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "https://github.com/package-url/packageurl-python"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "Permission is hereby granted, free of charge, to any person obtaining a copy of\nthis software and associated documentation files (the \"Software\"), to deal in\nthe Software without restriction, including without limitation the rights to\nuse, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of\nthe Software, and to permit persons to whom the Software is furnished to do so,\nsubject to the following conditions:\n\nThe above copyright notice and this permission notice shall be included in all\ncopies or substantial portions of the Software.\n\nTHE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR\nIMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS\nFOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR\nCOPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER\nIN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN\nCONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.\n"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/packageurl-python@0.10.4",
      "type": "library",
      "version": "0.10.4"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/pip@22.1.2",
      "copyright": "Copyright (c) pip project contributors",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "564799f1b166d9d4f87a6921c35e0008"
        },
        {
          "alg": "SHA-1",
          "content": "6a78406024aa55682f72e08f492a19257487a9c0"
        },
        {
          "alg": "SHA-256",
          "content": "a3edacb89022ef5258bf61852728bf866632a394da837ca49eb4303635835f17"
        },
        {
          "alg": "SHA-512",
          "content": "b80b354f73e94682ea43efd05833955d47c26ebd54a37cbb71457a18deeaaea8eb734c7e936adf001082aa6554e9cc474d4aed48eb2a80526e5fa2b7c9778798"
        }
      ],
      "licenses": [
        {
          "expression": "MIT"
        }
      ],
      "name": "pip",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/96/2f/caec18213f6a67852f6997fb0673ae08d2e93d1b81573edb93ba4ef06970/pip-22.1.2-py3-none-any.whl"
        },
        {
          "name": "aboutcode:filename",
          "value": "pip-22.1.2-py3-none-any.whl"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "# SPDX-License-Identifier: MIT"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/pip@22.1.2",
      "type": "library",
      "version": "22.1.2"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/psycopg2@2.9.3",
      "copyright": "Copyright (c) The Psycopg Team",
      "cpe": "",
      "description": "psycopg2 - Python-PostgreSQL Database Adapter\r\nPsycopg is the most popular PostgreSQL database adapter for the Python\r\nprogramming language.  Its main features are the complete implementation of\r\nthe Python DB API 2.0 specification and the thread safety (several threads can\r\nshare the same connection).  It was designed for heavily multi-threaded\r\napplications that create and destroy lots of cursors and make a large number\r\nof concurrent \"INSERT\"s or \"UPDATE\"s.\r\n\r\nPsycopg 2 is mostly implemented in C as a libpq wrapper, resulting in being\r\nboth efficient and secure.  It features client-side and server-side cursors,\r\nasynchronous communication and notifications, \"COPY TO/COPY FROM\" support.\r\nMany Python types are supported out-of-the-box and adapted to matching\r\nPostgreSQL data types; adaptation can be extended and customized thanks to a\r\nflexible objects adaptation system.\r\n\r\nPsycopg 2 is both Unicode and Python 3 friendly.\r\n\r\n\r\nDocumentation\r\n-------------\r\n\r\nDocumentation is included in the ``doc`` directory and is `available online`__.\r\n\r\n.. __: https://www.psycopg.org/docs/\r\n\r\nFor any other resource (source code repository, bug tracker, mailing list)\r\nplease check the `project homepage`__.\r\n\r\n.. __: https://psycopg.org/\r\n\r\n\r\nInstallation\r\n------------\r\n\r\nBuilding Psycopg requires a few prerequisites (a C compiler, some development\r\npackages): please check the install_ and the faq_ documents in the ``doc`` dir\r\nor online for the details.\r\n\r\nIf prerequisites are met, you can install psycopg like any other Python\r\npackage, using ``pip`` to download it from PyPI_::\r\n\r\n    $ pip install psycopg2\r\n\r\nor using ``setup.py`` if you have downloaded the source package locally::\r\n\r\n    $ python setup.py build\r\n    $ sudo python setup.py install\r\n\r\nYou can also obtain a stand-alone package, not requiring a compiler or\r\nexternal libraries, by installing the `psycopg2-binary`_ package from PyPI::\r\n\r\n    $ pip install psycopg2-binary\r\n\r\nThe binary package is a practical choice for development and testing but in\r\nproduction it is advised to use the package built from sources.\r\n\r\n.. _PyPI: https://pypi.org/project/psycopg2/\r\n.. _psycopg2-binary: https://pypi.org/project/psycopg2-binary/\r\n.. _install: https://www.psycopg.org/docs/install.html#install-from-source\r\n.. _faq: https://www.psycopg.org/docs/faq.html#faq-compile\r\n\r\n:Linux/OSX: |gh-actions|\r\n:Windows: |appveyor|\r\n\r\n.. |gh-actions| image:: https://github.com/psycopg/psycopg2/actions/workflows/tests.yml/badge.svg\r\n    :target: https://github.com/psycopg/psycopg2/actions/workflows/tests.yml\r\n    :alt: Linux and OSX build status\r\n\r\n.. |appveyor| image:: https://ci.appveyor.com/api/projects/status/github/psycopg/psycopg2?branch=master&svg=true\r\n    :target: https://ci.appveyor.com/project/psycopg/psycopg2/branch/master\r\n    :alt: Windows build status",
      "hashes": [
        {
          "alg": "MD5",
          "content": "1415674b95557329867ce68bd841a48b"
        },
        {
          "alg": "SHA-1",
          "content": "87802252c3ad9a89b1c5b828ff7fd4055cf98e0f"
        },
        {
          "alg": "SHA-256",
          "content": "8e841d1bf3434da985cc5ef13e6f75c8981ced601fd70cc6bf33351b91562981"
        },
        {
          "alg": "SHA-512",
          "content": "048184d1d162a371fc0fba711448a6fa8a6aac193421f4484c7f7b91c39065d5b632fa34fc15a901eca055d597302b1f9e38330b248ed0e4653dcdc544b0d660"
        }
      ],
      "licenses": [
        {
          "expression": "LGPL-3.0-or-later AND LicenseRef-scancode-openssl-exception-lgpl3.0plus AND LGPL-2.0-or-later"
        }
      ],
      "name": "psycopg2",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/d1/1e/b450599a27b1809bccbd4e369f397cb18dc56b875778d961f9ae180b54b7/psycopg2-2.9.3.tar.gz"
        },
        {
          "name": "aboutcode:filename",
          "value": "psycopg2-2.9.3.tar.gz"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "https://psycopg.org/"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "psycopg2 and the LGPL\n---------------------\n\npsycopg2 is free software: you can redistribute it and/or modify it\nunder the terms of the GNU Lesser General Public License as published\nby the Free Software Foundation, either version 3 of the License, or\n(at your option) any later version.\n\npsycopg2 is distributed in the hope that it will be useful, but WITHOUT\nANY WARRANTY; without even the implied warranty of MERCHANTABILITY or\nFITNESS FOR A PARTICULAR PURPOSE.  See the GNU Lesser General Public\nLicense for more details.\n\nIn addition, as a special exception, the copyright holders give\npermission to link this program with the OpenSSL library (or with\nmodified versions of OpenSSL that use the same license as OpenSSL),\nand distribute linked combinations including the two.\n\nYou must obey the GNU Lesser General Public License in all respects for\nall of the code used other than OpenSSL. If you modify file(s) with this\nexception, you may extend this exception to your version of the file(s),\nbut you are not obligated to do so. If you do not wish to do so, delete\nthis exception statement from your version. If you delete this exception\nstatement from all source files in the program, then also delete it here.\n\nYou should have received a copy of the GNU Lesser General Public License\nalong with psycopg2 (see the doc/ directory.)\nIf not, see <https://www.gnu.org/licenses/>.\n\n\nAlternative licenses\n--------------------\n\nThe following BSD-like license applies (at your option) to the files following\nthe pattern ``psycopg/adapter*.{h,c}`` and ``psycopg/microprotocol*.{h,c}``:\n\n Permission is granted to anyone to use this software for any purpose,\n including commercial applications, and to alter it and redistribute it\n freely, subject to the following restrictions:\n\n 1. The origin of this software must not be misrepresented; you must not\n    claim that you wrote the original software. If you use this\n    software in a product, an acknowledgment in the product documentation\n    would be appreciated but is not required.\n\n 2. Altered source versions must be plainly marked as such, and must not\n    be misrepresented as being the original software.\n\n 3. This notice may not be removed or altered from any source distribution."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/psycopg2@2.9.3",
      "type": "library",
      "version": "2.9.3"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/pyaml@21.10.1",
      "copyright": "Copyright (c) Mike Kazantsev",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "a99385e1e3457a3c00867283f0ca9d7c"
        },
        {
          "alg": "SHA-1",
          "content": "7cb2074609c542fe4ea2dd3bbc84e28432640168"
        },
        {
          "alg": "SHA-256",
          "content": "19985ed303c3a985de4cf8fd329b6d0a5a5b5c9035ea240eccc709ebacbaf4a0"
        },
        {
          "alg": "SHA-512",
          "content": "5b22c830a61d5c31d92d33d1b7e911d0bb89136df7da118a189cc79dabcaff5701788a641aa4e22a587f57c8f8d5acd81551f0d9f35b846ecf4254a299083a99"
        }
      ],
      "licenses": [
        {
          "expression": "WTFPL"
        }
      ],
      "name": "pyaml",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/35/fd/78a3a11c7b9b11878ebbf4461a09cbc758bdfc1b45168972727f7334b09a/pyaml-21.10.1-py2.py3-none-any.whl"
        },
        {
          "name": "aboutcode:filename",
          "value": "pyaml-21.10.1-py2.py3-none-any.whl"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "License: WTFPL"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/pyaml@21.10.1",
      "type": "library",
      "version": "21.10.1"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/pycodestyle@2.9.0",
      "copyright": "Copyright (c) pycodestyle project contributors",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "bd0bd646a6a56a5ccf7b9c1d9a2e7ee3"
        },
        {
          "alg": "SHA-1",
          "content": "cce53dbf12c1734feb21541c456d1f15f8f1c090"
        },
        {
          "alg": "SHA-256",
          "content": "289cdc0969d589d90752582bef6dff57c5fbc6949ee8b013ad6d6449a8ae9437"
        },
        {
          "alg": "SHA-512",
          "content": "ada9c0ef5721664338cec5354df09cd59bbe8f02c243e6f2b84518b2ce7d04b0debbdcf3e060481ea6da6bb06f024a25da65d8f3ad36bf2e6928dcfb6c0151e2"
        }
      ],
      "licenses": [
        {
          "expression": "MIT"
        }
      ],
      "name": "pycodestyle",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/a4/9e/2f9e7d5b13ad7c326f99d08d36757fc02fcd137cd5898b216a9faca38f9a/pycodestyle-2.9.0-py2.py3-none-any.whl"
        },
        {
          "name": "aboutcode:filename",
          "value": "pycodestyle-2.9.0-py2.py3-none-any.whl"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "Permission is hereby granted, free of charge, to any person\nobtaining a copy of this software and associated documentation files\n(the \"Software\"), to deal in the Software without restriction,\nincluding without limitation the rights to use, copy, modify, merge,\npublish, distribute, sublicense, and/or sell copies of the Software,\nand to permit persons to whom the Software is furnished to do so,\nsubject to the following conditions:\n\nThe above copyright notice and this permission notice shall be\nincluded in all copies or substantial portions of the Software.\n\nTHE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND,\nEXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF\nMERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND\nNONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS\nBE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN\nACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN\nCONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE\nSOFTWARE."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/pycodestyle@2.9.0",
      "type": "library",
      "version": "2.9.0"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/pycparser@2.20",
      "copyright": "Copyright (c) Eli Bendersky",
      "cpe": "",
      "description": "C parser in Python",
      "hashes": [
        {
          "alg": "MD5",
          "content": "b8f88de737db8c346ee8d31c07c7a25a"
        },
        {
          "alg": "SHA-1",
          "content": "0ae93d89b69fab48af3a407a2f8663bcea270c3d"
        },
        {
          "alg": "SHA-256",
          "content": "2d475327684562c3a96cc71adf7dc8c4f0565175cf86b6d7a404ff4c771f15f0"
        },
        {
          "alg": "SHA-512",
          "content": "ff0853c9f981b43b4f2e879350715c07b02cf9dab223d4980d8fe0a3138c98041b5f848a9355ae4f1cb45e7f137c03a88843008e18d77af9250e0d9c55f5ca1b"
        }
      ],
      "licenses": [
        {
          "expression": "BSD-3-Clause"
        }
      ],
      "name": "pycparser",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/0f/86/e19659527668d70be91d0369aeaa055b4eb396b0f387a4f92293a20035bd/pycparser-2.20.tar.gz"
        },
        {
          "name": "aboutcode:filename",
          "value": "pycparser-2.20.tar.gz"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "https://github.com/eliben/pycparser"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "pycparser -- A C parser in Python\nRedistribution and use in source and binary forms, with or without modification,\nare permitted provided that the following conditions are met:\n\n* Redistributions of source code must retain the above copyright notice, this \n  list of conditions and the following disclaimer.\n* Redistributions in binary form must reproduce the above copyright notice, \n  this list of conditions and the following disclaimer in the documentation \n  and/or other materials provided with the distribution.\n* Neither the name of Eli Bendersky nor the names of its contributors may \n  be used to endorse or promote products derived from this software without \n  specific prior written permission.\n\nTHIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS \"AS IS\" AND \nANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED \nWARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE \nDISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE \nLIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR \nCONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE \nGOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) \nHOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT \nLIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT \nOF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/pycparser@2.20",
      "type": "library",
      "version": "2.20"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/pyjwt@2.4.0",
      "copyright": "Copyright (c) Jose Padilla",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "79db059e7b5de6e878e1252c0489e96e"
        },
        {
          "alg": "SHA-1",
          "content": "5219e41b2e82f1201693e114caaae5c5d4d9ce91"
        },
        {
          "alg": "SHA-256",
          "content": "72d1d253f32dbd4f5c88eaf1fdc62f3a19f676ccbadb9dbc5d07e951b2b26daf"
        },
        {
          "alg": "SHA-512",
          "content": "7c6956f320047e205216b1c819425d72ae5f533a67753d5e527b7cab915a88b6fcaef37983d6ae849631fe128b34981c95795bacd3cc7c1f0f84a08a83fe854a"
        }
      ],
      "licenses": [
        {
          "expression": "MIT"
        }
      ],
      "name": "pyjwt",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/1c/fb/b82e9601b00d88cf8bbee1f39b855ae773f9d5bcbcedb3801b2f72460696/PyJWT-2.4.0-py3-none-any.whl"
        },
        {
          "name": "aboutcode:filename",
          "value": "PyJWT-2.4.0-py3-none-any.whl"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "Permission is hereby granted, free of charge, to any person obtaining a copy\nof this software and associated documentation files (the \"Software\"), to deal\nin the Software without restriction, including without limitation the rights\nto use, copy, modify, merge, publish, distribute, sublicense, and/or sell\ncopies of the Software, and to permit persons to whom the Software is\nfurnished to do so, subject to the following conditions:\n\nThe above copyright notice and this permission notice shall be included in all\ncopies or substantial portions of the Software.\n\nTHE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR\nIMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,\nFITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE\nAUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER\nLIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,\nOUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE\nSOFTWARE."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/pyjwt@2.4.0",
      "type": "library",
      "version": "2.4.0"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/python-dateutil@2.8.2",
      "copyright": "Copyright (c) dateutil contributors",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "95743ca628ad14d4aeb3628907f017bd"
        },
        {
          "alg": "SHA-1",
          "content": "2416d5b8978b5531998436aa5fb6b32b15c819e1"
        },
        {
          "alg": "SHA-256",
          "content": "961d03dc3453ebbc59dbdea9e4e11c5651520a876d0f4db161e8674aae935da9"
        },
        {
          "alg": "SHA-512",
          "content": "aa5cbf32cc20465a94a48b6156ec87ebf3a0b543c16b68fa346fde6b481bcbc07c3429b4171bdfcc45f2eeef9933e1bb03bdfdf453f4aed237cc88cc452317c3"
        }
      ],
      "licenses": [
        {
          "expression": "BSD-3-Clause"
        }
      ],
      "name": "python-dateutil",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/36/7a/87837f39d0296e723bb9b62bbb257d0355c7f6128853c78955f57342a56d/python_dateutil-2.8.2-py2.py3-none-any.whl"
        },
        {
          "name": "aboutcode:filename",
          "value": "python_dateutil-2.8.2-py2.py3-none-any.whl"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "Redistribution and use in source and binary forms, with or without\nmodification, are permitted provided that the following conditions are met:\n\n    * Redistributions of source code must retain the above copyright notice,\n      this list of conditions and the following disclaimer.\n    * Redistributions in binary form must reproduce the above copyright notice,\n      this list of conditions and the following disclaimer in the documentation\n      and/or other materials provided with the distribution.\n    * Neither the name of the copyright holder nor the names of its\n      contributors may be used to endorse or promote products derived from\n      this software without specific prior written permission.\n\nTHIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS\n\"AS IS\" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT\nLIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR\nA PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR\nCONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,\nEXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,\nPROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR\nPROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF\nLIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING\nNEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS\nSOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/python-dateutil@2.8.2",
      "type": "library",
      "version": "2.8.2"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/python-ldap@3.2.0",
      "copyright": "Copyright (c) Python Software Foundation",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "fe22522208dc9b06d16eb70f8553eaab"
        },
        {
          "alg": "SHA-1",
          "content": "f0658ddeffd4c059bb804890b80c00d62b70be60"
        },
        {
          "alg": "SHA-256",
          "content": "7d1c4b15375a533564aad3d3deade789221e450052b21ebb9720fb822eccdb8e"
        },
        {
          "alg": "SHA-512",
          "content": "ef2833739fd57ad26d97ae5dba3bca8a47e770ff3f113d06a5bed0841f8fcbbe6cd102e75c753dfff48f5f6041f46a91c6166f3bb9ca44ef9bd643c0666c6b23"
        }
      ],
      "licenses": [
        {
          "expression": "Python-2.0"
        }
      ],
      "name": "python-ldap",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/ea/93/596f875e003c770447f4b99267820a0c769dd2dc3ae3ed19afe460fcbad0/python-ldap-3.2.0.tar.gz"
        },
        {
          "name": "aboutcode:filename",
          "value": "python-ldap-3.2.0.tar.gz"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "The python-ldap package is distributed under Python-style license.\n\nStandard disclaimer:\n   This software is made available by the author(s) to the public for free\n   and \"as is\".  All users of this free software are solely and entirely\n   responsible for their own choice and use of this software for their\n   own purposes.  By using this software, each user agrees that the\n   author(s) shall not be liable for damages of any kind in relation to\n   its use or performance. The author(s) do not warrant that this software\n   is fit for any purpose."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/python-ldap@3.2.0",
      "type": "library",
      "version": "3.2.0"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/python3-openid@3.2.0",
      "copyright": "Copyright (c) JanRain, Inc., Rami Chowdhury",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "e5c3644b8569a20fdfe0348f451da704"
        },
        {
          "alg": "SHA-1",
          "content": "df107ccec150b9df801252656f81efc5b2259ecc"
        },
        {
          "alg": "SHA-256",
          "content": "6626f771e0417486701e0b4daff762e7212e820ca5b29fcc0d05f6f8736dfa6b"
        },
        {
          "alg": "SHA-512",
          "content": "1af3b623f6a4474adf736f2ac9cbeec97f8e5d98808a0c12f95b4950ae79a437d25b4d94258d9113fa4f324933038d6bbf4ce6a60f1fcb3d5f004440d7366a3a"
        }
      ],
      "licenses": [
        {
          "expression": "Apache-2.0"
        }
      ],
      "name": "python3-openid",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/e0/a5/c6ba13860bdf5525f1ab01e01cc667578d6f1efc8a1dba355700fb04c29b/python3_openid-3.2.0-py3-none-any.whl"
        },
        {
          "name": "aboutcode:filename",
          "value": "python3_openid-3.2.0-py3-none-any.whl"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "@license: Licensed under the Apache License, Version 2.0 (the \"License\");\n    you may not use this file except in compliance with the License.\n    You may obtain a copy of the License at\n    U{http://www.apache.org/licenses/LICENSE-2.0}\n\n    Unless required by applicable law or agreed to in writing, software\n    distributed under the License is distributed on an \"AS IS\" BASIS,\n    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n    See the License for the specific language governing permissions\n    and limitations under the License."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/python3-openid@3.2.0",
      "type": "library",
      "version": "3.2.0"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/pytz@2022.1",
      "copyright": "Copyright (c) Stuart Bishop",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "cb33686362800086a7695e324d0cac60"
        },
        {
          "alg": "SHA-1",
          "content": "71f7d702d7266e1e1dcf72a7a5dc422db60cefba"
        },
        {
          "alg": "SHA-256",
          "content": "e68985985296d9a66a881eb3193b0906246245294a881e7c8afe623866ac6a5c"
        },
        {
          "alg": "SHA-512",
          "content": "15d21fd371d6a9f1d882bb9cb82807fd5f29790410896205a28fd4df4b1d2fc1afdae53a37c9cde83541a6b3759396c3d79238f0cddc6332564e7329768e16fb"
        }
      ],
      "licenses": [
        {
          "expression": "MIT"
        }
      ],
      "name": "pytz",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/60/2e/dec1cc18c51b8df33c7c4d0a321b084cf38e1733b98f9d15018880fb4970/pytz-2022.1-py2.py3-none-any.whl"
        },
        {
          "name": "aboutcode:filename",
          "value": "pytz-2022.1-py2.py3-none-any.whl"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "Permission is hereby granted, free of charge, to any person obtaining a\ncopy of this software and associated documentation files (the \"Software\"),\nto deal in the Software without restriction, including without limitation\nthe rights to use, copy, modify, merge, publish, distribute, sublicense,\nand/or sell copies of the Software, and to permit persons to whom the\nSoftware is furnished to do so, subject to the following conditions:\n\nThe above copyright notice and this permission notice shall be included in\nall copies or substantial portions of the Software.\n\nTHE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR\nIMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,\nFITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL\nTHE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER\nLIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING\nFROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER\nDEALINGS IN THE SOFTWARE."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/pytz@2022.1",
      "type": "library",
      "version": "2022.1"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/pyyaml@6.0",
      "copyright": "Copyright (c) Ingy d\u00f6t Net, Kirill Simonov",
      "cpe": "",
      "description": "YAML parser and emitter for Python\nYAML is a data serialization format designed for human readability\nand interaction with scripting languages.  PyYAML is a YAML parser\nand emitter for Python.\n\nPyYAML features a complete YAML 1.1 parser, Unicode support, pickle\nsupport, capable extension API, and sensible error messages.  PyYAML\nsupports standard YAML tags and provides Python-specific tags that\nallow to represent an arbitrary Python object.\n\nPyYAML is applicable for a broad range of tasks from complex\nconfiguration files to object serialization and persistence.",
      "hashes": [
        {
          "alg": "MD5",
          "content": "1d19c798f25e58e3e582f0f8c977dbb8"
        },
        {
          "alg": "SHA-1",
          "content": "a8c40a3ae9d4c159382a58db3153d83e5521c51e"
        },
        {
          "alg": "SHA-256",
          "content": "68fb519c14306fec9720a2a5b45bc9f0c8d1b9c72adf45c37baedfcd949c35a2"
        },
        {
          "alg": "SHA-512",
          "content": "b402993073282e7f4202823b051d364b91929362edd5b3aebe93b56833956ec9279c1ba82b97f8bc8a2b82d20e1060e4ec9fc90400a6ed902adce3e4f83a6e0e"
        }
      ],
      "licenses": [
        {
          "expression": "MIT"
        }
      ],
      "name": "pyyaml",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/36/2b/61d51a2c4f25ef062ae3f74576b01638bebad5e045f747ff12643df63844/PyYAML-6.0.tar.gz"
        },
        {
          "name": "aboutcode:filename",
          "value": "PyYAML-6.0.tar.gz"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "https://pyyaml.org/"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "Permission is hereby granted, free of charge, to any person obtaining a copy of\nthis software and associated documentation files (the \"Software\"), to deal in\nthe Software without restriction, including without limitation the rights to\nuse, copy, modify, merge, publish, distribute, sublicense, and/or sell copies\nof the Software, and to permit persons to whom the Software is furnished to do\nso, subject to the following conditions:\n\nThe above copyright notice and this permission notice shall be included in all\ncopies or substantial portions of the Software.\n\nTHE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR\nIMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,\nFITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE\nAUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER\nLIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,\nOUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE\nSOFTWARE."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/pyyaml@6.0",
      "type": "library",
      "version": "6.0"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/redis@4.3.2",
      "copyright": "Copyright (c) Andy McCurdy",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "51cf85b6699e6c6cf4f828d93fe19742"
        },
        {
          "alg": "SHA-1",
          "content": "ddc71e759122243fd18f00e46e93311c4eff8904"
        },
        {
          "alg": "SHA-256",
          "content": "b30a2dc3f27cab69284829d6d423643beee88f279967c42e9014a2ffb7c2a84c"
        },
        {
          "alg": "SHA-512",
          "content": "bc57aebd0fb37474769f6c219e0805e93ea2e791bc047cf2c784e2476b9c7c685ac88d9bb79fc082d72db6eac84c343f7574c0388861aa4d9ccdc345cbed5a56"
        }
      ],
      "licenses": [
        {
          "expression": "MIT"
        }
      ],
      "name": "redis",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/d5/75/b4dcb8bd8409799a45b655ee036fdbea018592e249aed35c6338b42a59b8/redis-4.3.2-py3-none-any.whl"
        },
        {
          "name": "aboutcode:filename",
          "value": "redis-4.3.2-py3-none-any.whl"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "License :: OSI Approved :: MIT License"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/redis@4.3.2",
      "type": "library",
      "version": "4.3.2"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/requests-oauthlib@1.3.1",
      "copyright": "Copyright (c) Kenneth Reitz",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "24f97ba7181f2f105936db6932c1dbb5"
        },
        {
          "alg": "SHA-1",
          "content": "453668972bbb7580e6938f6896efaa38645415e2"
        },
        {
          "alg": "SHA-256",
          "content": "2577c501a2fb8d05a304c09d090d6e47c306fef15809d102b327cf8364bddab5"
        },
        {
          "alg": "SHA-512",
          "content": "5848d21671ba51866895c0b4395f9366d4e8101f8694c3954eda3dc5414f9ba902dc91e2f88453b0781125f46428cb13a1a0e22f8eb2f4572f804ecc908e83ad"
        }
      ],
      "licenses": [
        {
          "expression": "ISC"
        }
      ],
      "name": "requests-oauthlib",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/6f/bb/5deac77a9af870143c684ab46a7934038a53eb4aa975bc0687ed6ca2c610/requests_oauthlib-1.3.1-py2.py3-none-any.whl"
        },
        {
          "name": "aboutcode:filename",
          "value": "requests_oauthlib-1.3.1-py2.py3-none-any.whl"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "Permission to use, copy, modify, and/or distribute this software for any\npurpose with or without fee is hereby granted, provided that the above\ncopyright notice and this permission notice appear in all copies.\n\nTHE SOFTWARE IS PROVIDED \"AS IS\" AND THE AUTHOR DISCLAIMS ALL WARRANTIES\nWITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF\nMERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR\nANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES\nWHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN\nACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF\nOR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/requests-oauthlib@1.3.1",
      "type": "library",
      "version": "1.3.1"
    },
    {
      "author": "",
      "bom-ref": "pkg:github/requirejs/requirejs@2.1.15",
      "copyright": "Copyright jQuery Foundation and other contributors",
      "cpe": "",
      "description": "RequireJS loads plain JavaScript files as well as more defined modules. It is optimized for in-browser use, including in a Web Worker, but it can be used in other JavaScript environments, like Rhino and Node. It implements the Asynchronous Module API.",
      "hashes": [
        {
          "alg": "MD5",
          "content": "8b191ab81dee53559c6ef248aa3d331b"
        },
        {
          "alg": "SHA-1",
          "content": "76d64c1f3da9d4220cbbe676608df8a6ab1ca2df"
        },
        {
          "alg": "SHA-256",
          "content": "89f18f8a52395b31d68cd419501c885529316f3654bec1e804d74d93b210eaa6"
        },
        {
          "alg": "SHA-512",
          "content": "19893b3b991493e51fdc7331a383cac7577893effe1d8dbb6b905d2bad58c46b69a65026fc86ce2df4c4a1d9b366088c556e75adf10c06412d78762ca689e30d"
        }
      ],
      "licenses": [
        {
          "expression": "MIT"
        }
      ],
      "name": "requirejs",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/requirejs/requirejs/archive/2.1.15.zip"
        },
        {
          "name": "aboutcode:filename",
          "value": "requirejs-2.1.15.zip"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "http://requirejs.org"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "Copyright jQuery Foundation and other contributors, https://jquery.org/\n\nThis software consists of voluntary contributions made by many\nindividuals. For exact contribution history, see the revision history\navailable at https://github.com/requirejs/requirejs\n\nThe following license applies to all parts of this software except as\ndocumented below:\n\n====\n\nPermission is hereby granted, free of charge, to any person obtaining\na copy of this software and associated documentation files (the\n\"Software\"), to deal in the Software without restriction, including\nwithout limitation the rights to use, copy, modify, merge, publish,\ndistribute, sublicense, and/or sell copies of the Software, and to\npermit persons to whom the Software is furnished to do so, subject to\nthe following conditions:\n\nThe above copyright notice and this permission notice shall be\nincluded in all copies or substantial portions of the Software.\n\nTHE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND,\nEXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF\nMERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND\nNONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE\nLIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION\nOF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION\nWITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "JavaScript"
        }
      ],
      "purl": "pkg:github/requirejs/requirejs@2.1.15",
      "type": "library",
      "version": "2.1.15"
    },
    {
      "author": "nexB. Inc. and others",
      "bom-ref": "pkg:pypi/saneyaml@0.5.2",
      "copyright": "Copyright (c) nexB Inc. and others",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "4985d7a8f4ad5af6ae53132e8d23a247"
        },
        {
          "alg": "SHA-1",
          "content": "2405b7adf40d2e61a1b6711ac2ad27306af10191"
        },
        {
          "alg": "SHA-256",
          "content": "d6074f1959041342ab41d74a6f904720ffbcf63c94467858e0e22e17e3c43d41"
        },
        {
          "alg": "SHA-512",
          "content": "b3712afa6fd99eb4ca747bc9008c3d673e2638f0861903042e52b5f770a3b285bfe83d4a347daccd5044085398ef982b76c421e258cfc7b04452a83f50bcf07f"
        }
      ],
      "licenses": [
        {
          "expression": "Apache-2.0"
        }
      ],
      "name": "saneyaml",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/d1/4a/7374cac103bdfec7c199606784119bee9171ba051290b219ffec1bedc650/saneyaml-0.5.2.tar.gz"
        },
        {
          "name": "aboutcode:filename",
          "value": "saneyaml-0.5.2.tar.gz"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "# Copyright (c) nexB Inc. and others.\n# SPDX-License-Identifier: Apache-2.0\n#\n# Visit https://aboutcode.org and https://github.com/nexB/ for support and download.\n# ScanCode is a trademark of nexB Inc.\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");\n# you may not use this file except in compliance with the License.\n# You may obtain a copy of the License at\n#\n#     http://www.apache.org/licenses/LICENSE-2.0\n#\n# Unless required by applicable law or agreed to in writing, software\n# distributed under the License is distributed on an \"AS IS\" BASIS,\n# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n# See the License for the specific language governing permissions and\n# limitations under the License."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/saneyaml@0.5.2",
      "type": "library",
      "version": "0.5.2"
    },
    {
      "author": "",
      "bom-ref": "pkg:github/screwdriver-cd/screwdriver@4.1.0?version_prefix=v",
      "copyright": "Copyright Yahoo Inc.",
      "cpe": "",
      "description": "API server for the Screwdriver.cd service",
      "hashes": [
        {
          "alg": "MD5",
          "content": "b0722a41aecca9560996de53d0c0e7af"
        },
        {
          "alg": "SHA-1",
          "content": "9fb4eae161e10fe80a9186dc8110dcbb55a63f35"
        },
        {
          "alg": "SHA-256",
          "content": "617f58b3a05b0609dae289b5bdef74f1be9834bcfb531c42696bebc94a334d63"
        },
        {
          "alg": "SHA-512",
          "content": "d483390fa3384361b11c95252b1de6ac9ee4953326e4bb2feb6706bfe4ac3edbf46b4dfd2684c06074a1f3faf43d92dcfba1671ac0d727c3bf0e6bfad39acfe8"
        }
      ],
      "licenses": [
        {
          "expression": "BSD-3-Clause"
        }
      ],
      "name": "screwdriver",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/screwdriver-cd/screwdriver/archive/refs/tags/v4.1.0.tar.gz"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "http://screwdriver.cd"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "JavaScript"
        }
      ],
      "purl": "pkg:github/screwdriver-cd/screwdriver@4.1.0?version_prefix=v",
      "type": "library",
      "version": "4.1.0"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/selenium@3.141.0",
      "copyright": "Copyright 2008-2017 (c) Selenium Project contributors",
      "cpe": "",
      "description": "Selenium automates browsers. Primarily, it is for automating web applications for testing purposes, but is certainly not limited to just that.",
      "hashes": [
        {
          "alg": "MD5",
          "content": "15d56e695f5bd2b12faf054e61047c7d"
        },
        {
          "alg": "SHA-1",
          "content": "18ce45fef7e2e59b7770e99d7323d1f2cd243de8"
        },
        {
          "alg": "SHA-256",
          "content": "2d7131d7bc5a5b99a2d9b04aaf2612c411b03b8ca1b1ee8d3de5845a9be2cb3c"
        },
        {
          "alg": "SHA-512",
          "content": "2f91c8c64d3e8b17fc844b4e20b6a5973abce5c8b2fea9a3ad73e9e618f936921c7b0a9a54672a4c930ec803231d049d10a55c6787413abf1cc3a49bf2929526"
        }
      ],
      "licenses": [
        {
          "expression": "Apache-2.0"
        }
      ],
      "name": "selenium",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/80/d6/4294f0b4bce4de0abf13e17190289f9d0613b0a44e5dd6a7f5ca98459853/selenium-3.141.0-py2.py3-none-any.whl#sha256=2d7131d7bc5a5b99a2d9b04aaf2612c411b03b8ca1b1ee8d3de5845a9be2cb3c"
        },
        {
          "name": "aboutcode:filename",
          "value": "selenium-3.141.0-py2.py3-none-any.whl"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "http://docs.seleniumhq.org/"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "Selenium's source code is made available under the Apache 2.0 license."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/selenium@3.141.0",
      "type": "library",
      "version": "3.141.0"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/setuptools@62.3.2",
      "copyright": "Copyright (c) setuptools project team",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "8cec5ba9f875efdd8534000c3a0c9b24"
        },
        {
          "alg": "SHA-1",
          "content": "6c46d41208218a6dcf9bfc0e78fb210d992e4e68"
        },
        {
          "alg": "SHA-256",
          "content": "68e45d17c9281ba25dc0104eadd2647172b3472d9e01f911efa57965e8d51a36"
        },
        {
          "alg": "SHA-512",
          "content": "366d69dc44e326dd7549cdacd8dec481a14dce4feef4338adc38b9de5c4c338f04d61696e13ce8603be1315f2e8734100f92d3fe4b4b11843e19f550c9631978"
        }
      ],
      "licenses": [
        {
          "expression": "MIT AND Python-2.0"
        }
      ],
      "name": "setuptools",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/e9/1c/ec080fde54ab30a738c92f794eab7f5d2f354f2b619ee95b2efe353e0766/setuptools-62.3.2-py3-none-any.whl"
        },
        {
          "name": "aboutcode:filename",
          "value": "setuptools-62.3.2-py3-none-any.whl"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "Released under the MIT License and the Python License."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/setuptools@62.3.2",
      "type": "library",
      "version": "62.3.2"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/six@1.16.0",
      "copyright": "Copyright (c) Benjamin Peterson",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "529d7fd7e14612ccde86417b4402d6f3"
        },
        {
          "alg": "SHA-1",
          "content": "79e6f2e4f9e24898f1896df379871b9c9922f147"
        },
        {
          "alg": "SHA-256",
          "content": "8abb2f1d86890a2dfb989f9a77cfcfd3e47c2a354b01111771326f8aa26e0254"
        },
        {
          "alg": "SHA-512",
          "content": "656b010ed36d7486c07891c0247c7258faf0d1a68c5fb0a35db9c5b670eb712d5e470b023ffd568d7617e0ae77340820397014790d14fda4d13593fa2bd1c76f"
        }
      ],
      "licenses": [
        {
          "expression": "MIT"
        }
      ],
      "name": "six",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/d9/5a/e7c31adbe875f2abbb91bd84cf2dc52d792b5a01506781dbcf25c91daf11/six-1.16.0-py2.py3-none-any.whl"
        },
        {
          "name": "aboutcode:filename",
          "value": "six-1.16.0-py2.py3-none-any.whl"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "Permission is hereby granted, free of charge, to any person obtaining a copy of\nthis software and associated documentation files (the \"Software\"), to deal in\nthe Software without restriction, including without limitation the rights to\nuse, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of\nthe Software, and to permit persons to whom the Software is furnished to do so,\nsubject to the following conditions:\n\nThe above copyright notice and this permission notice shall be included in all\ncopies or substantial portions of the Software.\n\nTHE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR\nIMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS\nFOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR\nCOPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER\nIN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN\nCONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/six@1.16.0",
      "type": "library",
      "version": "1.16.0"
    },
    {
      "author": "",
      "bom-ref": "pkg:github/fgnass/spin.js@1.3.2",
      "copyright": "Copyright (c) Felix Gnass [fgnass at neteye dot de]",
      "cpe": "",
      "description": "Spin.js dynamically creates spinning activity indicators that can be used as resolution-independent replacement for AJAX loading GIFs.",
      "hashes": [
        {
          "alg": "MD5",
          "content": "51676f55e29fdb9f5008735a1c5a29ac"
        },
        {
          "alg": "SHA-1",
          "content": "f68b36040e6c2ee16b6eab4755ac9d1f3335b6e0"
        },
        {
          "alg": "SHA-256",
          "content": "99f7bd1530a6d39723f70f383ea4ac6a662648c7b22ef5d3d8df592f99b8a652"
        },
        {
          "alg": "SHA-512",
          "content": "66ae8e2cb20c276fe605a00291192935d3b88b0b46c0c3bbad981b0ae305955cdbb2351596172156940b4e63c1ac45fad9af551e8858f36ab3763e4bdcbca0a9"
        }
      ],
      "licenses": [
        {
          "expression": "MIT"
        }
      ],
      "name": "spin.js",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/fgnass/spin.js/archive/1.3.2.zip"
        },
        {
          "name": "aboutcode:filename",
          "value": "spin.js-1.3.2.zip"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "http://fgnass.github.io/spin.js/"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "The MIT License\n\nCopyright (c) 2011 Felix Gnass [fgnass at neteye dot de]\n\nPermission is hereby granted, free of charge, to any person obtaining a copy\nof this software and associated documentation files (the \"Software\"), to deal\nin the Software without restriction, including without limitation the rights\nto use, copy, modify, merge, publish, distribute, sublicense, and/or sell\ncopies of the Software, and to permit persons to whom the Software is\nfurnished to do so, subject to the following conditions:\n\nThe above copyright notice and this permission notice shall be included in\nall copies or substantial portions of the Software.\n\nTHE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR\nIMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,\nFITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE\nAUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER\nLIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,\nOUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN\nTHE SOFTWARE."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "JavaScript"
        }
      ],
      "purl": "pkg:github/fgnass/spin.js@1.3.2",
      "type": "library",
      "version": "1.3.2"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/sqlparse@0.4.2",
      "copyright": "Copyright (c) the sqlparse authors and contributors",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "7ba95d1ee3802ec2bb6b88d04e06fbfd"
        },
        {
          "alg": "SHA-1",
          "content": "c25784669d39aa8d9e2dfe27a1ab356d0cce9409"
        },
        {
          "alg": "SHA-256",
          "content": "48719e356bb8b42991bdbb1e8b83223757b93789c00910a616a071910ca4a64d"
        },
        {
          "alg": "SHA-512",
          "content": "3715d90523e93feea074ee96d82316e8ae3bd2a236bf53794cb4717e8e0f3b4b215846dadd21aed81325b48fbeaa24b7f1d12110030f57f783ad28a9cb6e8f27"
        }
      ],
      "licenses": [
        {
          "expression": "BSD-3-Clause"
        }
      ],
      "name": "sqlparse",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/05/40/d836d55fb3f467243ee839ab7b814822fda522cd395fa41e282684e71ee5/sqlparse-0.4.2-py3-none-any.whl"
        },
        {
          "name": "aboutcode:filename",
          "value": "sqlparse-0.4.2-py3-none-any.whl"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "Classifier: License :: OSI Approved :: BSD License"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/sqlparse@0.4.2",
      "type": "library",
      "version": "0.4.2"
    },
    {
      "author": "",
      "bom-ref": "pkg:github/automatic1111/stable-diffusion-webui@1.0.0-pre?version_prefix=v",
      "copyright": "",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "66f7088ebc89b0b88f24b44265d2544a"
        },
        {
          "alg": "SHA-1",
          "content": "34e5429404cf8ad9cf8d8282d645abc0db57cd1f"
        },
        {
          "alg": "SHA-256",
          "content": "a5370d6bec9deaa5c400d9ec0d5ea1c77457dc075a41c00b6e3bcd19259748b6"
        },
        {
          "alg": "SHA-512",
          "content": "ac2f03dc98ff9be7fe281a933a7aff9c5bdc5e88a32b17c1155389dfcccff03d39ce53e6f5abd1df3ff561ca5a83f3b58642fba88f81c14642a9362cafd5eb27"
        }
      ],
      "licenses": [
        {
          "expression": "AGPL-3.0-only"
        }
      ],
      "name": "stable-diffusion-webui",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/AUTOMATIC1111/stable-diffusion-webui/archive/refs/tags/v1.0.0-pre.tar.gz"
        },
        {
          "name": "aboutcode:filename",
          "value": "stable-diffusion-webui-1.0.0-pre.tar.gz"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:github/automatic1111/stable-diffusion-webui@1.0.0-pre?version_prefix=v",
      "type": "library",
      "version": "1.0.0-pre"
    },
    {
      "author": "",
      "bom-ref": "pkg:github/swagger-api/swagger-codegen@3.0.25?version_prefix=v",
      "copyright": "",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "e660d998300050457b9aaf4ef48df378"
        },
        {
          "alg": "SHA-1",
          "content": "9fcd79739a82f58fee41bf6851ebb1c6623d10e8"
        }
      ],
      "licenses": [
        {
          "expression": "Apache-2.0 AND MIT"
        }
      ],
      "name": "swagger-codegen",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/swagger-api/swagger-codegen/archive/refs/tags/v3.0.25.tar.gz"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Java"
        }
      ],
      "purl": "pkg:github/swagger-api/swagger-codegen@3.0.25?version_prefix=v",
      "type": "library",
      "version": "3.0.25"
    },
    {
      "author": "",
      "bom-ref": "pkg:github/swagger-api/swagger-core@2.1.7?version_prefix=v",
      "copyright": "Copyright SmartBear Software",
      "cpe": "",
      "description": "swagger-project",
      "hashes": [
        {
          "alg": "MD5",
          "content": "f11776fb5d4225a2437a5159ada3dc8c"
        },
        {
          "alg": "SHA-1",
          "content": "82d619fabc26e3ab2a7fabd446074ea20ca53688"
        }
      ],
      "licenses": [
        {
          "expression": "Apache-2.0 AND MIT"
        }
      ],
      "name": "swagger-core",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/swagger-api/swagger-core/archive/refs/tags/v2.1.7.tar.gz"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "https://github.com/swagger-api/swagger-core"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Java"
        }
      ],
      "purl": "pkg:github/swagger-api/swagger-core@2.1.7?version_prefix=v",
      "type": "library",
      "version": "2.1.7"
    },
    {
      "author": "",
      "bom-ref": "pkg:github/swagger-api/swagger-editor@3.15.11?version_prefix=v",
      "copyright": "Copyright SmartBear Software Inc.",
      "cpe": "",
      "description": "Swagger Editor",
      "hashes": [
        {
          "alg": "MD5",
          "content": "1f1aa226d42e65cdd3d4c27cc59eaee8"
        },
        {
          "alg": "SHA-1",
          "content": "4fee9ee359fbc6ce781d26f19f3a64bde606ccec"
        },
        {
          "alg": "SHA-256",
          "content": "595d05613b8de39f4bbe247b0bcf6878a7f2ad79035f6b9d46ab284fd43a4361"
        },
        {
          "alg": "SHA-512",
          "content": "64cd16f79381852b129a78c1c2db2841e31459c044707e43baa16fd8d36a00af7577186c8832871f2ef883d578b685c769f19f3991aec0c57bf29c51840f75f3"
        }
      ],
      "licenses": [
        {
          "expression": "Apache-2.0 AND MIT"
        }
      ],
      "name": "swagger-editor",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/swagger-api/swagger-editor/archive/refs/tags/v3.15.11.tar.gz"
        },
        {
          "name": "aboutcode:filename",
          "value": "swagger-editor-3.15.11.tar.gz"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "JavaScript"
        }
      ],
      "purl": "pkg:github/swagger-api/swagger-editor@3.15.11?version_prefix=v",
      "type": "library",
      "version": "3.15.11"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/tblib@1.7.0",
      "copyright": "Copyright (c) Ionel Cristian M\u0103rie\u0219",
      "cpe": "",
      "description": "Traceback fiddling library. Allows you to pickle tracebacks.",
      "hashes": [
        {
          "alg": "MD5",
          "content": "258c8173ae0b04ec122a06368174acb5"
        },
        {
          "alg": "SHA-1",
          "content": "aa74dce2b0f82530c37b4dab97aae51e66666ec5"
        },
        {
          "alg": "SHA-256",
          "content": "289fa7359e580950e7d9743eab36b0691f0310fce64dee7d9c31065b8f723e23"
        },
        {
          "alg": "SHA-512",
          "content": "69b589d30042a57e20a6129bb419f4304e783e29b7a09791c32e897b3280c92f6a00162601a6ad2b93699641acf1674eb7f916a129f0a83ae2e9d02349b48756"
        }
      ],
      "licenses": [
        {
          "expression": "BSD-2-Clause"
        }
      ],
      "name": "tblib",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/f8/cd/2fad4add11c8837e72f50a30e2bda30e67a10d70462f826b291443a55c7d/tblib-1.7.0-py2.py3-none-any.whl#sha256=289fa7359e580950e7d9743eab36b0691f0310fce64dee7d9c31065b8f723e23"
        },
        {
          "name": "aboutcode:filename",
          "value": "tblib-1.7.0-py2.py3-none-any.whl"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "https://github.com/ionelmc/python-tblib"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "Redistribution and use in source and binary forms, with or without modification, are permitted provided that the\nfollowing conditions are met:\n\n1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following\ndisclaimer.\n\n2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following\ndisclaimer in the documentation and/or other materials provided with the distribution.\n\nTHIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS \"AS IS\" AND ANY EXPRESS OR IMPLIED WARRANTIES,\nINCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE\nDISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,\nSPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR\nSERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\nWHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF\nTHIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/tblib@1.7.0",
      "type": "library",
      "version": "1.7.0"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/tomli@2.0.1",
      "copyright": "Copyright (c) Taneli Hukkinen",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "a8a774971c6d046cf1c87cd801dd158f"
        },
        {
          "alg": "SHA-1",
          "content": "5bfc83c14bc54e6193a0d50a50c16a88eda0c4fa"
        },
        {
          "alg": "SHA-256",
          "content": "939de3e7a6161af0c887ef91b7d41a53e7c5a1ca976325f429cb46ea9bc30ecc"
        },
        {
          "alg": "SHA-512",
          "content": "b6164b03d3db360093f92e644e87a37a0ce20d63d7e9e271fcafd727f4fdb73ad6b301aaf32b3d2839f6eedbc8ea499dafba7335b8fdfc4667e30ed50c9805b4"
        }
      ],
      "licenses": [
        {
          "expression": "MIT"
        }
      ],
      "name": "tomli",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/97/75/10a9ebee3fd790d20926a90a2547f0bf78f371b2f13aa822c759680ca7b9/tomli-2.0.1-py3-none-any.whl"
        },
        {
          "name": "aboutcode:filename",
          "value": "tomli-2.0.1-py3-none-any.whl"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "Permission is hereby granted, free of charge, to any person obtaining a copy\nof this software and associated documentation files (the \"Software\"), to deal\nin the Software without restriction, including without limitation the rights\nto use, copy, modify, merge, publish, distribute, sublicense, and/or sell\ncopies of the Software, and to permit persons to whom the Software is\nfurnished to do so, subject to the following conditions:\n\nThe above copyright notice and this permission notice shall be included in all\ncopies or substantial portions of the Software.\n\nTHE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR\nIMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,\nFITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE\nAUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER\nLIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,\nOUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE\nSOFTWARE."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/tomli@2.0.1",
      "type": "library",
      "version": "2.0.1"
    },
    {
      "author": "",
      "bom-ref": "pkg:github/jashkenas/underscore@1.6.0",
      "copyright": "Copyright (c) Jeremy Ashkenas, DocumentCloud and Investigative Reporters & Editors",
      "cpe": "",
      "description": "Underscore is a JavaScript library that provides a whole mess of useful functional programming helpers without extending any built-in objects. It\u00cds the answer to the question: \"If I sit down in front of a blank HTML page, and want to start being productive immediately, what do I need?\" ....and the tie to go along with jQuery's tux and Backbone's suspenders.",
      "hashes": [
        {
          "alg": "MD5",
          "content": "bc62b91df8123851c248ffa4af07fcba"
        },
        {
          "alg": "SHA-1",
          "content": "164bb4977d638e8ff8610e359f4fc7128acc2dbb"
        },
        {
          "alg": "SHA-256",
          "content": "29bc202c2413c4f0c0b19a1b686c071f001ed602355d833335375de208e23fe0"
        },
        {
          "alg": "SHA-512",
          "content": "946f47e0f60ec848bd30203b8f95f88cc526346453450452a46175ca4e34b036a405b5db12ea58479e7facd93bf6c8f4aade9909bee32c8192cfebfea3d05dee"
        }
      ],
      "licenses": [
        {
          "expression": "MIT"
        }
      ],
      "name": "underscore",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/jashkenas/underscore/archive/1.6.0.tar.gz"
        },
        {
          "name": "aboutcode:filename",
          "value": "underscore-1.6.0.tar.gz"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "http://underscorejs.org/"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "Permission is hereby granted, free of charge, to any person\nobtaining a copy of this software and associated documentation\nfiles (the \"Software\"), to deal in the Software without\nrestriction, including without limitation the rights to use,\ncopy, modify, merge, publish, distribute, sublicense, and/or sell\ncopies of the Software, and to permit persons to whom the\nSoftware is furnished to do so, subject to the following\nconditions:\n\nThe above copyright notice and this permission notice shall be\nincluded in all copies or substantial portions of the Software.\n\nTHE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND,\nEXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES\nOF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND\nNONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT\nHOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY,\nWHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING\nFROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR\nOTHER DEALINGS IN THE SOFTWARE."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "JavaScript"
        }
      ],
      "purl": "pkg:github/jashkenas/underscore@1.6.0",
      "type": "library",
      "version": "1.6.0"
    },
    {
      "author": "",
      "bom-ref": "pkg:github/epeli/underscore.string@2.3.3",
      "copyright": "Copyright (c) 2011 Esa-Matti Suuronen esa-matti@suuronen.org",
      "cpe": "",
      "description": "String manipulation extensions for Underscore.js javascript library",
      "hashes": [
        {
          "alg": "MD5",
          "content": "44fd9dab2c378070af86bdfb685bed3e"
        },
        {
          "alg": "SHA-1",
          "content": "b544d96583aaca01fd4a12b9eef016fbcdd7a463"
        },
        {
          "alg": "SHA-256",
          "content": "1269f36d1e2fcd31af670c2c1e6c0069b9f7a8b18c7fe9e06dfad3c6df48e8ae"
        },
        {
          "alg": "SHA-512",
          "content": "ed1917f641f8724a63d4948ba9ad5ded8d639ec67c11d911e6d59a26124e4107b56d8e65044fe236c1bb19f021f40d9fb98643c872754d2e05d09d1110e1971c"
        }
      ],
      "licenses": [
        {
          "expression": "MIT"
        }
      ],
      "name": "underscore.string",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/epeli/underscore.string/archive/2.3.3.tar.gz"
        },
        {
          "name": "aboutcode:filename",
          "value": "underscore.string-2.3.3.tar.gz"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "http://epeli.github.io/underscore.string/"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "The MIT License\n\nCopyright (c) 2011 Esa-Matti Suuronen esa-matti@suuronen.org\n\nPermission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the \"Software\"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:\n\nThe above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.\n\nTHE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "JavaScript"
        }
      ],
      "purl": "pkg:github/epeli/underscore.string@2.3.3",
      "type": "library",
      "version": "2.3.3"
    },
    {
      "author": "",
      "bom-ref": "pkg:github/microsoft/unilm@s2s-ft.v0.3",
      "copyright": "",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "9766bf76ec2ed0503eab2ed5025dca37"
        },
        {
          "alg": "SHA-1",
          "content": "f1043170cccadc67364be5a03d24b8219f48d231"
        },
        {
          "alg": "SHA-256",
          "content": "4ebe1af3193d63a97a81e293714005217d693261706703ccebdd0c0c3dc7924f"
        },
        {
          "alg": "SHA-512",
          "content": "5185034f21e50bcf4f40c3e3ae9a97d12426ecb9478ff40e60a32a76ca531077946ce1f12e0b77e416c612d749253f5b20f20266e32b5725a9ec7faf9594d72b"
        }
      ],
      "licenses": [
        {
          "expression": "Apache-2.0 AND LicenseRef-scancode-free-unknown AND LGPL-2.1-or-later AND MIT"
        }
      ],
      "name": "unilm",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/microsoft/unilm/archive/refs/tags/s2s-ft.v0.3.tar.gz"
        },
        {
          "name": "aboutcode:filename",
          "value": "unilm-s2s-ft.v0.3.tar.gz"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:github/microsoft/unilm@s2s-ft.v0.3",
      "type": "library",
      "version": "s2s-ft.v0.3"
    },
    {
      "author": "",
      "bom-ref": "pkg:github/medialize/uri.js@1.18.10?version_prefix=v",
      "copyright": "Copyright (c) 2011 Rodney Rehm",
      "cpe": "",
      "description": "URI.js is a javascript library for working with URLs. It offers a \"jQuery-style\" API (Fluent Interface, Method Chaining) to read and write all regular components and a number of convenience methods like .directory() and .authority().",
      "hashes": [
        {
          "alg": "MD5",
          "content": "b1db569e747e252b522845be8414a399"
        },
        {
          "alg": "SHA-1",
          "content": "0cc87643c0b9d2b8acaa236f2af519949c8e3b9e"
        },
        {
          "alg": "SHA-256",
          "content": "89fcffcce210a5e1ea31bc789229014e2a2c5f99f8ca1908bb49ffad27920fe1"
        },
        {
          "alg": "SHA-512",
          "content": "73a69f022b7c4fa11d208e4e1844f85a4d6c8bff0808818b47cc271348dee9edfbbe2b2718422ed7afb70ed2bacd39b296ee0ad781b75030afaabfea65e032ec"
        }
      ],
      "licenses": [
        {
          "expression": "MIT"
        }
      ],
      "name": "uri.js",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/medialize/URI.js/archive/v1.18.10.zip"
        },
        {
          "name": "aboutcode:filename",
          "value": "URI.js-1.18.10.zip"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "https://medialize.github.io/URI.js/"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "URI.js is published under the [MIT license](http://www.opensource.org/licenses/mit-license). Until version 1.13.2 URI.js was also published under the [GPL v3](http://opensource.org/licenses/GPL-3.0) license - but as this dual-licensing causes more questions than helps anyone, it was dropped with version 1.14.0."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "JavaScript"
        }
      ],
      "purl": "pkg:github/medialize/uri.js@1.18.10?version_prefix=v",
      "type": "library",
      "version": "1.18.10"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/uritemplate@4.1.1",
      "copyright": "Copyright (c) Ian Stapleton Cordasco",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "a68f2279025a2610613efb2287eaf463"
        },
        {
          "alg": "SHA-1",
          "content": "d22020a5e0f0ae271165d69889c64214516f3af2"
        },
        {
          "alg": "SHA-256",
          "content": "830c08b8d99bdd312ea4ead05994a38e8936266f84b9a7878232db50b044e02e"
        },
        {
          "alg": "SHA-512",
          "content": "cd527654fc659c0b329b9ae0732f72008706641808756e0344acfec530a1627d5dbfad963235664c9ff3afe45a487183fb8170202fcc5a695461bf101b77b726"
        }
      ],
      "licenses": [
        {
          "expression": "BSD-3-Clause OR Apache-2.0"
        }
      ],
      "name": "uritemplate",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/81/c0/7461b49cd25aeece13766f02ee576d1db528f1c37ce69aee300e075b485b/uritemplate-4.1.1-py2.py3-none-any.whl"
        },
        {
          "name": "aboutcode:filename",
          "value": "uritemplate-4.1.1-py2.py3-none-any.whl"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "This software is made available under the terms of *either* of the licenses\nfound in LICENSE.APACHE or LICENSE.BSD. Contributions to uritemplate are\nmade under the terms of *both* these licenses."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/uritemplate@4.1.1",
      "type": "library",
      "version": "4.1.1"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/urllib3@1.25.10",
      "copyright": "Copyright Andrey Petrov and contributors",
      "cpe": "",
      "description": "urllib3 is a powerful, sanity-friendly HTTP client for Python. Much of the Python ecosystem already uses urllib3 and you should too. urllib3 brings many critical features that are missing from the Python standard libraries:\r\n    Thread safety.\r\n    Connection pooling.\r\n    Client-side SSL/TLS verification.\r\n    File uploads with multipart encoding.\r\n    Helpers for retrying requests and dealing with HTTP redirects.\r\n    Support for gzip and deflate encoding.\r\n    Proxy support for HTTP and SOCKS.\r\n    100% test coverage.",
      "hashes": [
        {
          "alg": "MD5",
          "content": "4b1c74025358273a94eed31250243b92"
        },
        {
          "alg": "SHA-1",
          "content": "4b768a05e3c46a01e84e79da651b7ebde990dcf4"
        },
        {
          "alg": "SHA-256",
          "content": "e7983572181f5e1522d9c98453462384ee92a0be7fac5f1413a1e35c56cc0461"
        },
        {
          "alg": "SHA-512",
          "content": "b4e88397d5ac77c669c8bf01fdf6a70ec7cc3acbdf69e0113ce9a5cd8394e932e6e153d85c60978917e8bf6e85e15f1a4c7da10d2a10cfa0735884a5861a981d"
        }
      ],
      "licenses": [
        {
          "expression": "MIT"
        }
      ],
      "name": "urllib3",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/9f/f0/a391d1463ebb1b233795cabfc0ef38d3db4442339de68f847026199e69d7/urllib3-1.25.10-py2.py3-none-any.whl#sha256=e7983572181f5e1522d9c98453462384ee92a0be7fac5f1413a1e35c56cc0461"
        },
        {
          "name": "aboutcode:filename",
          "value": "urllib3-1.25.10-py2.py3-none-any.whl"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "https://github.com/shazow/urllib3"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "Classifier: License :: OSI Approved :: MIT License"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/urllib3@1.25.10",
      "type": "library",
      "version": "1.25.10"
    },
    {
      "author": "",
      "bom-ref": "pkg:github/webassembly/wabt@1.0.23",
      "copyright": "Copyright WebAssembly Community Group",
      "cpe": "",
      "description": "WABT: The WebAssembly Binary Toolkit. WABT (we pronounce it \"wabbit\") is a suite of tools for WebAssembly.",
      "hashes": [
        {
          "alg": "MD5",
          "content": "7fab0237664265f0315ae79e747f75c8"
        },
        {
          "alg": "SHA-1",
          "content": "cb4c3f3b8280ee6c812747897d12fa5fe43dee8f"
        }
      ],
      "licenses": [
        {
          "expression": "Apache-2.0"
        }
      ],
      "name": "wabt",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/WebAssembly/wabt/archive/refs/tags/1.0.23.tar.gz"
        },
        {
          "name": "aboutcode:filename",
          "value": "wabt-1.0.23.tar.gz"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "https://github.com/WebAssembly/wabt"
        },
        {
          "name": "aboutcode:notice_text",
          "value": " * Copyright 2016 WebAssembly Community Group participants\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n *     http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable law or agreed to in writing, software\n * distributed under the License is distributed on an \"AS IS\" BASIS,\n * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n * See the License for the specific language governing permissions and\n * limitations under the License."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "C++"
        }
      ],
      "purl": "pkg:github/webassembly/wabt@1.0.23",
      "type": "library",
      "version": "1.0.23"
    },
    {
      "author": "Wasmer Engineering Team <engineering@wasmer.io>",
      "bom-ref": "pkg:github/wasmerio/wasmer@1.0.2",
      "copyright": "Copyright (c) Wasmer, Inc. and its affiliates",
      "cpe": "",
      "description": "Wasmer workspace",
      "hashes": [
        {
          "alg": "MD5",
          "content": "52b9ece83ba9c3b12f9e3b8925feccdd"
        },
        {
          "alg": "SHA-1",
          "content": "cc2c35a5492e4c176d59317427c88f8909bc3dbb"
        }
      ],
      "licenses": [
        {
          "expression": "MIT"
        }
      ],
      "name": "wasmer",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/wasmerio/wasmer/archive/refs/tags/1.0.2.tar.gz"
        },
        {
          "name": "aboutcode:filename",
          "value": "wasmer-1.0.2.tar.gz"
        },
        {
          "name": "aboutcode:homepage_url",
          "value": "https://wasmer.io/"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "MIT License\n\nCopyright (c) 2019-present Wasmer, Inc. and its affiliates.\n\nPermission is hereby granted, free of charge, to any person obtaining a copy\nof this software and associated documentation files (the \"Software\"), to deal\nin the Software without restriction, including without limitation the rights\nto use, copy, modify, merge, publish, distribute, sublicense, and/or sell\ncopies of the Software, and to permit persons to whom the Software is\nfurnished to do so, subject to the following conditions:\n\nThe above copyright notice and this permission notice shall be included in all\ncopies or substantial portions of the Software.\n\nTHE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR\nIMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,\nFITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE\nAUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER\nLIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,\nOUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE\nSOFTWARE."
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Rust"
        }
      ],
      "purl": "pkg:github/wasmerio/wasmer@1.0.2",
      "type": "library",
      "version": "1.0.2"
    },
    {
      "author": "Daniel Holth Author-email dholth@fastmail.fm",
      "bom-ref": "pkg:pypi/wheel@0.37.1",
      "copyright": "copyright (c) Daniel Holth <dholth@fastmail.fm> and contributors",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "f7e1c5e641a4a0eea8379f43bceaa564"
        },
        {
          "alg": "SHA-1",
          "content": "86aa63600ec29372a677394df507f70953e44962"
        },
        {
          "alg": "SHA-256",
          "content": "4bdcd7d840138086126cd09254dc6195fb4fc6f01c050a1d7236f2630db1d22a"
        },
        {
          "alg": "SHA-512",
          "content": "dd5b7bce961e8bc3f25877c8e13433b522eb92fda533552424f2e4a03fbf8e374fab5792e645ba598f7b78a8e7458ee54bba379904772b22dfd7fad1ad4f7c5c"
        }
      ],
      "licenses": [
        {
          "expression": "MIT"
        }
      ],
      "name": "wheel",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/27/d6/003e593296a85fd6ed616ed962795b2f87709c3eee2bca4f6d0fe55c6d00/wheel-0.37.1-py2.py3-none-any.whl"
        },
        {
          "name": "aboutcode:filename",
          "value": "wheel-0.37.1-py2.py3-none-any.whl"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "Classifier: License :: OSI Approved :: MIT License"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/wheel@0.37.1",
      "type": "library",
      "version": "0.37.1"
    },
    {
      "author": "",
      "bom-ref": "pkg:pypi/xlsxwriter@3.0.3",
      "copyright": "Copyright (c) John McNamara",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "fdece45417405275839378acf059f578"
        },
        {
          "alg": "SHA-1",
          "content": "83c4a90dd7a685a346a377352824b560344b3cc0"
        },
        {
          "alg": "SHA-256",
          "content": "df0aefe5137478d206847eccf9f114715e42aaea077e6a48d0e8a2152e983010"
        },
        {
          "alg": "SHA-512",
          "content": "703088cb33f2e4d190d2a996c5d94c104fdb53c519096edb58b56b426e00fc0e2cb72f2f251af4917fc39386b967701d45708c4ea725400237e2967bb6db8ded"
        }
      ],
      "licenses": [
        {
          "expression": "BSD-2-Clause"
        }
      ],
      "name": "xlsxwriter",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://files.pythonhosted.org/packages/ef/95/30f6ee57f10232e2055a85c3e4c8db7d38ab5f1349b6cdced85cb8acd5e6/XlsxWriter-3.0.3-py3-none-any.whl"
        },
        {
          "name": "aboutcode:filename",
          "value": "XlsxWriter-3.0.3-py3-none-any.whl"
        },
        {
          "name": "aboutcode:notice_text",
          "value": "# SPDX-License-Identifier: BSD-2-Clause\n"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Python"
        }
      ],
      "purl": "pkg:pypi/xlsxwriter@3.0.3",
      "type": "library",
      "version": "3.0.3"
    },
    {
      "author": "",
      "bom-ref": "pkg:github/jfrog/xray-client-java@0.13.0",
      "copyright": "",
      "cpe": "",
      "description": "",
      "hashes": [
        {
          "alg": "MD5",
          "content": "ceb7f43092d4d9fcdbee3a297b7e57e4"
        },
        {
          "alg": "SHA-1",
          "content": "f9cee3ad4176557afa0795cf435a7d9416fca0d5"
        },
        {
          "alg": "SHA-256",
          "content": "a887cf7af4ce8d30d4f0a358936f78d87377fed68e7d84caf67c6fafbd13281a"
        },
        {
          "alg": "SHA-512",
          "content": "32a3d6d2c7d47c1fc242f15f028c2622a9c77935466963b0e731d1fbbaf9422641d76919e3582d2f58619fb91f738bdea3c36d0a0a4d67d7453ea8f8e8a08606"
        }
      ],
      "licenses": [
        {
          "expression": "Apache-2.0"
        }
      ],
      "name": "xray-client-java",
      "properties": [
        {
          "name": "aboutcode:download_url",
          "value": "https://github.com/jfrog/xray-client-java/archive/refs/tags/0.13.0.tar.gz"
        },
        {
          "name": "aboutcode:primary_language",
          "value": "Java"
        }
      ],
      "purl": "pkg:github/jfrog/xray-client-java@0.13.0",
      "type": "library",
      "version": "0.13.0"
    }
  ],
  "dependencies": [
    {
      "dependsOn": [
        "pkg:generic/ffmpeg-6.0.tar.xz?download_url=https://www.ffmpeg.org/releases/ffmpeg-6.0.tar.xz",
        "pkg:generic/fontawesome-free-5.13.0-web.zip?download_url=https://use.fontawesome.com/releases/v5.13.0/fontawesome-free-5.13.0-web.zip",
        "pkg:generic/jdk11u.tar.gz?download_url=https://download.visualstudio.microsoft.com/download/pr/df5d5fd6-decb-4eea-8c08-895c5b088439/fda8734493035d0bc7dd823bdf10302e/jdk11u.tar.gz",
        "pkg:generic/jquery-3.5.1.js?download_url=https://code.jquery.com/jquery-3.5.1.js",
        "pkg:github/ajaxorg/ace@1.4.12?version_prefix=v",
        "pkg:github/automatic1111/stable-diffusion-webui@1.0.0-pre?version_prefix=v",
        "pkg:github/bitwarden/desktop@1.25.1?version_prefix=v",
        "pkg:github/chinchang/hint.css@2.3.2?version_prefix=v",
        "pkg:github/crystal-lang/crystal@1.0.0",
        "pkg:github/curl/curl@7_88_1",
        "pkg:github/cyclonedx/cdxgen@8.1.5?version_prefix=v",
        "pkg:github/datatables/fixedheader@2.1.0",
        "pkg:github/discordjs/discord.js@12.5.3",
        "pkg:github/eclipse/jetty.project@jetty-11.0.2",
        "pkg:github/epeli/underscore.string@2.3.3",
        "pkg:github/ethereum/go-ethereum@1.10.1?version_prefix=v",
        "pkg:github/ffmpeg/ffmpeg@n4.4",
        "pkg:github/fgnass/spin.js@1.3.2",
        "pkg:github/flatpickr/flatpickr@4.5.2?version_prefix=v",
        "pkg:github/foundation/foundation-sites@6.4.1?version_prefix=v",
        "pkg:github/foundation/foundation-sites@6.7.5?version_prefix=v",
        "pkg:github/git-learning-game/oh-my-git@0.6.4",
        "pkg:github/harmony-one/harmony@3.1.3?version_prefix=v",
        "pkg:github/ipmitool/ipmitool@IPMITOOL_1_8_19",
        "pkg:github/jashkenas/underscore@1.6.0",
        "pkg:github/jfrog/xray-client-java@0.13.0",
        "pkg:github/julmot/mark.js@8.11.1",
        "pkg:github/leaverou/awesomplete@1.1.5?version_prefix=v",
        "pkg:github/medialize/uri.js@1.18.10?version_prefix=v",
        "pkg:github/microsoft/unilm@s2s-ft.v0.3",
        "pkg:github/modelscope/modelscope@1.4.1?version_prefix=v",
        "pkg:github/naver/billboard.js@3.0.1",
        "pkg:github/openai/openai-python@0.27.2?version_prefix=v",
        "pkg:github/openannotation/annotator@1.2.10?download_url=https://github.com/openannotation/annotator/releases/download/v1.2.10/annotator-full.1.2.10.zip&version_prefix=v",
        "pkg:github/rapptz/discord.py@1.7.0?version_prefix=v",
        "pkg:github/requirejs/requirejs@2.1.15",
        "pkg:github/screwdriver-cd/screwdriver@4.1.0?version_prefix=v",
        "pkg:github/sporritt/jsplumb@1.7.2",
        "pkg:github/swagger-api/swagger-codegen@3.0.25?version_prefix=v",
        "pkg:github/swagger-api/swagger-core@2.1.7?version_prefix=v",
        "pkg:github/swagger-api/swagger-editor@3.15.11?version_prefix=v",
        "pkg:github/twbs/bootstrap@e5643aaa89eb67327a5b4abe7db976f0ea276b70",
        "pkg:github/wasmerio/wasmer@1.0.2",
        "pkg:github/webassembly/wabt@1.0.23",
        "pkg:github/zapier/django-rest-hooks@1.6.0?version_prefix=v",
        "pkg:github/zloirock/core-js@3.28.0?version_prefix=v",
        "pkg:maven/com.clickhouse/clickhouse-jdbc@0.3.2-patch8?classifier=grpc&type=jar",
        "pkg:maven/log4j/log4j@1.2.17",
        "pkg:maven/tomcat/bootstrap@5.5.23?classifier=sources",
        "pkg:pypi/aboutcode-toolkit@7.2.0",
        "pkg:pypi/amqp@2.6.1",
        "pkg:pypi/billiard@3.6.3.0",
        "pkg:pypi/boolean.py@3.8",
        "pkg:pypi/celery@4.3.0",
        "pkg:pypi/certifi@2022.12.7",
        "pkg:pypi/certifi@2022.5.18.1",
        "pkg:pypi/cffi@1.15.0",
        "pkg:pypi/click@8.1.3",
        "pkg:pypi/defusedxml@0.7.1",
        "pkg:pypi/django-auth-ldap@4.1.0",
        "pkg:pypi/django-crispy-forms@1.13.0",
        "pkg:pypi/django-environ@0.4.5",
        "pkg:pypi/django-grappelli@3.0.3",
        "pkg:pypi/django-guardian@2.4.0",
        "pkg:pypi/django-notifications-hq@1.7.0",
        "pkg:pypi/django-registration@3.3",
        "pkg:pypi/django@4.0.8",
        "pkg:pypi/djangorestframework@3.13.1",
        "pkg:pypi/isort@5.10.1",
        "pkg:pypi/itypes@1.2.0",
        "pkg:pypi/kombu@4.6.7",
        "pkg:pypi/license-expression@21.6.14",
        "pkg:pypi/markdown@3.3.7",
        "pkg:pypi/mod-wsgi@4.9.0",
        "pkg:pypi/mod-wsgi@4.9.4",
        "pkg:pypi/model-bakery@1.5.0",
        "pkg:pypi/natsort@8.1.0",
        "pkg:pypi/oauthlib@3.2.0",
        "pkg:pypi/packageurl-python@0.10.4",
        "pkg:pypi/pip@22.1.2",
        "pkg:pypi/psycopg2@2.9.3",
        "pkg:pypi/pyaml@21.10.1",
        "pkg:pypi/pycodestyle@2.9.0",
        "pkg:pypi/pycparser@2.20",
        "pkg:pypi/pyjwt@2.4.0",
        "pkg:pypi/python-dateutil@2.8.2",
        "pkg:pypi/python-ldap@3.2.0",
        "pkg:pypi/python3-openid@3.2.0",
        "pkg:pypi/pytz@2022.1",
        "pkg:pypi/pyyaml@6.0",
        "pkg:pypi/redis@4.3.2",
        "pkg:pypi/requests-oauthlib@1.3.1",
        "pkg:pypi/saneyaml@0.5.2",
        "pkg:pypi/selenium@3.141.0",
        "pkg:pypi/setuptools@62.3.2",
        "pkg:pypi/six@1.16.0",
        "pkg:pypi/sqlparse@0.4.2",
        "pkg:pypi/tblib@1.7.0",
        "pkg:pypi/tomli@2.0.1",
        "pkg:pypi/uritemplate@4.1.1",
        "pkg:pypi/urllib3@1.25.10",
        "pkg:pypi/wheel@0.37.1",
        "pkg:pypi/xlsxwriter@3.0.3"
      ],
      "ref": "34082e55-7e02-4194-8fdb-5c27440e4e02"
    },
    {
      "ref": "pkg:generic/ffmpeg-6.0.tar.xz?download_url=https://www.ffmpeg.org/releases/ffmpeg-6.0.tar.xz"
    },
    {
      "ref": "pkg:generic/fontawesome-free-5.13.0-web.zip?download_url=https://use.fontawesome.com/releases/v5.13.0/fontawesome-free-5.13.0-web.zip"
    },
    {
      "ref": "pkg:generic/jdk11u.tar.gz?download_url=https://download.visualstudio.microsoft.com/download/pr/df5d5fd6-decb-4eea-8c08-895c5b088439/fda8734493035d0bc7dd823bdf10302e/jdk11u.tar.gz"
    },
    {
      "ref": "pkg:generic/jquery-3.5.1.js?download_url=https://code.jquery.com/jquery-3.5.1.js"
    },
    {
      "ref": "pkg:github/ajaxorg/ace@1.4.12?version_prefix=v"
    },
    {
      "ref": "pkg:github/automatic1111/stable-diffusion-webui@1.0.0-pre?version_prefix=v"
    },
    {
      "ref": "pkg:github/bitwarden/desktop@1.25.1?version_prefix=v"
    },
    {
      "ref": "pkg:github/chinchang/hint.css@2.3.2?version_prefix=v"
    },
    {
      "ref": "pkg:github/crystal-lang/crystal@1.0.0"
    },
    {
      "ref": "pkg:github/curl/curl@7_88_1"
    },
    {
      "ref": "pkg:github/cyclonedx/cdxgen@8.1.5?version_prefix=v"
    },
    {
      "ref": "pkg:github/datatables/fixedheader@2.1.0"
    },
    {
      "ref": "pkg:github/discordjs/discord.js@12.5.3"
    },
    {
      "ref": "pkg:github/eclipse/jetty.project@jetty-11.0.2"
    },
    {
      "ref": "pkg:github/epeli/underscore.string@2.3.3"
    },
    {
      "ref": "pkg:github/ethereum/go-ethereum@1.10.1?version_prefix=v"
    },
    {
      "ref": "pkg:github/ffmpeg/ffmpeg@n4.4"
    },
    {
      "ref": "pkg:github/fgnass/spin.js@1.3.2"
    },
    {
      "ref": "pkg:github/flatpickr/flatpickr@4.5.2?version_prefix=v"
    },
    {
      "ref": "pkg:github/foundation/foundation-sites@6.4.1?version_prefix=v"
    },
    {
      "ref": "pkg:github/foundation/foundation-sites@6.7.5?version_prefix=v"
    },
    {
      "ref": "pkg:github/git-learning-game/oh-my-git@0.6.4"
    },
    {
      "ref": "pkg:github/harmony-one/harmony@3.1.3?version_prefix=v"
    },
    {
      "ref": "pkg:github/ipmitool/ipmitool@IPMITOOL_1_8_19"
    },
    {
      "ref": "pkg:github/jashkenas/underscore@1.6.0"
    },
    {
      "ref": "pkg:github/jfrog/xray-client-java@0.13.0"
    },
    {
      "ref": "pkg:github/julmot/mark.js@8.11.1"
    },
    {
      "ref": "pkg:github/leaverou/awesomplete@1.1.5?version_prefix=v"
    },
    {
      "ref": "pkg:github/medialize/uri.js@1.18.10?version_prefix=v"
    },
    {
      "ref": "pkg:github/microsoft/unilm@s2s-ft.v0.3"
    },
    {
      "ref": "pkg:github/modelscope/modelscope@1.4.1?version_prefix=v"
    },
    {
      "ref": "pkg:github/naver/billboard.js@3.0.1"
    },
    {
      "ref": "pkg:github/openai/openai-python@0.27.2?version_prefix=v"
    },
    {
      "ref": "pkg:github/openannotation/annotator@1.2.10?download_url=https://github.com/openannotation/annotator/releases/download/v1.2.10/annotator-full.1.2.10.zip&version_prefix=v"
    },
    {
      "ref": "pkg:github/rapptz/discord.py@1.7.0?version_prefix=v"
    },
    {
      "ref": "pkg:github/requirejs/requirejs@2.1.15"
    },
    {
      "ref": "pkg:github/screwdriver-cd/screwdriver@4.1.0?version_prefix=v"
    },
    {
      "ref": "pkg:github/sporritt/jsplumb@1.7.2"
    },
    {
      "ref": "pkg:github/swagger-api/swagger-codegen@3.0.25?version_prefix=v"
    },
    {
      "ref": "pkg:github/swagger-api/swagger-core@2.1.7?version_prefix=v"
    },
    {
      "ref": "pkg:github/swagger-api/swagger-editor@3.15.11?version_prefix=v"
    },
    {
      "ref": "pkg:github/twbs/bootstrap@e5643aaa89eb67327a5b4abe7db976f0ea276b70"
    },
    {
      "ref": "pkg:github/wasmerio/wasmer@1.0.2"
    },
    {
      "ref": "pkg:github/webassembly/wabt@1.0.23"
    },
    {
      "ref": "pkg:github/zapier/django-rest-hooks@1.6.0?version_prefix=v"
    },
    {
      "ref": "pkg:github/zloirock/core-js@3.28.0?version_prefix=v"
    },
    {
      "ref": "pkg:maven/com.clickhouse/clickhouse-jdbc@0.3.2-patch8?classifier=grpc&type=jar"
    },
    {
      "ref": "pkg:maven/log4j/log4j@1.2.17"
    },
    {
      "ref": "pkg:maven/tomcat/bootstrap@5.5.23?classifier=sources"
    },
    {
      "ref": "pkg:pypi/aboutcode-toolkit@7.2.0"
    },
    {
      "ref": "pkg:pypi/amqp@2.6.1"
    },
    {
      "ref": "pkg:pypi/billiard@3.6.3.0"
    },
    {
      "ref": "pkg:pypi/boolean.py@3.8"
    },
    {
      "ref": "pkg:pypi/celery@4.3.0"
    },
    {
      "ref": "pkg:pypi/certifi@2022.12.7"
    },
    {
      "ref": "pkg:pypi/certifi@2022.5.18.1"
    },
    {
      "ref": "pkg:pypi/cffi@1.15.0"
    },
    {
      "ref": "pkg:pypi/click@8.1.3"
    },
    {
      "ref": "pkg:pypi/defusedxml@0.7.1"
    },
    {
      "ref": "pkg:pypi/django-auth-ldap@4.1.0"
    },
    {
      "ref": "pkg:pypi/django-crispy-forms@1.13.0"
    },
    {
      "ref": "pkg:pypi/django-environ@0.4.5"
    },
    {
      "ref": "pkg:pypi/django-grappelli@3.0.3"
    },
    {
      "ref": "pkg:pypi/django-guardian@2.4.0"
    },
    {
      "ref": "pkg:pypi/django-notifications-hq@1.7.0"
    },
    {
      "ref": "pkg:pypi/django-registration@3.3"
    },
    {
      "ref": "pkg:pypi/django@4.0.8"
    },
    {
      "ref": "pkg:pypi/djangorestframework@3.13.1"
    },
    {
      "ref": "pkg:pypi/isort@5.10.1"
    },
    {
      "ref": "pkg:pypi/itypes@1.2.0"
    },
    {
      "ref": "pkg:pypi/kombu@4.6.7"
    },
    {
      "ref": "pkg:pypi/license-expression@21.6.14"
    },
    {
      "ref": "pkg:pypi/markdown@3.3.7"
    },
    {
      "ref": "pkg:pypi/mod-wsgi@4.9.0"
    },
    {
      "ref": "pkg:pypi/mod-wsgi@4.9.4"
    },
    {
      "ref": "pkg:pypi/model-bakery@1.5.0"
    },
    {
      "ref": "pkg:pypi/natsort@8.1.0"
    },
    {
      "ref": "pkg:pypi/oauthlib@3.2.0"
    },
    {
      "ref": "pkg:pypi/packageurl-python@0.10.4"
    },
    {
      "ref": "pkg:pypi/pip@22.1.2"
    },
    {
      "ref": "pkg:pypi/psycopg2@2.9.3"
    },
    {
      "ref": "pkg:pypi/pyaml@21.10.1"
    },
    {
      "ref": "pkg:pypi/pycodestyle@2.9.0"
    },
    {
      "ref": "pkg:pypi/pycparser@2.20"
    },
    {
      "ref": "pkg:pypi/pyjwt@2.4.0"
    },
    {
      "ref": "pkg:pypi/python-dateutil@2.8.2"
    },
    {
      "ref": "pkg:pypi/python-ldap@3.2.0"
    },
    {
      "ref": "pkg:pypi/python3-openid@3.2.0"
    },
    {
      "ref": "pkg:pypi/pytz@2022.1"
    },
    {
      "ref": "pkg:pypi/pyyaml@6.0"
    },
    {
      "ref": "pkg:pypi/redis@4.3.2"
    },
    {
      "ref": "pkg:pypi/requests-oauthlib@1.3.1"
    },
    {
      "ref": "pkg:pypi/saneyaml@0.5.2"
    },
    {
      "ref": "pkg:pypi/selenium@3.141.0"
    },
    {
      "ref": "pkg:pypi/setuptools@62.3.2"
    },
    {
      "ref": "pkg:pypi/six@1.16.0"
    },
    {
      "ref": "pkg:pypi/sqlparse@0.4.2"
    },
    {
      "ref": "pkg:pypi/tblib@1.7.0"
    },
    {
      "ref": "pkg:pypi/tomli@2.0.1"
    },
    {
      "ref": "pkg:pypi/uritemplate@4.1.1"
    },
    {
      "ref": "pkg:pypi/urllib3@1.25.10"
    },
    {
      "ref": "pkg:pypi/wheel@0.37.1"
    },
    {
      "ref": "pkg:pypi/xlsxwriter@3.0.3"
    }
  ],
  "vulnerabilities": [
    {
      "affects": [
        {
          "ref": "pkg:pypi/certifi@2022.12.7"
        },
        {
          "ref": "pkg:pypi/certifi@2022.5.18.1"
        }
      ],
      "bom-ref": "BomRef.9403227819617599.06913965360021535",
      "description": "Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi prior to version 2023.07.22 recognizes \"e-Tugra\" root certificates. e-Tugra's root certificates were subject to an investigation prompted by reporting of security issues in their systems. Certifi 2023.07.22 removes root certificates from \"e-Tugra\" from the root store.",
      "id": "VCID-12z1-d2ag-aaag",
      "ratings": [
        {
          "severity": "high",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EX6NG7WUFNUKGFHLM35KHHU3GAKXRTG"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/C-HrP1SEq1A"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/certifi/python-certifi/commit/8fb96ed81f71e7097ed11bc4d9b19afd7ea5c909"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/advisories/GHSA-xqr8-7jwr-rhp7"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/certifi/PYSEC-2023-135.yaml"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/certifi/python-certifi/security/advisories/GHSA-xqr8-7jwr-rhp7"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://github.com/certifi/python-certifi"
          },
          "vector": ""
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37920"
          },
          "vector": "0.51860"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37920"
          },
          "vector": "0.52142"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37920"
          },
          "vector": "0.52210"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37920"
          },
          "vector": "0.52230"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37920"
          },
          "vector": "0.52290"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37920"
          },
          "vector": "0.52291"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37920"
          },
          "vector": "0.52298"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37920"
          },
          "vector": "0.52308"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37920"
          },
          "vector": "0.52334"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37920"
          },
          "vector": "0.52483"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37920"
          },
          "vector": "0.52508"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37920"
          },
          "vector": "0.52564"
        },
        {
          "score": 7.4,
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/certifi/PYSEC-2023-135.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/certifi/python-certifi/security/advisories/GHSA-xqr8-7jwr-rhp7"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/certifi/python-certifi"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/certifi/python-certifi/commit/8fb96ed81f71e7097ed11bc4d9b19afd7ea5c909"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/C-HrP1SEq1A"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EX6NG7WUFNUKGFHLM35KHHU3GAKXRTG"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 9.1,
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37920.json"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        }
      ],
      "references": [
        {
          "id": "",
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37920.json"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37920"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37920"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/certifi/python-certifi"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/certifi/python-certifi/commit/8fb96ed81f71e7097ed11bc4d9b19afd7ea5c909"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/certifi/python-certifi/security/advisories/GHSA-xqr8-7jwr-rhp7"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/certifi/PYSEC-2023-135.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/C-HrP1SEq1A"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EX6NG7WUFNUKGFHLM35KHHU3GAKXRTG"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EX6NG7WUFNUKGFHLM35KHHU3GAKXRTG/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20240912-0002/"
          }
        },
        {
          "id": "2226586",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226586"
          }
        },
        {
          "id": "CVE-2023-37920",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920"
          }
        },
        {
          "id": "GHSA-xqr8-7jwr-rhp7",
          "source": {
            "url": "https://github.com/advisories/GHSA-xqr8-7jwr-rhp7"
          }
        },
        {
          "id": "RHSA-2023:6812",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:6812"
          }
        },
        {
          "id": "RHSA-2023:7378",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:7378"
          }
        },
        {
          "id": "RHSA-2023:7385",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:7385"
          }
        },
        {
          "id": "RHSA-2023:7407",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:7407"
          }
        },
        {
          "id": "RHSA-2023:7435",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:7435"
          }
        },
        {
          "id": "RHSA-2023:7523",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:7523"
          }
        },
        {
          "id": "RHSA-2023:7528",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:7528"
          }
        },
        {
          "id": "RHSA-2023:7753",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:7753"
          }
        },
        {
          "id": "RHSA-2024:0133",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:0133"
          }
        },
        {
          "id": "RHSA-2024:8228",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:8228"
          }
        },
        {
          "id": "cpe:2.3:a:kennethreitz:certifi:*:*:*:*:*:python:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kennethreitz:certifi:*:*:*:*:*:python:*:*"
          }
        }
      ],
      "source": {
        "name": "VulnerableCode",
        "url": "http://public.vulnerablecode.io/vulnerabilities/VCID-12z1-d2ag-aaag"
      }
    },
    {
      "affects": [
        {
          "ref": "pkg:pypi/setuptools@62.3.2"
        }
      ],
      "bom-ref": "BomRef.33675536729506816.09349446325063115",
      "description": "pypa/setuptools vulnerable to Regular Expression Denial of Service (ReDoS)",
      "id": "VCID-1c3j-kk75-aaan",
      "ratings": [
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/pypa/setuptools"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://pyup.io/vulnerabilities/CVE-2022-40897/52495"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YNA2BAH2ACBZ4TVJZKFLCR7L23BG5C3H"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ADES3NLOE5QJKBLGNZNI2RGVOSQXA37R"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://setuptools.pypa.io/en/latest"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/pypa/setuptools/issues/3659"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/pypa/setuptools/blob/fe8a98e696241487ba6ac9f91faa38ade939ec5d/setuptools/package_index.py#L200"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/advisories/GHSA-r9hx-vwmv-q579"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/pypa/setuptools/commit/43a9c9bfa6aa626ec2a22540bea28d2ca77964be"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ADES3NLOE5QJKBLGNZNI2RGVOSQXA37R"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20230214-0001"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YNA2BAH2ACBZ4TVJZKFLCR7L23BG5C3H"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/setuptools/PYSEC-2022-43012.yaml"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/pypa/setuptools/compare/v65.5.0...v65.5.1"
          },
          "vector": ""
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-40897"
          },
          "vector": "0.77549"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-40897"
          },
          "vector": "0.77681"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-40897"
          },
          "vector": "0.77715"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-40897"
          },
          "vector": "0.77726"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-40897"
          },
          "vector": "0.77766"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-40897"
          },
          "vector": "0.77767"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-40897"
          },
          "vector": "0.77769"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-40897"
          },
          "vector": "0.77782"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-40897"
          },
          "vector": "0.77789"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-40897"
          },
          "vector": "0.77847"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-40897"
          },
          "vector": "0.77862"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-40897"
          },
          "vector": "0.77881"
        },
        {
          "score": 4.3,
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
        },
        {
          "score": 5.9,
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40897.json"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 5.9,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40897"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 6.5,
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20240621-0006"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ADES3NLOE5QJKBLGNZNI2RGVOSQXA37R"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/setuptools/PYSEC-2022-43012.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/pypa/setuptools/blob/fe8a98e696241487ba6ac9f91faa38ade939ec5d/setuptools/package_index.py#L200"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20230214-0001"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YNA2BAH2ACBZ4TVJZKFLCR7L23BG5C3H"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YNA2BAH2ACBZ4TVJZKFLCR7L23BG5C3H"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://pyup.io/vulnerabilities/CVE-2022-40897/52495"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/pypa/setuptools/compare/v65.5.0...v65.5.1"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ADES3NLOE5QJKBLGNZNI2RGVOSQXA37R"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/pypa/setuptools/issues/3659"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/pypa/setuptools/commit/43a9c9bfa6aa626ec2a22540bea28d2ca77964be"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://setuptools.pypa.io/en/latest"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 8.8,
          "source": {
            "url": "https://github.com/pypa/setuptools"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
        },
        {
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20240621-0006"
          },
          "vector": ""
        }
      ],
      "references": [
        {
          "id": "",
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40897.json"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-40897"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40897"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/setuptools/PYSEC-2022-43012.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/pypa/setuptools"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/pypa/setuptools/blob/fe8a98e696241487ba6ac9f91faa38ade939ec5d/setuptools/package_index.py#L200"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/pypa/setuptools/commit/43a9c9bfa6aa626ec2a22540bea28d2ca77964be"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/pypa/setuptools/compare/v65.5.0...v65.5.1"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/pypa/setuptools/issues/3659"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ADES3NLOE5QJKBLGNZNI2RGVOSQXA37R"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ADES3NLOE5QJKBLGNZNI2RGVOSQXA37R/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YNA2BAH2ACBZ4TVJZKFLCR7L23BG5C3H"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YNA2BAH2ACBZ4TVJZKFLCR7L23BG5C3H/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ADES3NLOE5QJKBLGNZNI2RGVOSQXA37R"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ADES3NLOE5QJKBLGNZNI2RGVOSQXA37R/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YNA2BAH2ACBZ4TVJZKFLCR7L23BG5C3H"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YNA2BAH2ACBZ4TVJZKFLCR7L23BG5C3H/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://pyup.io/vulnerabilities/CVE-2022-40897/52495"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://pyup.io/vulnerabilities/CVE-2022-40897/52495/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20230214-0001"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20230214-0001/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20240621-0006"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20240621-0006/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://setuptools.pypa.io/en/latest"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://setuptools.pypa.io/en/latest/"
          }
        },
        {
          "id": "2158559",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158559"
          }
        },
        {
          "id": "CVE-2022-40897",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40897"
          }
        },
        {
          "id": "GHSA-r9hx-vwmv-q579",
          "source": {
            "url": "https://github.com/advisories/GHSA-r9hx-vwmv-q579"
          }
        },
        {
          "id": "GLSA-202405-10",
          "source": {
            "url": "https://security.gentoo.org/glsa/202405-10"
          }
        },
        {
          "id": "RHSA-2023:0835",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:0835"
          }
        },
        {
          "id": "RHSA-2023:0952",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:0952"
          }
        },
        {
          "id": "RHSA-2023:6793",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:6793"
          }
        },
        {
          "id": "RHSA-2023:7395",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:7395"
          }
        },
        {
          "id": "RHSA-2024:2985",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:2985"
          }
        },
        {
          "id": "RHSA-2024:2987",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:2987"
          }
        },
        {
          "id": "RHSA-2024:4421",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:4421"
          }
        },
        {
          "id": "RHSA-2024:6915",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:6915"
          }
        },
        {
          "id": "USN-5817-1",
          "source": {
            "url": "https://usn.ubuntu.com/5817-1/"
          }
        },
        {
          "id": "cpe:2.3:a:python:setuptools:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:setuptools:*:*:*:*:*:*:*:*"
          }
        }
      ],
      "source": {
        "name": "VulnerableCode",
        "url": "http://public.vulnerablecode.io/vulnerabilities/VCID-1c3j-kk75-aaan"
      }
    },
    {
      "affects": [
        {
          "ref": "pkg:pypi/urllib3@1.25.10"
        }
      ],
      "bom-ref": "BomRef.6422861028935313.3471391837217567",
      "description": "urllib3's Proxy-Authorization request header isn't stripped during cross-origin redirects\nWhen using urllib3's proxy support with `ProxyManager`, the `Proxy-Authorization` header is only sent to the configured proxy, as expected.\n\nHowever, when sending HTTP requests *without* using urllib3's proxy support, it's possible to accidentally configure the `Proxy-Authorization` header even though it won't have any effect as the request is not using a forwarding proxy or a tunneling proxy. In those cases, urllib3 doesn't treat the `Proxy-Authorization` HTTP header as one carrying authentication material and thus doesn't strip the header on cross-origin redirects.\n\nBecause this is a highly unlikely scenario, we believe the severity of this vulnerability is low for almost all users. Out of an abundance of caution urllib3 will automatically strip the `Proxy-Authorization` header during cross-origin redirects to avoid the small chance that users are doing this on accident.\n\nUsers should use urllib3's proxy support or disable automatic redirects to achieve safe processing of the `Proxy-Authorization` header, but we still decided to strip the header by default in order to further protect users who aren't using the correct approach.\n\n## Affected usages\n\nWe believe the number of usages affected by this advisory is low. It requires all of the following to be true to be exploited:\n\n* Setting the `Proxy-Authorization` header without using urllib3's built-in proxy support.\n* Not disabling HTTP redirects.\n* Either not using an HTTPS origin server or for the proxy or target origin to redirect to a malicious origin.\n\n## Remediation\n\n* Using the `Proxy-Authorization` header with urllib3's `ProxyManager`.\n* Disabling HTTP redirects using `redirects=False` when sending requests.\n* Not using the `Proxy-Authorization` header.",
      "id": "VCID-1cgk-q3r3-aaam",
      "ratings": [
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-37891"
          },
          "vector": "0.09902"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-37891"
          },
          "vector": "0.10184"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-37891"
          },
          "vector": "0.10278"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-37891"
          },
          "vector": "0.10302"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-37891"
          },
          "vector": "0.10364"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-37891"
          },
          "vector": "0.10366"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-37891"
          },
          "vector": "0.10377"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-37891"
          },
          "vector": "0.10429"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-37891"
          },
          "vector": "0.10484"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-37891"
          },
          "vector": "0.10788"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-37891"
          },
          "vector": "0.10843"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-37891"
          },
          "vector": "0.10939"
        },
        {
          "score": 4.4,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37891"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "score": 4.4,
          "source": {
            "url": "https://github.com/urllib3/urllib3/commit/accff72ecc2f6cf5a76d9570198a93ac7c90270e"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "score": 4.4,
          "source": {
            "url": "https://github.com/urllib3/urllib3/commit/40b6d1605814dd1db0a46e202d6e56f2e4c9a468"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "score": 4.4,
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-37891.json"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "score": 4.4,
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "score": 4.4,
          "source": {
            "url": "https://github.com/urllib3/urllib3"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "score": 4.4,
          "source": {
            "url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-34jh-p97f-mpxf"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "source": {
            "url": "https://github.com/urllib3/urllib3"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-34jh-p97f-mpxf"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/advisories/GHSA-34jh-p97f-mpxf"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/urllib3/urllib3/commit/accff72ecc2f6cf5a76d9570198a93ac7c90270e"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/urllib3/urllib3/commit/40b6d1605814dd1db0a46e202d6e56f2e4c9a468"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37891"
          },
          "vector": ""
        }
      ],
      "references": [
        {
          "id": "",
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-37891.json"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-37891"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37891"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/urllib3/urllib3"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/urllib3/urllib3/commit/40b6d1605814dd1db0a46e202d6e56f2e4c9a468"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/urllib3/urllib3/commit/accff72ecc2f6cf5a76d9570198a93ac7c90270e"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-34jh-p97f-mpxf"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37891"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20240822-0003/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.vicarius.io/vsociety/posts/proxy-authorization-header-handling-vulnerability-in-urllib3-cve-2024-37891"
          }
        },
        {
          "id": "1074149",
          "source": {
            "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074149"
          }
        },
        {
          "id": "2292788",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292788"
          }
        },
        {
          "id": "GHSA-34jh-p97f-mpxf",
          "source": {
            "url": "https://github.com/advisories/GHSA-34jh-p97f-mpxf"
          }
        },
        {
          "id": "RHSA-2024:4422",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:4422"
          }
        },
        {
          "id": "RHSA-2024:4730",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:4730"
          }
        },
        {
          "id": "RHSA-2024:4744",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:4744"
          }
        },
        {
          "id": "RHSA-2024:4746",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:4746"
          }
        },
        {
          "id": "RHSA-2024:5041",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:5041"
          }
        },
        {
          "id": "RHSA-2024:5309",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:5309"
          }
        },
        {
          "id": "RHSA-2024:5526",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:5526"
          }
        },
        {
          "id": "RHSA-2024:5622",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:5622"
          }
        },
        {
          "id": "RHSA-2024:5627",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:5627"
          }
        },
        {
          "id": "RHSA-2024:5633",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:5633"
          }
        },
        {
          "id": "RHSA-2024:6162",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:6162"
          }
        },
        {
          "id": "RHSA-2024:6239",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:6239"
          }
        },
        {
          "id": "RHSA-2024:6240",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:6240"
          }
        },
        {
          "id": "RHSA-2024:6309",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:6309"
          }
        },
        {
          "id": "RHSA-2024:6310",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:6310"
          }
        },
        {
          "id": "RHSA-2024:6311",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:6311"
          }
        },
        {
          "id": "RHSA-2024:6358",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:6358"
          }
        },
        {
          "id": "RHSA-2024:7312",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:7312"
          }
        },
        {
          "id": "RHSA-2024:8035",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:8035"
          }
        },
        {
          "id": "RHSA-2024:8842",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:8842"
          }
        },
        {
          "id": "RHSA-2024:8843",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:8843"
          }
        },
        {
          "id": "RHSA-2024:8906",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:8906"
          }
        },
        {
          "id": "RHSA-2024:9457",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:9457"
          }
        },
        {
          "id": "RHSA-2024:9458",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:9458"
          }
        },
        {
          "id": "RHSA-2024:9922",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:9922"
          }
        },
        {
          "id": "RHSA-2024:9923",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:9923"
          }
        },
        {
          "id": "RHSA-2024:9985",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:9985"
          }
        },
        {
          "id": "USN-7084-1",
          "source": {
            "url": "https://usn.ubuntu.com/7084-1/"
          }
        },
        {
          "id": "USN-7084-2",
          "source": {
            "url": "https://usn.ubuntu.com/7084-2/"
          }
        }
      ],
      "source": {
        "name": "VulnerableCode",
        "url": "http://public.vulnerablecode.io/vulnerabilities/VCID-1cgk-q3r3-aaam"
      }
    },
    {
      "affects": [
        {
          "ref": "pkg:pypi/certifi@2022.12.7"
        },
        {
          "ref": "pkg:pypi/certifi@2022.5.18.1"
        }
      ],
      "bom-ref": "BomRef.5455996434925802.6838173335710966",
      "description": "Certifi removes GLOBALTRUST root certificate\nCertifi 2024.07.04 removes root certificates from \"GLOBALTRUST\" from the root store. These are in the process of being removed from Mozilla's trust store.\n\nGLOBALTRUST's root certificates are being removed pursuant to an investigation which identified \"long-running and unresolved compliance issues\". Conclusions of Mozilla's investigation can be found [here]( https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/XpknYMPO8dI).",
      "id": "VCID-29te-f3et-aaac",
      "ratings": [
        {
          "severity": "low",
          "source": {
            "url": "https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/XpknYMPO8dI"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://github.com/certifi/python-certifi/commit/bd8153872e9c6fc98f4023df9c2deaffea2fa463"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39689"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://github.com/certifi/python-certifi"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://github.com/certifi/python-certifi/security/advisories/GHSA-248v-346w-9cwc"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20241206-0001"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://github.com/advisories/GHSA-248v-346w-9cwc"
          },
          "vector": ""
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-39689"
          },
          "vector": "0.16709"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-39689"
          },
          "vector": "0.16991"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-39689"
          },
          "vector": "0.17084"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-39689"
          },
          "vector": "0.17113"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-39689"
          },
          "vector": "0.17188"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-39689"
          },
          "vector": "0.17192"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-39689"
          },
          "vector": "0.17210"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-39689"
          },
          "vector": "0.17272"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-39689"
          },
          "vector": "0.17374"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-39689"
          },
          "vector": "0.17691"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-39689"
          },
          "vector": "0.17777"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-39689"
          },
          "vector": "0.17876"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-39689.json"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/XpknYMPO8dI"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/certifi/python-certifi/commit/bd8153872e9c6fc98f4023df9c2deaffea2fa463"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39689"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/certifi/python-certifi"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/certifi/python-certifi/security/advisories/GHSA-248v-346w-9cwc"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
        }
      ],
      "references": [
        {
          "id": "",
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-39689.json"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-39689"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39689"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/certifi/python-certifi"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/certifi/python-certifi/commit/bd8153872e9c6fc98f4023df9c2deaffea2fa463"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/certifi/python-certifi/security/advisories/GHSA-248v-346w-9cwc"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/XpknYMPO8dI"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39689"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20241206-0001"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20241206-0001/"
          }
        },
        {
          "id": "2296020",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2296020"
          }
        },
        {
          "id": "GHSA-248v-346w-9cwc",
          "source": {
            "url": "https://github.com/advisories/GHSA-248v-346w-9cwc"
          }
        }
      ],
      "source": {
        "name": "VulnerableCode",
        "url": "http://public.vulnerablecode.io/vulnerabilities/VCID-29te-f3et-aaac"
      }
    },
    {
      "affects": [
        {
          "ref": "pkg:pypi/sqlparse@0.4.2"
        }
      ],
      "bom-ref": "BomRef.03222119037409821.8628627685576429",
      "description": "sqlparse parsing heavily nested list leads to Denial of Service",
      "id": "VCID-2ztt-8wfe-aaam",
      "ratings": [
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/advisories/GHSA-2m57-hf25-phgg"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/andialbrecht/sqlparse/security/advisories/GHSA-2m57-hf25-phgg"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/andialbrecht/sqlparse/commit/b4a39d9850969b4e1d6940d32094ee0b42a2cf03"
          },
          "vector": ""
        },
        {
          "score": 5.5,
          "source": {
            "url": "https://github.com/andialbrecht/sqlparse"
          },
          "vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/advisories/GHSA-2m57-hf25-phgg"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/andialbrecht/sqlparse/commit/b4a39d9850969b4e1d6940d32094ee0b42a2cf03"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "source": {
            "url": "https://github.com/andialbrecht/sqlparse"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/advisories/GHSA-2m57-hf25-phgg"
          },
          "vector": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-30T16:07:16Z/"
        }
      ],
      "references": [
        {
          "id": "",
          "source": {
            "url": "https://github.com/andialbrecht/sqlparse"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/andialbrecht/sqlparse/commit/b4a39d9850969b4e1d6940d32094ee0b42a2cf03"
          }
        },
        {
          "id": "GHSA-2m57-hf25-phgg",
          "source": {
            "url": "https://github.com/advisories/GHSA-2m57-hf25-phgg"
          }
        },
        {
          "id": "GHSA-2m57-hf25-phgg",
          "source": {
            "url": "https://github.com/andialbrecht/sqlparse/security/advisories/GHSA-2m57-hf25-phgg"
          }
        }
      ],
      "source": {
        "name": "VulnerableCode",
        "url": "http://public.vulnerablecode.io/vulnerabilities/VCID-2ztt-8wfe-aaam"
      }
    },
    {
      "affects": [
        {
          "ref": "pkg:pypi/django@4.0.8"
        }
      ],
      "bom-ref": "BomRef.7980306586836933.9330073280676943",
      "description": "Django bypasses validation when using one form field to upload multiple files",
      "id": "VCID-589h-ndhj-aaab",
      "ratings": [
        {
          "severity": "critical",
          "source": {
            "url": "https://github.com/django/django/commit/eed53d0011622e70b936e203005f0e6f4ac48965"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DNEHD6N435OE2XUFGDAAVAXSYWLCUBFD"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://www.djangoproject.com/weblog/2023/may/03/security-releases"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2023-61.yaml"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20230609-0008"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://github.com/django/django/commit/21b1b1fc03e5f9e9f8c977ee6e35618dd3b353dd"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://github.com/django/django/commit/e7c3a2ccc3a562328600be05068ed9149e12ce64"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://github.com/advisories/GHSA-r3xc-prgr-mg9p"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A45VKTUVQ2BN6D5ZLZGCM774R6QGFOHW"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://docs.djangoproject.com/en/4.2/releases/security"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://groups.google.com/forum/#!forum/django-announce"
          },
          "vector": ""
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-31047"
          },
          "vector": "0.72458"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-31047"
          },
          "vector": "0.72616"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-31047"
          },
          "vector": "0.72654"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-31047"
          },
          "vector": "0.72666"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-31047"
          },
          "vector": "0.72708"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-31047"
          },
          "vector": "0.72710"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-31047"
          },
          "vector": "0.72711"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-31047"
          },
          "vector": "0.73707"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-31047"
          },
          "vector": "0.73710"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-31047"
          },
          "vector": "0.73773"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-31047"
          },
          "vector": "0.75661"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-31047"
          },
          "vector": "0.75685"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://groups.google.com/forum/#%21forum/django-announce"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://github.com/django/django"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 5.4,
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:6818"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"
        },
        {
          "score": 5.6,
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
        },
        {
          "score": 6.5,
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-31047.json"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://groups.google.com/forum/#!forum/django-announce"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://docs.djangoproject.com/en/4.2/releases/security"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://www.djangoproject.com/weblog/2023/may/03/security-releases"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://github.com/django/django/commit/e7c3a2ccc3a562328600be05068ed9149e12ce64"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20230609-0008"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://github.com/django/django/commit/eed53d0011622e70b936e203005f0e6f4ac48965"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DNEHD6N435OE2XUFGDAAVAXSYWLCUBFD"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2023-61.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-31047"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://github.com/django/django/commit/21b1b1fc03e5f9e9f8c977ee6e35618dd3b353dd"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A45VKTUVQ2BN6D5ZLZGCM774R6QGFOHW"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "source": {
            "url": "https://github.com/django/django"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://groups.google.com/forum/#%21forum/django-announce"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:6818"
          },
          "vector": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-11T19:42:07Z/"
        }
      ],
      "references": [
        {
          "id": "",
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-31047.json"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-31047"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31047"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://docs.djangoproject.com/en/4.2/releases/security"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://docs.djangoproject.com/en/4.2/releases/security/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/django/django"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/django/django/commit/21b1b1fc03e5f9e9f8c977ee6e35618dd3b353dd"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/django/django/commit/e7c3a2ccc3a562328600be05068ed9149e12ce64"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/django/django/commit/eed53d0011622e70b936e203005f0e6f4ac48965"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2023-61.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://groups.google.com/forum/#!forum/django-announce"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://groups.google.com/forum/#%21forum/django-announce"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A45VKTUVQ2BN6D5ZLZGCM774R6QGFOHW/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DNEHD6N435OE2XUFGDAAVAXSYWLCUBFD/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A45VKTUVQ2BN6D5ZLZGCM774R6QGFOHW"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A45VKTUVQ2BN6D5ZLZGCM774R6QGFOHW/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DNEHD6N435OE2XUFGDAAVAXSYWLCUBFD"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DNEHD6N435OE2XUFGDAAVAXSYWLCUBFD/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20230609-0008"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20230609-0008/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.djangoproject.com/weblog/2023/may/03/security-releases"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.djangoproject.com/weblog/2023/may/03/security-releases/"
          }
        },
        {
          "id": "1035467",
          "source": {
            "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035467"
          }
        },
        {
          "id": "2192565",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2192565"
          }
        },
        {
          "id": "CVE-2023-31047",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-31047"
          }
        },
        {
          "id": "GHSA-r3xc-prgr-mg9p",
          "source": {
            "url": "https://github.com/advisories/GHSA-r3xc-prgr-mg9p"
          }
        },
        {
          "id": "RHSA-2023:4591",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:4591"
          }
        },
        {
          "id": "RHSA-2023:5931",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:5931"
          }
        },
        {
          "id": "RHSA-2023:6818",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:6818"
          }
        },
        {
          "id": "USN-6054-1",
          "source": {
            "url": "https://usn.ubuntu.com/6054-1/"
          }
        },
        {
          "id": "USN-6054-2",
          "source": {
            "url": "https://usn.ubuntu.com/6054-2/"
          }
        },
        {
          "id": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:djangoproject:django:4.2:-:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:4.2:-:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:djangoproject:django:4.2:b1:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:4.2:b1:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:djangoproject:django:4.2:rc1:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:4.2:rc1:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*"
          }
        }
      ],
      "source": {
        "name": "VulnerableCode",
        "url": "http://public.vulnerablecode.io/vulnerabilities/VCID-589h-ndhj-aaab"
      }
    },
    {
      "affects": [
        {
          "ref": "pkg:pypi/urllib3@1.25.10"
        }
      ],
      "bom-ref": "BomRef.6728134293281378.789965692338942",
      "description": "Uncontrolled Resource Consumption\nAn issue was discovered in urllib3, when provided with a URL containing many `@` characters in the authority component, the authority regular expression exhibits catastrophic backtracking, causing a denial of service if a URL were passed as a parameter or redirected to via an HTTP redirect.",
      "id": "VCID-6rq6-hxp1-aaae",
      "ratings": [
        {
          "severity": "high",
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpuoct2021.html"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33503"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/advisories/GHSA-q2q7-5pp4-w6pg"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/urllib3/urllib3"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-q2q7-5pp4-w6pg"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6SCV7ZNAHS3E6PBFLJGENCDRDRWRZZ6W"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMUGWEAUYGGHTPPXT6YBD53WYXQGVV73"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/urllib3/urllib3/commit/2d4a3fee6de2fa45eb82169361918f759269b4ec"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/urllib3/urllib3/commit/5b047b645f5f93900d5e2fc31230848c25eb1f5f#diff-52026d639119bf1e0364836b4e8a18bd9ed3c95c6ba39b26534a5057a65e35bbR65"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/urllib3/PYSEC-2021-108.yaml"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://security.gentoo.org/glsa/202107-36"
          },
          "vector": ""
        },
        {
          "severity": "medium",
          "source": {
            "url": "https://security.archlinux.org/AVG-2038"
          },
          "vector": ""
        },
        {
          "severity": "medium",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1968074"
          }
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33503"
          },
          "vector": "0.69635"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33503"
          },
          "vector": "0.69753"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33503"
          },
          "vector": "0.69794"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33503"
          },
          "vector": "0.69808"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33503"
          },
          "vector": "0.69852"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33503"
          },
          "vector": "0.69853"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33503"
          },
          "vector": "0.69859"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33503"
          },
          "vector": "0.69865"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33503"
          },
          "vector": "0.69871"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33503"
          },
          "vector": "0.69931"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33503"
          },
          "vector": "0.69948"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33503"
          },
          "vector": "0.69980"
        },
        {
          "score": 4.4,
          "source": {
            "url": "https://github.com/urllib3/urllib3"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "score": 5.0,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33503"
          },
          "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33503"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-q2q7-5pp4-w6pg"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33503.json"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/urllib3/PYSEC-2021-108.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/urllib3/urllib3/commit/5b047b645f5f93900d5e2fc31230848c25eb1f5f#diff-52026d639119bf1e0364836b4e8a18bd9ed3c95c6ba39b26534a5057a65e35bbR65"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/urllib3/urllib3"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpuoct2021.html"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://security.gentoo.org/glsa/202107-36"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMUGWEAUYGGHTPPXT6YBD53WYXQGVV73"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/urllib3/urllib3/commit/2d4a3fee6de2fa45eb82169361918f759269b4ec"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6SCV7ZNAHS3E6PBFLJGENCDRDRWRZZ6W"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 8.2,
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpuoct2021.html"
          },
          "vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"
        },
        {
          "source": {
            "url": "https://github.com/urllib3/urllib3"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2021:4160"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2021:3254"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2021:4162"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2021:4702"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2021:3473"
          }
        }
      ],
      "references": [
        {
          "id": "",
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33503.json"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33503"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33503"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/urllib3/PYSEC-2021-108.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/urllib3/urllib3"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/urllib3/urllib3/commit/2d4a3fee6de2fa45eb82169361918f759269b4ec"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/urllib3/urllib3/commit/5b047b645f5f93900d5e2fc31230848c25eb1f5f#diff-52026d639119bf1e0364836b4e8a18bd9ed3c95c6ba39b26534a5057a65e35bbR65"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6SCV7ZNAHS3E6PBFLJGENCDRDRWRZZ6W/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FMUGWEAUYGGHTPPXT6YBD53WYXQGVV73/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6SCV7ZNAHS3E6PBFLJGENCDRDRWRZZ6W"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6SCV7ZNAHS3E6PBFLJGENCDRDRWRZZ6W/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMUGWEAUYGGHTPPXT6YBD53WYXQGVV73"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMUGWEAUYGGHTPPXT6YBD53WYXQGVV73/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://security.gentoo.org/glsa/202107-36"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpuoct2021.html"
          }
        },
        {
          "id": "1968074",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1968074"
          }
        },
        {
          "id": "989848",
          "source": {
            "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989848"
          }
        },
        {
          "id": "ASA-202106-25",
          "source": {
            "url": "https://security.archlinux.org/ASA-202106-25"
          }
        },
        {
          "id": "AVG-2038",
          "source": {
            "url": "https://security.archlinux.org/AVG-2038"
          }
        },
        {
          "id": "CVE-2021-33503",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33503"
          }
        },
        {
          "id": "GHSA-q2q7-5pp4-w6pg",
          "source": {
            "url": "https://github.com/advisories/GHSA-q2q7-5pp4-w6pg"
          }
        },
        {
          "id": "GHSA-q2q7-5pp4-w6pg",
          "source": {
            "url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-q2q7-5pp4-w6pg"
          }
        },
        {
          "id": "RHSA-2021:3254",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2021:3254"
          }
        },
        {
          "id": "RHSA-2021:3473",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2021:3473"
          }
        },
        {
          "id": "RHSA-2021:4160",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2021:4160"
          }
        },
        {
          "id": "RHSA-2021:4162",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2021:4162"
          }
        },
        {
          "id": "RHSA-2021:4702",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2021:4702"
          }
        },
        {
          "id": "USN-5812-1",
          "source": {
            "url": "https://usn.ubuntu.com/5812-1/"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*"
          }
        }
      ],
      "source": {
        "name": "VulnerableCode",
        "url": "http://public.vulnerablecode.io/vulnerabilities/VCID-6rq6-hxp1-aaae"
      }
    },
    {
      "affects": [
        {
          "ref": "pkg:pypi/django@4.0.8"
        }
      ],
      "bom-ref": "BomRef.8688480859185022.7348616411837261",
      "description": "",
      "id": "VCID-c4jh-zr55-aaae",
      "ratings": [
        {
          "severity": "high",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20230302-0007"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2023-12.yaml"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://docs.djangoproject.com/en/4.1/releases/security"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://groups.google.com/forum/#!forum/django-announce"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/advisories/GHSA-q2jf-h9jm-m7p4"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://www.djangoproject.com/weblog/2023/feb/01/security-releases"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/django/django/commit/c7e0151fdf33e1b11d488b6f67b94fdf3a30614a"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00000.html"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/django/django/commit/9d7bd5a56b1ce0576e8e07a8001373576d277942"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/django/django/commit/4452642f193533e288a52c02efb5bbc766a68f95"
          },
          "vector": ""
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-23969"
          },
          "vector": "0.86930"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-23969"
          },
          "vector": "0.87002"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-23969"
          },
          "vector": "0.87023"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-23969"
          },
          "vector": "0.87031"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-23969"
          },
          "vector": "0.87046"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-23969"
          },
          "vector": "0.87052"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-23969"
          },
          "vector": "0.87053"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-23969"
          },
          "vector": "0.87054"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-23969"
          },
          "vector": "0.87062"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-23969"
          },
          "vector": "0.87065"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-23969"
          },
          "vector": "0.87067"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-23969"
          },
          "vector": "0.87085"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://groups.google.com/forum/#%21forum/django-announce"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://github.com/django/django"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00000.html"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2023-12.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/django/django/commit/c7e0151fdf33e1b11d488b6f67b94fdf3a30614a"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23969"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://groups.google.com/forum/#!forum/django-announce"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/django/django/commit/4452642f193533e288a52c02efb5bbc766a68f95"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://www.djangoproject.com/weblog/2023/feb/01/security-releases"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23969.json"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20230302-0007"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/django/django/commit/9d7bd5a56b1ce0576e8e07a8001373576d277942"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://docs.djangoproject.com/en/4.1/releases/security"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "source": {
            "url": "https://github.com/django/django"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://groups.google.com/forum/#%21forum/django-announce"
          },
          "vector": ""
        }
      ],
      "references": [
        {
          "id": "",
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23969.json"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-23969"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23969"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://docs.djangoproject.com/en/4.1/releases/security"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://docs.djangoproject.com/en/4.1/releases/security/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/django/django"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/django/django/commit/4452642f193533e288a52c02efb5bbc766a68f95"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/django/django/commit/9d7bd5a56b1ce0576e8e07a8001373576d277942"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/django/django/commit/c7e0151fdf33e1b11d488b6f67b94fdf3a30614a"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2023-12.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://groups.google.com/forum/#!forum/django-announce"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://groups.google.com/forum/#%21forum/django-announce"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00000.html"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20230302-0007"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20230302-0007/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.djangoproject.com/weblog/2023/feb/01/security-releases"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.djangoproject.com/weblog/2023/feb/01/security-releases/"
          }
        },
        {
          "id": "1030251",
          "source": {
            "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1030251"
          }
        },
        {
          "id": "2166457",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166457"
          }
        },
        {
          "id": "CVE-2023-23969",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23969"
          }
        },
        {
          "id": "GHSA-q2jf-h9jm-m7p4",
          "source": {
            "url": "https://github.com/advisories/GHSA-q2jf-h9jm-m7p4"
          }
        },
        {
          "id": "RHSA-2023:2097",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:2097"
          }
        },
        {
          "id": "RHSA-2023:2101",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:2101"
          }
        },
        {
          "id": "USN-5837-1",
          "source": {
            "url": "https://usn.ubuntu.com/5837-1/"
          }
        },
        {
          "id": "USN-5837-2",
          "source": {
            "url": "https://usn.ubuntu.com/5837-2/"
          }
        },
        {
          "id": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
          }
        }
      ],
      "source": {
        "name": "VulnerableCode",
        "url": "http://public.vulnerablecode.io/vulnerabilities/VCID-c4jh-zr55-aaae"
      }
    },
    {
      "affects": [
        {
          "ref": "pkg:pypi/urllib3@1.25.10"
        }
      ],
      "bom-ref": "BomRef.060235985286099525.9150269758024251",
      "description": "`Cookie` HTTP header isn't stripped on cross-origin redirects",
      "id": "VCID-c4sy-7zv4-aaas",
      "ratings": [
        {
          "severity": "high",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/urllib3/PYSEC-2023-192.yaml"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/urllib3/urllib3/commit/644124ecd0b6e417c527191f866daa05a5a2056d"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3PR7C6RJ6JUBQKIJ644DMIJSUP36VDY"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://www.vicarius.io/vsociety/posts/cve-2023-43804-urllib3-vulnerability-3"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/advisories/GHSA-v845-jxx5-vc9f"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/urllib3/urllib3"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20241213-0007"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAGZXYJ7H2G3SB47M453VQVNAWKAEJJ"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f"
          },
          "vector": ""
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-43804"
          },
          "vector": "0.46024"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-43804"
          },
          "vector": "0.46287"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-43804"
          },
          "vector": "0.46373"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-43804"
          },
          "vector": "0.46391"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-43804"
          },
          "vector": "0.46468"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-43804"
          },
          "vector": "0.46473"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-43804"
          },
          "vector": "0.46475"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-43804"
          },
          "vector": "0.46493"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-43804"
          },
          "vector": "0.46509"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-43804"
          },
          "vector": "0.46660"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-43804"
          },
          "vector": "0.46681"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-43804"
          },
          "vector": "0.46760"
        },
        {
          "score": 4.2,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5"
          },
          "vector": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "score": 4.4,
          "source": {
            "url": "https://github.com/urllib3/urllib3"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "score": 5.0,
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:0733"
          },
          "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
        },
        {
          "score": 5.9,
          "source": {
            "url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N"
        },
        {
          "score": 5.9,
          "source": {
            "url": "https://www.vicarius.io/vsociety/posts/cve-2023-43804-urllib3-vulnerability-3"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N"
        },
        {
          "score": 5.9,
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43804.json"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N"
        },
        {
          "score": 5.9,
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/urllib3/PYSEC-2023-192.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N"
        },
        {
          "score": 5.9,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3PR7C6RJ6JUBQKIJ644DMIJSUP36VDY"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N"
        },
        {
          "score": 5.9,
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20241213-0007"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N"
        },
        {
          "score": 5.9,
          "source": {
            "url": "https://github.com/urllib3/urllib3"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N"
        },
        {
          "score": 5.9,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAGZXYJ7H2G3SB47M453VQVNAWKAEJJ"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N"
        },
        {
          "score": 5.9,
          "source": {
            "url": "https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N"
        },
        {
          "score": 5.9,
          "source": {
            "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N"
        },
        {
          "score": 5.9,
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N"
        },
        {
          "score": 5.9,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N"
        },
        {
          "score": 5.9,
          "source": {
            "url": "https://github.com/urllib3/urllib3/commit/644124ecd0b6e417c527191f866daa05a5a2056d"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N"
        },
        {
          "score": 5.9,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N"
        },
        {
          "score": 8.1,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
        },
        {
          "source": {
            "url": "https://github.com/urllib3/urllib3"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAGZXYJ7H2G3SB47M453VQVNAWKAEJJ"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/urllib3/urllib3/commit/644124ecd0b6e417c527191f866daa05a5a2056d"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/advisories/GHSA-v845-jxx5-vc9f"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/urllib3/PYSEC-2023-192.yaml"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3PR7C6RJ6JUBQKIJ644DMIJSUP36VDY"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:0733"
          },
          "vector": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T18:30:30Z/"
        }
      ],
      "references": [
        {
          "id": "",
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43804.json"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-43804"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43804"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/urllib3/PYSEC-2023-192.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/urllib3/urllib3"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/urllib3/urllib3/commit/644124ecd0b6e417c527191f866daa05a5a2056d"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3PR7C6RJ6JUBQKIJ644DMIJSUP36VDY"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3PR7C6RJ6JUBQKIJ644DMIJSUP36VDY/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAGZXYJ7H2G3SB47M453VQVNAWKAEJJ"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAGZXYJ7H2G3SB47M453VQVNAWKAEJJ/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20241213-0007"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20241213-0007/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.vicarius.io/vsociety/posts/cve-2023-43804-urllib3-vulnerability-3"
          }
        },
        {
          "id": "1053626",
          "source": {
            "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053626"
          }
        },
        {
          "id": "2242493",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493"
          }
        },
        {
          "id": "CVE-2023-43804",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804"
          }
        },
        {
          "id": "GHSA-v845-jxx5-vc9f",
          "source": {
            "url": "https://github.com/advisories/GHSA-v845-jxx5-vc9f"
          }
        },
        {
          "id": "GHSA-v845-jxx5-vc9f",
          "source": {
            "url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f"
          }
        },
        {
          "id": "RHSA-2023:6158",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:6158"
          }
        },
        {
          "id": "RHSA-2023:6812",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:6812"
          }
        },
        {
          "id": "RHSA-2023:7378",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:7378"
          }
        },
        {
          "id": "RHSA-2023:7385",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:7385"
          }
        },
        {
          "id": "RHSA-2023:7407",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:7407"
          }
        },
        {
          "id": "RHSA-2023:7435",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:7435"
          }
        },
        {
          "id": "RHSA-2023:7523",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:7523"
          }
        },
        {
          "id": "RHSA-2023:7528",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:7528"
          }
        },
        {
          "id": "RHSA-2023:7753",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:7753"
          }
        },
        {
          "id": "RHSA-2024:0116",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:0116"
          }
        },
        {
          "id": "RHSA-2024:0133",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:0133"
          }
        },
        {
          "id": "RHSA-2024:0187",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:0187"
          }
        },
        {
          "id": "RHSA-2024:0300",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:0300"
          }
        },
        {
          "id": "RHSA-2024:0464",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:0464"
          }
        },
        {
          "id": "RHSA-2024:0588",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:0588"
          }
        },
        {
          "id": "RHSA-2024:0733",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:0733"
          }
        },
        {
          "id": "RHSA-2024:1383",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:1383"
          }
        },
        {
          "id": "RHSA-2024:2159",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:2159"
          }
        },
        {
          "id": "RHSA-2024:2985",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:2985"
          }
        },
        {
          "id": "RHSA-2024:2986",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:2986"
          }
        },
        {
          "id": "RHSA-2024:2987",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:2987"
          }
        },
        {
          "id": "USN-6473-1",
          "source": {
            "url": "https://usn.ubuntu.com/6473-1/"
          }
        },
        {
          "id": "USN-6473-2",
          "source": {
            "url": "https://usn.ubuntu.com/6473-2/"
          }
        },
        {
          "id": "cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*"
          }
        }
      ],
      "source": {
        "name": "VulnerableCode",
        "url": "http://public.vulnerablecode.io/vulnerabilities/VCID-c4sy-7zv4-aaas"
      }
    },
    {
      "affects": [
        {
          "ref": "pkg:maven/com.clickhouse/clickhouse-jdbc@0.3.2-patch8?classifier=grpc&type=jar"
        }
      ],
      "bom-ref": "BomRef.4834456430589261.879863599385973",
      "description": "Exposure of sensitive information in exceptions in ClichHouse's clickhouse-r2dbc, com.clickhouse:clickhouse-jdbc, and com.clickhouse:clickhouse-client versions less than 0.4.6 allows unauthorized users to gain access to client certificate passwords via client exception logs. This occurs when 'sslkey' is specified and an exception, such as a ClickHouseException or SQLException, is thrown during database operations; the certificate password is then included in the logged exception message.",
      "id": "VCID-cpeh-ymjp-aaah",
      "ratings": [
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/ClickHouse/clickhouse-java"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/ClickHouse/clickhouse-java/issues/1331"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://vulncheck.com/advisories/vc-advisory-GHSA-g8ph-74m6-8m7r"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/ClickHouse/clickhouse-java/pull/1334"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/advisories/GHSA-3p77-wg4c-qm24"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/ClickHouse/clickhouse-java/releases/tag/v0.4.6"
          },
          "vector": ""
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-23689"
          },
          "vector": "0.33284"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-23689"
          },
          "vector": "0.33612"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-23689"
          },
          "vector": "0.33700"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-23689"
          },
          "vector": "0.33726"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-23689"
          },
          "vector": "0.33827"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-23689"
          },
          "vector": "0.33833"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-23689"
          },
          "vector": "0.33855"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-23689"
          },
          "vector": "0.33874"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-23689"
          },
          "vector": "0.34097"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-23689"
          },
          "vector": "0.34151"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-23689"
          },
          "vector": "0.34210"
        },
        {
          "score": 8.8,
          "source": {
            "url": "https://github.com/ClickHouse/clickhouse-java/pull/1334"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 8.8,
          "source": {
            "url": "https://github.com/ClickHouse/clickhouse-java/releases/tag/v0.4.6"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 8.8,
          "source": {
            "url": "https://github.com/ClickHouse/clickhouse-java"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 8.8,
          "source": {
            "url": "https://vulncheck.com/advisories/vc-advisory-GHSA-g8ph-74m6-8m7r"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 8.8,
          "source": {
            "url": "https://github.com/ClickHouse/clickhouse-java/issues/1331"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 8.8,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23689"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "source": {
            "url": "https://github.com/advisories/GHSA-g8ph-74m6-8m7r"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/ClickHouse/clickhouse-java/security/advisories/GHSA-g8ph-74m6-8m7r"
          },
          "vector": ""
        }
      ],
      "references": [
        {
          "id": "",
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-23689"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/ClickHouse/clickhouse-java"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/ClickHouse/clickhouse-java/issues/1331"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/ClickHouse/clickhouse-java/pull/1334"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/ClickHouse/clickhouse-java/releases/tag/v0.4.6"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://vulncheck.com/advisories/vc-advisory-GHSA-g8ph-74m6-8m7r"
          }
        },
        {
          "id": "CVE-2024-23689",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23689"
          }
        },
        {
          "id": "GHSA-3p77-wg4c-qm24",
          "source": {
            "url": "https://github.com/advisories/GHSA-3p77-wg4c-qm24"
          }
        },
        {
          "id": "GHSA-g8ph-74m6-8m7r",
          "source": {
            "url": "https://github.com/ClickHouse/clickhouse-java/security/advisories/GHSA-g8ph-74m6-8m7r"
          }
        },
        {
          "id": "GHSA-g8ph-74m6-8m7r",
          "source": {
            "url": "https://github.com/advisories/GHSA-g8ph-74m6-8m7r"
          }
        },
        {
          "id": "cpe:2.3:a:clickhouse:java_libraries:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:clickhouse:java_libraries:*:*:*:*:*:*:*:*"
          }
        }
      ],
      "source": {
        "name": "VulnerableCode",
        "url": "http://public.vulnerablecode.io/vulnerabilities/VCID-cpeh-ymjp-aaah"
      }
    },
    {
      "affects": [
        {
          "ref": "pkg:maven/com.clickhouse/clickhouse-jdbc@0.3.2-patch8?classifier=grpc&type=jar"
        }
      ],
      "bom-ref": "BomRef.8964809556199274.669589438045176",
      "description": "ClickHouse vulnerable to client certificate password exposure in client exception",
      "id": "VCID-cux8-5tq5-aaaj",
      "ratings": [
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/ClickHouse/clickhouse-java"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/ClickHouse/clickhouse-java/issues/1331"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/ClickHouse/clickhouse-java/pull/1334"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/ClickHouse/clickhouse-java/releases/tag/v0.4.6"
          },
          "vector": ""
        },
        {
          "score": 8.8,
          "source": {
            "url": "https://github.com/ClickHouse/clickhouse-java/releases/tag/v0.4.6"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 8.8,
          "source": {
            "url": "https://github.com/ClickHouse/clickhouse-java"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 8.8,
          "source": {
            "url": "https://github.com/ClickHouse/clickhouse-java/issues/1331"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 8.8,
          "source": {
            "url": "https://github.com/ClickHouse/clickhouse-java/pull/1334"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "source": {
            "url": "https://github.com/advisories/GHSA-g8ph-74m6-8m7r"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/ClickHouse/clickhouse-java/security/advisories/GHSA-g8ph-74m6-8m7r"
          },
          "vector": ""
        }
      ],
      "references": [
        {
          "id": "",
          "source": {
            "url": "https://github.com/ClickHouse/clickhouse-java"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/ClickHouse/clickhouse-java/issues/1331"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/ClickHouse/clickhouse-java/pull/1334"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/ClickHouse/clickhouse-java/releases/tag/v0.4.6"
          }
        },
        {
          "id": "GHSA-g8ph-74m6-8m7r",
          "source": {
            "url": "https://github.com/ClickHouse/clickhouse-java/security/advisories/GHSA-g8ph-74m6-8m7r"
          }
        },
        {
          "id": "GHSA-g8ph-74m6-8m7r",
          "source": {
            "url": "https://github.com/advisories/GHSA-g8ph-74m6-8m7r"
          }
        }
      ],
      "source": {
        "name": "VulnerableCode",
        "url": "http://public.vulnerablecode.io/vulnerabilities/VCID-cux8-5tq5-aaaj"
      }
    },
    {
      "affects": [
        {
          "ref": "pkg:pypi/django@4.0.8"
        }
      ],
      "bom-ref": "BomRef.6996539394595944.33361697940085544",
      "description": "",
      "id": "VCID-dapt-wsva-ubfv",
      "ratings": [
        {
          "severity": "medium",
          "source": {
            "url": "https://docs.djangoproject.com/en/dev/releases/security/"
          },
          "vector": ""
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-45231"
          },
          "vector": "0.21584"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-45231"
          },
          "vector": "0.21860"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-45231"
          },
          "vector": "0.21950"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-45231"
          },
          "vector": "0.21980"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-45231"
          },
          "vector": "0.22041"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-45231"
          },
          "vector": "0.22048"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-45231"
          },
          "vector": "0.22049"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-45231"
          },
          "vector": "0.22061"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-45231"
          },
          "vector": "0.22084"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-45231"
          },
          "vector": "0.22326"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-45231"
          },
          "vector": "0.22392"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-45231"
          },
          "vector": "0.22490"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45231.json"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://github.com/django/django/commit/bf4888d317ba4506d091eeac6e8b4f1fcc731199"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://groups.google.com/forum/#%21forum/django-announce"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://docs.djangoproject.com/en/dev/releases/security"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://github.com/django/django/commit/3c733c78d6f8e50296d6e248968b6516c92a53ca"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://github.com/django/django"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://github.com/django/django/commit/96d84047715ea1715b4bd1594e46122b8a77b9e2"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://www.djangoproject.com/weblog/2024/sep/03/security-releases"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45231"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 5.3,
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "source": {
            "url": "https://docs.djangoproject.com/en/dev/releases/security"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/django/django/commit/96d84047715ea1715b4bd1594e46122b8a77b9e2"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/django/django"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://www.djangoproject.com/weblog/2024/sep/03/security-releases"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/advisories/GHSA-rrqc-c2jx-6jgv"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/django/django/commit/3c733c78d6f8e50296d6e248968b6516c92a53ca"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45231"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/django/django/commit/bf4888d317ba4506d091eeac6e8b4f1fcc731199"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://groups.google.com/forum/#%21forum/django-announce"
          },
          "vector": ""
        }
      ],
      "references": [
        {
          "id": "",
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45231.json"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-45231"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45231"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://docs.djangoproject.com/en/dev/releases/security"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://docs.djangoproject.com/en/dev/releases/security/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/django/django"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/django/django/commit/3c733c78d6f8e50296d6e248968b6516c92a53ca"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/django/django/commit/96d84047715ea1715b4bd1594e46122b8a77b9e2"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/django/django/commit/bf4888d317ba4506d091eeac6e8b4f1fcc731199"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://groups.google.com/forum/#%21forum/django-announce"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45231"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.djangoproject.com/weblog/2024/sep/03/security-releases"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.djangoproject.com/weblog/2024/sep/03/security-releases/"
          }
        },
        {
          "id": "2314496",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314496"
          }
        },
        {
          "id": "GHSA-rrqc-c2jx-6jgv",
          "source": {
            "url": "https://github.com/advisories/GHSA-rrqc-c2jx-6jgv"
          }
        },
        {
          "id": "USN-6987-1",
          "source": {
            "url": "https://usn.ubuntu.com/6987-1/"
          }
        },
        {
          "id": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:djangoproject:django:5.1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:5.1:*:*:*:*:*:*:*"
          }
        }
      ],
      "source": {
        "name": "VulnerableCode",
        "url": "http://public.vulnerablecode.io/vulnerabilities/VCID-dapt-wsva-ubfv"
      }
    },
    {
      "affects": [
        {
          "ref": "pkg:pypi/celery@4.3.0"
        }
      ],
      "bom-ref": "BomRef.46831761182280396.28017724467372973",
      "description": "This affects the package celery before 5.2.2. It by default trusts the messages and metadata stored in backends (result stores). When reading task metadata from the backend, the data is deserialized. Given that an attacker can gain access to, or somehow manipulate the metadata within a celery backend, they could trigger a stored command injection vulnerability and potentially gain further access to the system.",
      "id": "VCID-dhbw-3z7r-aaad",
      "ratings": [
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/celery/PYSEC-2021-858.yaml"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/celery/celery"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/celery/celery/commit/1f7ad7e6df1e02039b6ab9eec617d283598cad6b"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/celery/celery/blob/master/Changelog.rst%23522"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://snyk.io/vuln/SNYK-PYTHON-CELERY-2314953"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/advisories/GHSA-q4xr-rc97-m4xx"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYXRGHWHD2WWMHBWCVD5ULVINPKNY3P5"
          },
          "vector": ""
        },
        {
          "severity": "medium",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037531"
          }
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23727"
          },
          "vector": "0.80583"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23727"
          },
          "vector": "0.80594"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23727"
          },
          "vector": "0.80624"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23727"
          },
          "vector": "0.80625"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23727"
          },
          "vector": "0.80635"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23727"
          },
          "vector": "0.80638"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23727"
          },
          "vector": "0.80685"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23727"
          },
          "vector": "0.80699"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23727"
          },
          "vector": "0.80720"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23727"
          },
          "vector": "0.83763"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23727"
          },
          "vector": "0.83868"
        },
        {
          "score": 6.0,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23727"
          },
          "vector": "AV:N/AC:M/Au:S/C:P/I:P/A:P"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23727"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://snyk.io/vuln/SNYK-PYTHON-CELERY-2314953"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/celery/celery"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/celery/PYSEC-2021-858.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/celery/celery/commit/1f7ad7e6df1e02039b6ab9eec617d283598cad6b"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYXRGHWHD2WWMHBWCVD5ULVINPKNY3P5"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/celery/celery/blob/master/Changelog.rst%23522"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 8.0,
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23727.json"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"
        }
      ],
      "references": [
        {
          "id": "",
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23727.json"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23727"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23727"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/celery/celery"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/celery/celery/blob/master/Changelog.rst%23522"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/celery/celery/commit/1f7ad7e6df1e02039b6ab9eec617d283598cad6b"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/celery/PYSEC-2021-858.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SYXRGHWHD2WWMHBWCVD5ULVINPKNY3P5/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYXRGHWHD2WWMHBWCVD5ULVINPKNY3P5"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYXRGHWHD2WWMHBWCVD5ULVINPKNY3P5/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://snyk.io/vuln/SNYK-PYTHON-CELERY-2314953"
          }
        },
        {
          "id": "2037531",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037531"
          }
        },
        {
          "id": "CVE-2021-23727",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23727"
          }
        },
        {
          "id": "GHSA-q4xr-rc97-m4xx",
          "source": {
            "url": "https://github.com/advisories/GHSA-q4xr-rc97-m4xx"
          }
        },
        {
          "id": "cpe:2.3:a:celeryproject:celery:*:*:*:*:*:python:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:celeryproject:celery:*:*:*:*:*:python:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:7.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:7.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
          }
        }
      ],
      "source": {
        "name": "VulnerableCode",
        "url": "http://public.vulnerablecode.io/vulnerabilities/VCID-dhbw-3z7r-aaad"
      }
    },
    {
      "affects": [
        {
          "ref": "pkg:pypi/mod-wsgi@4.9.0"
        }
      ],
      "bom-ref": "BomRef.15726939549917807.00877257416135424",
      "description": "",
      "id": "VCID-dsgq-9usb-aaar",
      "ratings": [
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/GrahamDumpleton/mod_wsgi"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/advisories/GHSA-7527-8855-9cf8"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/GrahamDumpleton/mod_wsgi/blob/4.9.2/src/server/mod_wsgi.c#L13940-L13941"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/GrahamDumpleton/mod_wsgi/commit/af3c0c2736bc0b0b01fa0f0aad3c904b7fa9c751"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://modwsgi.readthedocs.io/en/latest/release-notes/version-4.9.3.html"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00021.html"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/mod-wsgi/PYSEC-2022-254.yaml"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/GrahamDumpleton/mod_wsgi/blob/4.9.2/src/server/mod_wsgi.c#L14046-L14082"
          },
          "vector": ""
        },
        {
          "severity": "medium",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2100563"
          }
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2255"
          },
          "vector": "0.45292"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2255"
          },
          "vector": "0.51308"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2255"
          },
          "vector": "0.51379"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2255"
          },
          "vector": "0.51401"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2255"
          },
          "vector": "0.51462"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2255"
          },
          "vector": "0.51464"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2255"
          },
          "vector": "0.51471"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2255"
          },
          "vector": "0.51479"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2255"
          },
          "vector": "0.51505"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2255"
          },
          "vector": "0.51650"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2255"
          },
          "vector": "0.51678"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2255"
          },
          "vector": "0.51736"
        },
        {
          "score": 5.6,
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
        },
        {
          "score": 7.3,
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2255.json"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://modwsgi.readthedocs.io/en/latest/release-notes/version-4.9.3.html"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/GrahamDumpleton/mod_wsgi/blob/4.9.2/src/server/mod_wsgi.c#L14046-L14082"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/mod-wsgi/PYSEC-2022-254.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/GrahamDumpleton/mod_wsgi/blob/4.9.2/src/server/mod_wsgi.c#L13940-L13941"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00021.html"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2255"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/GrahamDumpleton/mod_wsgi/commit/af3c0c2736bc0b0b01fa0f0aad3c904b7fa9c751"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/GrahamDumpleton/mod_wsgi"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
        }
      ],
      "references": [
        {
          "id": "",
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2255.json"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2255"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2255"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/GrahamDumpleton/mod_wsgi"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/GrahamDumpleton/mod_wsgi/blob/4.9.2/src/server/mod_wsgi.c#L13940-L13941"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/GrahamDumpleton/mod_wsgi/blob/4.9.2/src/server/mod_wsgi.c#L14046-L14082"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/GrahamDumpleton/mod_wsgi/commit/af3c0c2736bc0b0b01fa0f0aad3c904b7fa9c751"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/mod-wsgi/PYSEC-2022-254.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00021.html"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://modwsgi.readthedocs.io/en/latest/release-notes/version-4.9.3.html"
          }
        },
        {
          "id": "1016476",
          "source": {
            "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016476"
          }
        },
        {
          "id": "2100563",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2100563"
          }
        },
        {
          "id": "CVE-2022-2255",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2255"
          }
        },
        {
          "id": "GHSA-7527-8855-9cf8",
          "source": {
            "url": "https://github.com/advisories/GHSA-7527-8855-9cf8"
          }
        },
        {
          "id": "USN-5551-1",
          "source": {
            "url": "https://usn.ubuntu.com/5551-1/"
          }
        },
        {
          "id": "cpe:2.3:a:modwsgi:mod_wsgi:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:modwsgi:mod_wsgi:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
          }
        }
      ],
      "source": {
        "name": "VulnerableCode",
        "url": "http://public.vulnerablecode.io/vulnerabilities/VCID-dsgq-9usb-aaar"
      }
    },
    {
      "affects": [
        {
          "ref": "pkg:pypi/redis@4.3.2"
        }
      ],
      "bom-ref": "BomRef.5060710588276972.19913069607678624",
      "description": "redis-py Race Condition vulnerability",
      "id": "VCID-g2fu-45jw-aaan",
      "ratings": [
        {
          "severity": "low",
          "source": {
            "url": "https://github.com/redis/redis-py/commit/d56baeb683fc1935cfa343fa2eeb0fa9bd955283"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/redis/PYSEC-2023-45.yaml"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://github.com/redis/redis-py/compare/v4.5.2...v4.5.3"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://github.com/redis/redis-py/compare/v4.4.2...v4.4.3"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://github.com/redis/redis-py/compare/v4.3.5...v4.3.6"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://openai.com/blog/march-20-chatgpt-outage"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://github.com/redis/redis-py/issues/2624"
          },
          "vector": ""
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28858"
          },
          "vector": "0.49822"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28858"
          },
          "vector": "0.50073"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28858"
          },
          "vector": "0.50148"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28858"
          },
          "vector": "0.50170"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28858"
          },
          "vector": "0.50230"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28858"
          },
          "vector": "0.50239"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28858"
          },
          "vector": "0.50246"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28858"
          },
          "vector": "0.50247"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28858"
          },
          "vector": "0.50273"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28858"
          },
          "vector": "0.50428"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28858"
          },
          "vector": "0.50465"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28858"
          },
          "vector": "0.50521"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://github.com/redis/redis-py/compare/v4.3.5...v4.3.6"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://openai.com/blog/march-20-chatgpt-outage"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://github.com/redis/redis-py/compare/v4.5.2...v4.5.3"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://github.com/redis/redis-py/issues/2624"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/redis/PYSEC-2023-45.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28858"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://github.com/redis/redis-py/compare/v4.4.2...v4.4.3"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://github.com/redis/redis-py/commit/d56baeb683fc1935cfa343fa2eeb0fa9bd955283"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 4.3,
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 4.3,
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28858.json"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 6.5,
          "source": {
            "url": "https://github.com/redis/redis-py"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "score": 6.5,
          "source": {
            "url": "https://github.com/redis/redis-py/releases/tag/v4.5.4"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "score": 6.5,
          "source": {
            "url": "https://github.com/redis/redis-py/pull/2641"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "score": 6.5,
          "source": {
            "url": "https://github.com/redis/redis-py/releases/tag/v4.4.4"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "source": {
            "url": "https://github.com/redis/redis-py"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/redis/redis-py/pull/2641"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/redis/redis-py/releases/tag/v4.4.4"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/redis/redis-py/releases/tag/v4.5.4"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/advisories/GHSA-24wv-mv5m-xv4h"
          },
          "vector": ""
        }
      ],
      "references": [
        {
          "id": "",
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28858.json"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28858"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/redis/PYSEC-2023-45.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/redis/redis-py"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/redis/redis-py/commit/d56baeb683fc1935cfa343fa2eeb0fa9bd955283"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/redis/redis-py/compare/v4.3.5...v4.3.6"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/redis/redis-py/compare/v4.4.2...v4.4.3"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/redis/redis-py/compare/v4.5.2...v4.5.3"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/redis/redis-py/issues/2624"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/redis/redis-py/pull/2641"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/redis/redis-py/releases/tag/v4.4.4"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/redis/redis-py/releases/tag/v4.5.4"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://openai.com/blog/march-20-chatgpt-outage"
          }
        },
        {
          "id": "1033754",
          "source": {
            "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033754"
          }
        },
        {
          "id": "2182057",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182057"
          }
        },
        {
          "id": "CVE-2023-28858",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28858"
          }
        },
        {
          "id": "GHSA-24wv-mv5m-xv4h",
          "source": {
            "url": "https://github.com/advisories/GHSA-24wv-mv5m-xv4h"
          }
        },
        {
          "id": "cpe:2.3:a:redis:redis-py:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redis:redis-py:*:*:*:*:*:*:*:*"
          }
        }
      ],
      "source": {
        "name": "VulnerableCode",
        "url": "http://public.vulnerablecode.io/vulnerabilities/VCID-g2fu-45jw-aaan"
      }
    },
    {
      "affects": [
        {
          "ref": "pkg:pypi/oauthlib@3.2.0"
        }
      ],
      "bom-ref": "BomRef.07544458772248974.9701913173013226",
      "description": "",
      "id": "VCID-getd-1u2x-aaag",
      "ratings": [
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36087"
          },
          "vector": "0.68365"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36087"
          },
          "vector": "0.68502"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36087"
          },
          "vector": "0.68544"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36087"
          },
          "vector": "0.68560"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36087"
          },
          "vector": "0.68605"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36087"
          },
          "vector": "0.68608"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36087"
          },
          "vector": "0.68610"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36087"
          },
          "vector": "0.68623"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36087"
          },
          "vector": "0.72568"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36087"
          },
          "vector": "0.72633"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36087"
          },
          "vector": "0.72652"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36087"
          },
          "vector": "0.72683"
        },
        {
          "score": 5.7,
          "source": {
            "url": "https://github.com/oauthlib/oauthlib"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"
        },
        {
          "score": 5.7,
          "source": {
            "url": "https://github.com/oauthlib/oauthlib/commit/2e40b412c844ecc4673c3fa3f72181f228bdbacd"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"
        },
        {
          "score": 5.7,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X2CQZM5CKOUM4GW2GTAPQEQFPITQ6F7S"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"
        },
        {
          "score": 5.7,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LXOPIA6M57CFQPUT6HHSNXCTV6QA3UDI"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"
        },
        {
          "score": 5.7,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBCQJR3ZF7FVNTJYRVPVSQEQRAYZIUHU"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"
        },
        {
          "score": 5.7,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRYLYHE5HWF6R2CRLJFUK4PILR47WXOE"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"
        },
        {
          "score": 5.7,
          "source": {
            "url": "https://github.com/oauthlib/oauthlib/blob/2b8a44855a51ad5a5b0c348a08c2564a2e197ea2/oauthlib/uri_validate.py"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"
        },
        {
          "score": 5.7,
          "source": {
            "url": "https://github.com/oauthlib/oauthlib/blob/d4bafd9f1d0eba3766e933b1ac598cbbf37b8914/oauthlib/oauth2/rfc6749/grant_types/base.py#L232"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"
        },
        {
          "score": 5.7,
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/oauthlib/PYSEC-2022-269.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"
        },
        {
          "score": 5.7,
          "source": {
            "url": "https://github.com/oauthlib/oauthlib/releases/tag/v3.2.1"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"
        },
        {
          "score": 6.5,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36087"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
        },
        {
          "score": 6.5,
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36087.json"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "source": {
            "url": "https://github.com/advisories/GHSA-3pgj-pg6c-r5p7"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/oauthlib/oauthlib/security/advisories/GHSA-3pgj-pg6c-r5p7"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRYLYHE5HWF6R2CRLJFUK4PILR47WXOE"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/oauthlib/oauthlib/blob/d4bafd9f1d0eba3766e933b1ac598cbbf37b8914/oauthlib/oauth2/rfc6749/grant_types/base.py#L232"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/oauthlib/oauthlib/releases/tag/v3.2.1"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LXOPIA6M57CFQPUT6HHSNXCTV6QA3UDI"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/oauthlib/oauthlib/commit/2e40b412c844ecc4673c3fa3f72181f228bdbacd"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X2CQZM5CKOUM4GW2GTAPQEQFPITQ6F7S"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/oauthlib/PYSEC-2022-269.yaml"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBCQJR3ZF7FVNTJYRVPVSQEQRAYZIUHU"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/oauthlib/oauthlib"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/oauthlib/oauthlib/blob/2b8a44855a51ad5a5b0c348a08c2564a2e197ea2/oauthlib/uri_validate.py"
          },
          "vector": ""
        }
      ],
      "references": [
        {
          "id": "",
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36087.json"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36087"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/oauthlib/oauthlib"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/oauthlib/oauthlib/blob/2b8a44855a51ad5a5b0c348a08c2564a2e197ea2/oauthlib/uri_validate.py"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/oauthlib/oauthlib/blob/d4bafd9f1d0eba3766e933b1ac598cbbf37b8914/oauthlib/oauth2/rfc6749/grant_types/base.py#L232"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/oauthlib/oauthlib/commit/2e40b412c844ecc4673c3fa3f72181f228bdbacd"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/oauthlib/oauthlib/releases/tag/v3.2.1"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/oauthlib/PYSEC-2022-269.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LXOPIA6M57CFQPUT6HHSNXCTV6QA3UDI/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NBCQJR3ZF7FVNTJYRVPVSQEQRAYZIUHU/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QRYLYHE5HWF6R2CRLJFUK4PILR47WXOE/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X2CQZM5CKOUM4GW2GTAPQEQFPITQ6F7S/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LXOPIA6M57CFQPUT6HHSNXCTV6QA3UDI"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LXOPIA6M57CFQPUT6HHSNXCTV6QA3UDI/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBCQJR3ZF7FVNTJYRVPVSQEQRAYZIUHU"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBCQJR3ZF7FVNTJYRVPVSQEQRAYZIUHU/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRYLYHE5HWF6R2CRLJFUK4PILR47WXOE"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRYLYHE5HWF6R2CRLJFUK4PILR47WXOE/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X2CQZM5CKOUM4GW2GTAPQEQFPITQ6F7S"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X2CQZM5CKOUM4GW2GTAPQEQFPITQ6F7S/"
          }
        },
        {
          "id": "1019710",
          "source": {
            "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1019710"
          }
        },
        {
          "id": "2128425",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128425"
          }
        },
        {
          "id": "CVE-2022-36087",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36087"
          }
        },
        {
          "id": "GHSA-3pgj-pg6c-r5p7",
          "source": {
            "url": "https://github.com/advisories/GHSA-3pgj-pg6c-r5p7"
          }
        },
        {
          "id": "GHSA-3pgj-pg6c-r5p7",
          "source": {
            "url": "https://github.com/oauthlib/oauthlib/security/advisories/GHSA-3pgj-pg6c-r5p7"
          }
        },
        {
          "id": "RHSA-2023:2161",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:2161"
          }
        },
        {
          "id": "USN-5632-1",
          "source": {
            "url": "https://usn.ubuntu.com/5632-1/"
          }
        },
        {
          "id": "cpe:2.3:a:oauthlib_project:oauthlib:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oauthlib_project:oauthlib:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*"
          }
        }
      ],
      "source": {
        "name": "VulnerableCode",
        "url": "http://public.vulnerablecode.io/vulnerabilities/VCID-getd-1u2x-aaag"
      }
    },
    {
      "affects": [
        {
          "ref": "pkg:pypi/sqlparse@0.4.2"
        }
      ],
      "bom-ref": "BomRef.707338571166921.48663270869913033",
      "description": "Duplicate Advisory: sqlparse parsing heavily nested list leads to Denial of Service\n## Duplicate Advisory\nThis advisory has been withdrawn because it is a duplicate of GHSA-2m57-hf25-phgg. This link is maintained to preserve external references.\n\n## Original Description\nPassing a heavily nested list to sqlparse.parse() leads to a Denial of Service due to RecursionError.",
      "id": "VCID-gm4k-et5g-aaas",
      "ratings": [
        {
          "severity": "high",
          "source": {
            "url": "https://research.jfrog.com/vulnerabilities/sqlparse-stack-exhaustion-dos-jfsa-2024-001031292"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/advisories/GHSA-2m57-hf25-phgg"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/andialbrecht/sqlparse/commit/b4a39d9850969b4e1d6940d32094ee0b42a2cf03"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/advisories/GHSA-62qf-jcq8-8gxw"
          },
          "vector": ""
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://research.jfrog.com/vulnerabilities/sqlparse-stack-exhaustion-dos-jfsa-2024-001031292"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/advisories/GHSA-2m57-hf25-phgg"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/andialbrecht/sqlparse/commit/b4a39d9850969b4e1d6940d32094ee0b42a2cf03"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "source": {
            "url": "https://github.com/advisories/GHSA-2m57-hf25-phgg"
          },
          "vector": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-30T16:07:16Z/"
        }
      ],
      "references": [
        {
          "id": "",
          "source": {
            "url": "https://github.com/andialbrecht/sqlparse/commit/b4a39d9850969b4e1d6940d32094ee0b42a2cf03"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://research.jfrog.com/vulnerabilities/sqlparse-stack-exhaustion-dos-jfsa-2024-001031292"
          }
        },
        {
          "id": "CVE-2024-4340",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4340"
          }
        },
        {
          "id": "GHSA-2m57-hf25-phgg",
          "source": {
            "url": "https://github.com/advisories/GHSA-2m57-hf25-phgg"
          }
        },
        {
          "id": "GHSA-62qf-jcq8-8gxw",
          "source": {
            "url": "https://github.com/advisories/GHSA-62qf-jcq8-8gxw"
          }
        }
      ],
      "source": {
        "name": "VulnerableCode",
        "url": "http://public.vulnerablecode.io/vulnerabilities/VCID-gm4k-et5g-aaas"
      }
    },
    {
      "affects": [
        {
          "ref": "pkg:pypi/selenium@3.141.0"
        }
      ],
      "bom-ref": "BomRef.316879871098957.12269796031454938",
      "description": "NULL Pointer Dereference in GitHub repository seleniumhq/selenium prior to 4.14.0.",
      "id": "VCID-h5qk-x3y5-aaab",
      "ratings": [
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5590"
          },
          "vector": "0.33139"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5590"
          },
          "vector": "0.36701"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5590"
          },
          "vector": "0.36771"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5590"
          },
          "vector": "0.36800"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5590"
          },
          "vector": "0.36888"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5590"
          },
          "vector": "0.36892"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5590"
          },
          "vector": "0.36896"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5590"
          },
          "vector": "0.36914"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5590"
          },
          "vector": "0.36925"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5590"
          },
          "vector": "0.37136"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5590"
          },
          "vector": "0.37200"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5590"
          },
          "vector": "0.37275"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5590"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5590.json"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/seleniumhq/selenium/commit/023a0d52f106321838ab1c0997e76693f4dcbdf6"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://huntr.dev/bounties/e268cd68-4f34-49bd-878b-82b96dcc0c99"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        }
      ],
      "references": [
        {
          "id": "",
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5590.json"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5590"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/seleniumhq/selenium/commit/023a0d52f106321838ab1c0997e76693f4dcbdf6"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://huntr.dev/bounties/e268cd68-4f34-49bd-878b-82b96dcc0c99"
          }
        },
        {
          "id": "2244345",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2244345"
          }
        },
        {
          "id": "CVE-2023-5590",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5590"
          }
        },
        {
          "id": "cpe:2.3:a:selenium:selenium:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:selenium:selenium:*:*:*:*:*:*:*:*"
          }
        }
      ],
      "source": {
        "name": "VulnerableCode",
        "url": "http://public.vulnerablecode.io/vulnerabilities/VCID-h5qk-x3y5-aaab"
      }
    },
    {
      "affects": [
        {
          "ref": "pkg:maven/log4j/log4j@1.2.17"
        }
      ],
      "bom-ref": "BomRef.9213036422939267.030186134844262913",
      "description": "Deserialization of Untrusted Data in Log4j",
      "id": "VCID-hh72-ne73-aaak",
      "ratings": [
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r8418a0dff1729f19cf1024937e23a2db4c0f94f2794a423f5c10e8e7@%3Cissues.bookkeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r8d78a0fbb56d505461e29868d1026e98c402e6a568c13a6da67896a2@%3Cdev.jena.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r909b8e3a36913944d3b7bafe9635d4ca84f8f0e2cd146a1784f667c2@%3Cissues.zookeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/8ab32b4c9f1826f20add7c40be08909de9f58a89dc1de9c09953f5ac@%3Cissues.activemq.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r6236b5f8646d48af8b66d5050f288304016840788e508c883356fe0e@%3Clog4j-user.logging.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/rc17d8491beee51607693019857e41e769795366b85be00aa2f4b3159@%3Cnotifications.zookeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/raedd12dc24412b3780432bf202a2618a21a727788543e5337a458ead@%3Cissues.activemq.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00008.html"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/rf2567488cfc9212b42e34c6393cfa1c14e30e4838b98dda84d71041f@%3Cdev.tika.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r3d666e4e8905157f3c046d31398b04f2bfd4519e31f266de108c6919@%3Cissues.activemq.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/rd5dbeee4808c0f2b9b51479b50de3cc6adb1072c332a200d9107f13e@%3Cissues.activemq.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/479471e6debd608c837b9815b76eab24676657d4444fcfd5ef96d6e6@%3Cdev.tika.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r5c084578b3e3b40bd903c9d9e525097421bcd88178e672f612102eb2@%3Cjira.kafka.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r746fbc3fc13aee292ae6851f7a5080f592fa3a67b983c6887cdb1fc5@%3Cdev.tika.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r8c392ca48bb7e50754e4bc05865e9731b23d568d18a520fe3d8c1f75@%3Ccommon-issues.hadoop.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/rca24a281000fb681d7e26e5c031a21eb4b0593a7735f781b53dae4e2@%3Cdev.tika.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r3a85514a518f3080ab1fc2652cfe122c2ccf67cfb32356acb1b08fe8@%3Cdev.tika.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r3784834e80df2f284577a5596340fb84346c91a2dea6a073e65e3397@%3Cissues.activemq.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r107c8737db39ec9ec4f4e7147b249e29be79170b9ef4b80528105a2d@%3Cdev.zookeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/rb3c94619728c8f8c176d8e175e0a1086ca737ecdfcd5a2214bb768bc@%3Ccommits.bookkeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/rf1b434e11834a4449cd7addb69ed0aef0923112b5938182b363a968c@%3Cnotifications.zookeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://www.debian.org/security/2020/dsa-4686"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r7a1acc95373105169bd44df710c2f462cad31fb805364d2958a5ee03@%3Cjira.kafka.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/rdb7ddf28807e27c7801f6e56a0dfb31092d34c61bdd4fa2de9182119@%3Cissues.bookkeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/reaf6b996f74f12b4557bc221abe88f58270ac583942fa41293c61f94@%3Cpluto-scm.portals.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r4b25538be50126194cc646836c718b1a4d8f71bd9c912af5b59134ad@%3Cdev.tika.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/rc1eaed7f7d774d5d02f66e49baced31e04827a1293d61a70bd003ca7@%3Cdev.tika.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r26244f9f7d9a8a27a092eb0b2a0ca9395e88fcde8b5edaeca7ce569c@%3Ccommon-issues.hadoop.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r9fb3238cfc3222f2392ca6517353aadae18f76866157318ac562e706@%3Ccommon-issues.hadoop.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/rdec0d8ac1f03e6905b0de2df1d5fcdb98b94556e4f6cccf7519fdb26@%3Cdev.tika.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/752ec92cd1e334a639e79bfbd689a4ec2c6579ec5bb41b53ffdf358d@%3Cdev.kafka.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r6d34da5a0ca17ab08179a30c971446c7421af0e96f6d60867eabfc52@%3Cissues.bookkeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/rbd19de368abf0764e4383ec44d527bc9870176f488a494f09a40500d@%3Ccommon-dev.hadoop.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/44491fb9cc19acc901f7cff34acb7376619f15638439416e3e14761c@%3Cdev.tika.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r944183c871594fe9a555b8519a7c945bbcf6714d72461aa6c929028f@%3Cissues.zookeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20200110-0001"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/rf53eeefb7e7e524deaacb9f8671cbf01b8a253e865fb94e7656722c0@%3Cissues.bookkeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r05755112a8c164abc1004bb44f198b1e3d8ca3d546a8f13ebd3aa05f@%3Cissues.zookeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r61590890edcc64140e0c606954b29a063c3d08a2b41d447256d51a78@%3Cissues.activemq.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/277b4b5c2b0e06a825ccec565fa65bd671f35a4d58e3e2ec5d0618e1@%3Cdev.tika.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r2ff63f210842a3c5e42f03a35d8f3a345134d073c80a04077341c211@%3Cissues.activemq.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r3cf50d05ce8cec8c09392624b7bae750e7643dae60ef2438641ee015@%3Cissues.zookeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/rd6254837403e8cbfc7018baa9be29705f3f06bd007c83708f9a97679@%3Cissues.zookeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/rf9c19bcc2f7a98a880fa3e3456c003d331812b55836b34ef648063c9@%3Cjira.kafka.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r13d4b5c60ff63f3c4fab51d6ff266655be503b8a1884e2f2fab67c3a@%3Ccommon-issues.hadoop.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00022.html"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/rcd71280585425dad7e232f239c5709e425efdd0d3de4a92f808a4767@%3Cissues.bookkeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r71e26f9c2d5826c6f95ad60f7d052d75e1e70b0d2dd853db6fc26d5f@%3Cjira.kafka.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/6114ce566200d76e3cc45c521a62c2c5a4eac15738248f58a99f622c@%3Cissues.activemq.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/rc628307962ae1b8cc2d21b8e4b7dd6d7755b2dd52fa56a151a27e4fd@%3Cissues.zookeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r2756fd570b6709d55a61831ca028405bcb3e312175a60bc5d911c81f@%3Cjira.kafka.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r9d0d03f2e7d9e13c68b530f81d02b0fec33133edcf27330d8089fcfb@%3Cissues.zookeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/564f03b4e9511fcba29c68fc0299372dadbdb002718fa8edcc4325e4@%3Cjira.kafka.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r2ce8d26154bea939536e6cf27ed02d3192bf5c5d04df885a80fe89b3@%3Cissues.activemq.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r4ac89cbecd9e298ae9fafb5afda6fa77ac75c78d1ac957837e066c4e@%3Cuser.zookeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/rbdf18e39428b5c80fc35113470198b1fe53b287a76a46b0f8780b5fd@%3Cdev.zookeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r7bcdc710857725c311b856c0b82cee6207178af5dcde1bd43d289826@%3Cissues.activemq.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://usn.ubuntu.com/4495-1"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/ra38785cfc0e7f17f8e24bebf775dd032c033fadcaea29e5bc9fffc60@%3Cdev.tika.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/rd7805c1bf9388968508c6c8f84588773216e560055ddcc813d19f347@%3Ccommon-issues.hadoop.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r681b4432d0605f327b68b9f8a42662993e699d04614de4851c35ffd1@%3Cdev.tika.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r6aec6b8f70167fa325fb98b3b5c9ce0ffaed026e697b69b85ac24628@%3Cissues.zookeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://github.com/advisories/GHSA-2qrg-x229-3v8q"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpujul2020.html"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/rfdf65fa675c64a64459817344e0e6c44d51ee264beea6e5851fb60dc@%3Cissues.bookkeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r189aaeaad897f7d6b96f7c43a8ef2dfb9f6e9f8c1cc9ad182ce9b9ae@%3Cjira.kafka.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r3bf7b982dfa0779f8a71f843d2aa6b4184a53e6be7f149ee079387fd@%3Cdev.kafka.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r90c23eb8c82835fa82df85ae5e88c81fd9241e20a22971b0fb8f2c34@%3Cissues.bookkeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/eea03d504b36e8f870e8321d908e1def1addda16adda04327fe7c125%40%3Cdev.logging.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/re8c21ed9dd218c217d242ffa90778428e446b082b5e1c29f567e8374@%3Cissues.activemq.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r356d57d6225f91fdc30f8b0a2bed229d1ece55e16e552878c5fa809a@%3Cissues.zookeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/rb1b29aee737e1c37fe1d48528cb0febac4f5deed51f5412e6fdfe2bf@%3Cissues.activemq.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r8a1cfd4705258c106e488091fcec85f194c82f2bbde6bd151e201870@%3Cjira.kafka.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/rf77f79699c8d7e430c14cf480f12ed1297e6e8cf2ed379a425941e80@%3Cpluto-dev.portals.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/rd882ab6b642fe59cbbe94dc02bd197342058208f482e57b537940a4b@%3Cpluto-dev.portals.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/rda4849c6823dd3e83c7a356eb883180811d5c28359fe46865fd151c3@%3Cusers.kafka.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/re36da78e4f3955ba6c1c373a2ab85a4deb215ca74b85fcd66142fea1@%3Cissues.bookkeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r7f462c69d5ded4c0223e014d95a3496690423c5f6f05c09e2f2a407a@%3Cjira.kafka.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r8c6300245c0bcef095e9f07b48157e2c6471df0816db3408fcf1d748@%3Ccommon-issues.hadoop.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/ra54fa49be3e773d99ccc9c2a422311cf77e3ecd3b8594ee93043a6b1@%3Cdev.zookeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r3c575cabc7386e646fb12cb82b0b38ae5a6ade8a800f827107824495@%3Cjira.kafka.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r6b45a2fcc8e98ac93a179183dbb7f340027bdb8e3ab393418076b153@%3Ccommon-issues.hadoop.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r1b7734dfdfd938640f2f5fb6f4231a267145c71ed60cc7faa1cbac07@%3Ccommon-issues.hadoop.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r9a9e3b42cd5d1c4536a14ef04f75048dec8e2740ac6a138ea912177f@%3Cpluto-dev.portals.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r18f1c010b554a3a2d761e8ffffd8674fd4747bcbcf16c643d708318c@%3Cissues.activemq.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/rd3a9511eebab60e23f224841390a3f8cd5358cff605c5f7042171e47@%3Cdev.tinkerpop.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r3543ead2317dcd3306f69ee37b07dd383dbba6e2f47ff11eb55879ad@%3Cusers.activemq.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r594411f4bddebaf48a4c70266d0b7849e0d82bb72826f61b3a35bba7@%3Cissues.bookkeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r696507338dd5f44efc23d98cafe30f217cf3ba78e77ed1324c7a5179@%3Cjira.kafka.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/r9d2e28e71f91ba0b6f4114c8ecd96e2b1f7e0d06bdf8eb768c183aa9@%3Ccommon-issues.hadoop.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/ra9611a8431cb62369bce8909d7645597e1dd45c24b448836b1e54940@%3Cissues.bookkeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread.html/ra18a903f785aed9403aea38bc6f36844a056283c00dcfc6936b6318c@%3Cissues.bookkeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://lists.apache.org/thread.html/r9dc2505651788ac668299774d9e7af4dc616be2f56fdc684d1170882@%3Cusers.activemq.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://lists.apache.org/thread.html/r52a5129df402352adc34d052bab9234c8ef63596306506a89fdc7328@%3Cusers.activemq.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://lists.apache.org/thread.html/r8890b8f18f1de821595792b58b968a89692a255bc20d86d395270740@%3Ccommits.druid.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1785616"
          }
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/rec34b1cccf907898e7cb36051ffac3ccf1ea89d0b261a2a3b3fb267f@%3Ccommits.zookeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/rbc45eb0f53fd6242af3e666c2189464f848a851d408289840cecc6e3@%3Ccommits.zookeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/r48efc7cb5aeb4e1f67aaa06fb4b5479a5635d12f07d0b93fc2d08809@%3Ccommits.zookeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "score": 0.8,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17571"
          },
          "vector": "0.98414"
        },
        {
          "score": 0.8,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17571"
          },
          "vector": "0.98428"
        },
        {
          "score": 0.8,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17571"
          },
          "vector": "0.98432"
        },
        {
          "score": 0.8,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17571"
          },
          "vector": "0.98436"
        },
        {
          "score": 0.8,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17571"
          },
          "vector": "0.98437"
        },
        {
          "score": 0.8,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17571"
          },
          "vector": "0.98438"
        },
        {
          "score": 0.8,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17571"
          },
          "vector": "0.98439"
        },
        {
          "score": 0.8,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17571"
          },
          "vector": "0.98444"
        },
        {
          "score": 0.8,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17571"
          },
          "vector": "0.98525"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/rec34b1cccf907898e7cb36051ffac3ccf1ea89d0b261a2a3b3fb267f@%3Ccommits.zookeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/rbc45eb0f53fd6242af3e666c2189464f848a851d408289840cecc6e3@%3Ccommits.zookeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/r48efc7cb5aeb4e1f67aaa06fb4b5479a5635d12f07d0b93fc2d08809@%3Ccommits.zookeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 4.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
        },
        {
          "score": 4.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26%40%3Ccommits.pulsar.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L"
        },
        {
          "score": 5.3,
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
        },
        {
          "score": 5.4,
          "source": {
            "url": "https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:N/I:H/A:N"
        },
        {
          "score": 5.4,
          "source": {
            "url": "https://lists.apache.org/thread.html/rdf2a0d94c3b5b523aeff7741ae71347415276062811b687f30ea6573@%3Ccommits.zookeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
        },
        {
          "score": 5.4,
          "source": {
            "url": "https://lists.apache.org/thread.html/r48d5019bd42e0770f7e5351e420a63a41ff1f16924942442c6aff6a8@%3Ccommits.zookeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
        },
        {
          "score": 5.4,
          "source": {
            "url": "https://lists.apache.org/thread.html/r8e3f7da12bf5750b0a02e69a78a61073a2ac950eed7451ce70a65177@%3Ccommits.zookeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17571"
          },
          "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 8.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r8890b8f18f1de821595792b58b968a89692a255bc20d86d395270740@%3Ccommits.druid.apache.org%3E"
          },
          "vector": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 8.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r9dc2505651788ac668299774d9e7af4dc616be2f56fdc684d1170882@%3Cusers.activemq.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 8.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r52a5129df402352adc34d052bab9234c8ef63596306506a89fdc7328@%3Cusers.activemq.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/8ab32b4c9f1826f20add7c40be08909de9f58a89dc1de9c09953f5ac@%3Cissues.activemq.apache.org%3E"
          },
          "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/rb1b29aee737e1c37fe1d48528cb0febac4f5deed51f5412e6fdfe2bf@%3Cissues.activemq.apache.org%3E"
          },
          "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/44491fb9cc19acc901f7cff34acb7376619f15638439416e3e14761c@%3Cdev.tika.apache.org%3E"
          },
          "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r18f1c010b554a3a2d761e8ffffd8674fd4747bcbcf16c643d708318c@%3Cissues.activemq.apache.org%3E"
          },
          "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/re8c21ed9dd218c217d242ffa90778428e446b082b5e1c29f567e8374@%3Cissues.activemq.apache.org%3E"
          },
          "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r681b4432d0605f327b68b9f8a42662993e699d04614de4851c35ffd1@%3Cdev.tika.apache.org%3E"
          },
          "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r7bcdc710857725c311b856c0b82cee6207178af5dcde1bd43d289826@%3Cissues.activemq.apache.org%3E"
          },
          "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r61590890edcc64140e0c606954b29a063c3d08a2b41d447256d51a78@%3Cissues.activemq.apache.org%3E"
          },
          "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/raedd12dc24412b3780432bf202a2618a21a727788543e5337a458ead@%3Cissues.activemq.apache.org%3E"
          },
          "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/ra38785cfc0e7f17f8e24bebf775dd032c033fadcaea29e5bc9fffc60@%3Cdev.tika.apache.org%3E"
          },
          "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/rc1eaed7f7d774d5d02f66e49baced31e04827a1293d61a70bd003ca7@%3Cdev.tika.apache.org%3E"
          },
          "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r746fbc3fc13aee292ae6851f7a5080f592fa3a67b983c6887cdb1fc5@%3Cdev.tika.apache.org%3E"
          },
          "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/6114ce566200d76e3cc45c521a62c2c5a4eac15738248f58a99f622c@%3Cissues.activemq.apache.org%3E"
          },
          "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/479471e6debd608c837b9815b76eab24676657d4444fcfd5ef96d6e6@%3Cdev.tika.apache.org%3E"
          },
          "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/rdec0d8ac1f03e6905b0de2df1d5fcdb98b94556e4f6cccf7519fdb26@%3Cdev.tika.apache.org%3E"
          },
          "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r3a85514a518f3080ab1fc2652cfe122c2ccf67cfb32356acb1b08fe8@%3Cdev.tika.apache.org%3E"
          },
          "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/rd5dbeee4808c0f2b9b51479b50de3cc6adb1072c332a200d9107f13e@%3Cissues.activemq.apache.org%3E"
          },
          "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/277b4b5c2b0e06a825ccec565fa65bd671f35a4d58e3e2ec5d0618e1@%3Cdev.tika.apache.org%3E"
          },
          "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r3d666e4e8905157f3c046d31398b04f2bfd4519e31f266de108c6919@%3Cissues.activemq.apache.org%3E"
          },
          "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r3784834e80df2f284577a5596340fb84346c91a2dea6a073e65e3397@%3Cissues.activemq.apache.org%3E"
          },
          "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/rf2567488cfc9212b42e34c6393cfa1c14e30e4838b98dda84d71041f@%3Cdev.tika.apache.org%3E"
          },
          "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r2ce8d26154bea939536e6cf27ed02d3192bf5c5d04df885a80fe89b3@%3Cissues.activemq.apache.org%3E"
          },
          "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/rca24a281000fb681d7e26e5c031a21eb4b0593a7735f781b53dae4e2@%3Cdev.tika.apache.org%3E"
          },
          "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r4b25538be50126194cc646836c718b1a4d8f71bd9c912af5b59134ad@%3Cdev.tika.apache.org%3E"
          },
          "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r2ff63f210842a3c5e42f03a35d8f3a345134d073c80a04077341c211@%3Cissues.activemq.apache.org%3E"
          },
          "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r8418a0dff1729f19cf1024937e23a2db4c0f94f2794a423f5c10e8e7@%3Cissues.bookkeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r9fb3238cfc3222f2392ca6517353aadae18f76866157318ac562e706@%3Ccommon-issues.hadoop.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r8c392ca48bb7e50754e4bc05865e9731b23d568d18a520fe3d8c1f75@%3Ccommon-issues.hadoop.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17571.json"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r26244f9f7d9a8a27a092eb0b2a0ca9395e88fcde8b5edaeca7ce569c@%3Ccommon-issues.hadoop.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/rdb7ddf28807e27c7801f6e56a0dfb31092d34c61bdd4fa2de9182119@%3Cissues.bookkeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/reaf6b996f74f12b4557bc221abe88f58270ac583942fa41293c61f94@%3Cpluto-scm.portals.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20200110-0001"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/rbd19de368abf0764e4383ec44d527bc9870176f488a494f09a40500d@%3Ccommon-dev.hadoop.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/rcd71280585425dad7e232f239c5709e425efdd0d3de4a92f808a4767@%3Cissues.bookkeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r3bf7b982dfa0779f8a71f843d2aa6b4184a53e6be7f149ee079387fd@%3Cdev.kafka.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/rbdf18e39428b5c80fc35113470198b1fe53b287a76a46b0f8780b5fd@%3Cdev.zookeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r8a1cfd4705258c106e488091fcec85f194c82f2bbde6bd151e201870@%3Cjira.kafka.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r90c23eb8c82835fa82df85ae5e88c81fd9241e20a22971b0fb8f2c34@%3Cissues.bookkeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/rb3c94619728c8f8c176d8e175e0a1086ca737ecdfcd5a2214bb768bc@%3Ccommits.bookkeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/rf9c19bcc2f7a98a880fa3e3456c003d331812b55836b34ef648063c9@%3Cjira.kafka.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r4ac89cbecd9e298ae9fafb5afda6fa77ac75c78d1ac957837e066c4e@%3Cuser.zookeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r2756fd570b6709d55a61831ca028405bcb3e312175a60bc5d911c81f@%3Cjira.kafka.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r696507338dd5f44efc23d98cafe30f217cf3ba78e77ed1324c7a5179@%3Cjira.kafka.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r05755112a8c164abc1004bb44f198b1e3d8ca3d546a8f13ebd3aa05f@%3Cissues.zookeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r13d4b5c60ff63f3c4fab51d6ff266655be503b8a1884e2f2fab67c3a@%3Ccommon-issues.hadoop.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17571"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r3c575cabc7386e646fb12cb82b0b38ae5a6ade8a800f827107824495@%3Cjira.kafka.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/ra18a903f785aed9403aea38bc6f36844a056283c00dcfc6936b6318c@%3Cissues.bookkeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/rd3a9511eebab60e23f224841390a3f8cd5358cff605c5f7042171e47@%3Cdev.tinkerpop.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://usn.ubuntu.com/4495-1"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00008.html"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpujul2020.html"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00022.html"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r189aaeaad897f7d6b96f7c43a8ef2dfb9f6e9f8c1cc9ad182ce9b9ae@%3Cjira.kafka.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/rd6254837403e8cbfc7018baa9be29705f3f06bd007c83708f9a97679@%3Cissues.zookeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/rc628307962ae1b8cc2d21b8e4b7dd6d7755b2dd52fa56a151a27e4fd@%3Cissues.zookeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/eea03d504b36e8f870e8321d908e1def1addda16adda04327fe7c125%40%3Cdev.logging.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r3cf50d05ce8cec8c09392624b7bae750e7643dae60ef2438641ee015@%3Cissues.zookeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/rd882ab6b642fe59cbbe94dc02bd197342058208f482e57b537940a4b@%3Cpluto-dev.portals.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r8c6300245c0bcef095e9f07b48157e2c6471df0816db3408fcf1d748@%3Ccommon-issues.hadoop.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/ra54fa49be3e773d99ccc9c2a422311cf77e3ecd3b8594ee93043a6b1@%3Cdev.zookeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r356d57d6225f91fdc30f8b0a2bed229d1ece55e16e552878c5fa809a@%3Cissues.zookeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r7f462c69d5ded4c0223e014d95a3496690423c5f6f05c09e2f2a407a@%3Cjira.kafka.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r71e26f9c2d5826c6f95ad60f7d052d75e1e70b0d2dd853db6fc26d5f@%3Cjira.kafka.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r1b7734dfdfd938640f2f5fb6f4231a267145c71ed60cc7faa1cbac07@%3Ccommon-issues.hadoop.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/rda4849c6823dd3e83c7a356eb883180811d5c28359fe46865fd151c3@%3Cusers.kafka.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r3543ead2317dcd3306f69ee37b07dd383dbba6e2f47ff11eb55879ad@%3Cusers.activemq.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/564f03b4e9511fcba29c68fc0299372dadbdb002718fa8edcc4325e4@%3Cjira.kafka.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r944183c871594fe9a555b8519a7c945bbcf6714d72461aa6c929028f@%3Cissues.zookeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r6b45a2fcc8e98ac93a179183dbb7f340027bdb8e3ab393418076b153@%3Ccommon-issues.hadoop.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r6aec6b8f70167fa325fb98b3b5c9ce0ffaed026e697b69b85ac24628@%3Cissues.zookeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r8d78a0fbb56d505461e29868d1026e98c402e6a568c13a6da67896a2@%3Cdev.jena.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r594411f4bddebaf48a4c70266d0b7849e0d82bb72826f61b3a35bba7@%3Cissues.bookkeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/ra9611a8431cb62369bce8909d7645597e1dd45c24b448836b1e54940@%3Cissues.bookkeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/rc17d8491beee51607693019857e41e769795366b85be00aa2f4b3159@%3Cnotifications.zookeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r909b8e3a36913944d3b7bafe9635d4ca84f8f0e2cd146a1784f667c2@%3Cissues.zookeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r9a9e3b42cd5d1c4536a14ef04f75048dec8e2740ac6a138ea912177f@%3Cpluto-dev.portals.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r6d34da5a0ca17ab08179a30c971446c7421af0e96f6d60867eabfc52@%3Cissues.bookkeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r9d0d03f2e7d9e13c68b530f81d02b0fec33133edcf27330d8089fcfb@%3Cissues.zookeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/rf77f79699c8d7e430c14cf480f12ed1297e6e8cf2ed379a425941e80@%3Cpluto-dev.portals.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r6236b5f8646d48af8b66d5050f288304016840788e508c883356fe0e@%3Clog4j-user.logging.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/rfdf65fa675c64a64459817344e0e6c44d51ee264beea6e5851fb60dc@%3Cissues.bookkeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r9d2e28e71f91ba0b6f4114c8ecd96e2b1f7e0d06bdf8eb768c183aa9@%3Ccommon-issues.hadoop.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://www.debian.org/security/2020/dsa-4686"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r5c084578b3e3b40bd903c9d9e525097421bcd88178e672f612102eb2@%3Cjira.kafka.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/rd7805c1bf9388968508c6c8f84588773216e560055ddcc813d19f347@%3Ccommon-issues.hadoop.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/752ec92cd1e334a639e79bfbd689a4ec2c6579ec5bb41b53ffdf358d@%3Cdev.kafka.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r107c8737db39ec9ec4f4e7147b249e29be79170b9ef4b80528105a2d@%3Cdev.zookeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/re36da78e4f3955ba6c1c373a2ab85a4deb215ca74b85fcd66142fea1@%3Cissues.bookkeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/rf1b434e11834a4449cd7addb69ed0aef0923112b5938182b363a968c@%3Cnotifications.zookeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r7a1acc95373105169bd44df710c2f462cad31fb805364d2958a5ee03@%3Cjira.kafka.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/rf53eeefb7e7e524deaacb9f8671cbf01b8a253e865fb94e7656722c0@%3Cissues.bookkeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "source": {
            "url": "https://lists.apache.org/thread.html/rdf2a0d94c3b5b523aeff7741ae71347415276062811b687f30ea6573@%3Ccommits.zookeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://lists.apache.org/thread.html/r48d5019bd42e0770f7e5351e420a63a41ff1f16924942442c6aff6a8@%3Ccommits.zookeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26%40%3Ccommits.pulsar.apache.org%3E"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://lists.apache.org/thread.html/r8e3f7da12bf5750b0a02e69a78a61073a2ac950eed7451ce70a65177@%3Ccommits.zookeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2019:1545"
          },
          "vector": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:07Z/"
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2017:2633"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2017:2638"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2017:1802"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2019:1545"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0507"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2017:2810"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2017:3400"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2017:3399"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0497"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2017:2888"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2017:2811"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2017:3244"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:5053"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2017:1801"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2017:2889"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2017:2423"
          }
        }
      ],
      "references": [
        {
          "id": "",
          "source": {
            "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00022.html"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17571.json"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17571"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17571"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/277b4b5c2b0e06a825ccec565fa65bd671f35a4d58e3e2ec5d0618e1%40%3Cdev.tika.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/277b4b5c2b0e06a825ccec565fa65bd671f35a4d58e3e2ec5d0618e1@%3Cdev.tika.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/44491fb9cc19acc901f7cff34acb7376619f15638439416e3e14761c%40%3Cdev.tika.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/44491fb9cc19acc901f7cff34acb7376619f15638439416e3e14761c@%3Cdev.tika.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/479471e6debd608c837b9815b76eab24676657d4444fcfd5ef96d6e6%40%3Cdev.tika.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/479471e6debd608c837b9815b76eab24676657d4444fcfd5ef96d6e6@%3Cdev.tika.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/564f03b4e9511fcba29c68fc0299372dadbdb002718fa8edcc4325e4%40%3Cjira.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/564f03b4e9511fcba29c68fc0299372dadbdb002718fa8edcc4325e4@%3Cjira.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/6114ce566200d76e3cc45c521a62c2c5a4eac15738248f58a99f622c%40%3Cissues.activemq.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/6114ce566200d76e3cc45c521a62c2c5a4eac15738248f58a99f622c@%3Cissues.activemq.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/752ec92cd1e334a639e79bfbd689a4ec2c6579ec5bb41b53ffdf358d%40%3Cdev.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/752ec92cd1e334a639e79bfbd689a4ec2c6579ec5bb41b53ffdf358d@%3Cdev.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/8ab32b4c9f1826f20add7c40be08909de9f58a89dc1de9c09953f5ac%40%3Cissues.activemq.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/8ab32b4c9f1826f20add7c40be08909de9f58a89dc1de9c09953f5ac@%3Cissues.activemq.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/eea03d504b36e8f870e8321d908e1def1addda16adda04327fe7c125%40%3Cdev.logging.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r05755112a8c164abc1004bb44f198b1e3d8ca3d546a8f13ebd3aa05f%40%3Cissues.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r05755112a8c164abc1004bb44f198b1e3d8ca3d546a8f13ebd3aa05f@%3Cissues.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r107c8737db39ec9ec4f4e7147b249e29be79170b9ef4b80528105a2d%40%3Cdev.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r107c8737db39ec9ec4f4e7147b249e29be79170b9ef4b80528105a2d@%3Cdev.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r13d4b5c60ff63f3c4fab51d6ff266655be503b8a1884e2f2fab67c3a%40%3Ccommon-issues.hadoop.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r13d4b5c60ff63f3c4fab51d6ff266655be503b8a1884e2f2fab67c3a@%3Ccommon-issues.hadoop.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r189aaeaad897f7d6b96f7c43a8ef2dfb9f6e9f8c1cc9ad182ce9b9ae%40%3Cjira.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r189aaeaad897f7d6b96f7c43a8ef2dfb9f6e9f8c1cc9ad182ce9b9ae@%3Cjira.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r18f1c010b554a3a2d761e8ffffd8674fd4747bcbcf16c643d708318c%40%3Cissues.activemq.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r18f1c010b554a3a2d761e8ffffd8674fd4747bcbcf16c643d708318c@%3Cissues.activemq.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r1b7734dfdfd938640f2f5fb6f4231a267145c71ed60cc7faa1cbac07%40%3Ccommon-issues.hadoop.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r1b7734dfdfd938640f2f5fb6f4231a267145c71ed60cc7faa1cbac07@%3Ccommon-issues.hadoop.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r26244f9f7d9a8a27a092eb0b2a0ca9395e88fcde8b5edaeca7ce569c%40%3Ccommon-issues.hadoop.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r26244f9f7d9a8a27a092eb0b2a0ca9395e88fcde8b5edaeca7ce569c@%3Ccommon-issues.hadoop.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe%40%3Cusers.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r2756fd570b6709d55a61831ca028405bcb3e312175a60bc5d911c81f%40%3Cjira.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r2756fd570b6709d55a61831ca028405bcb3e312175a60bc5d911c81f@%3Cjira.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r2ce8d26154bea939536e6cf27ed02d3192bf5c5d04df885a80fe89b3%40%3Cissues.activemq.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r2ce8d26154bea939536e6cf27ed02d3192bf5c5d04df885a80fe89b3@%3Cissues.activemq.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r2ff63f210842a3c5e42f03a35d8f3a345134d073c80a04077341c211%40%3Cissues.activemq.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r2ff63f210842a3c5e42f03a35d8f3a345134d073c80a04077341c211@%3Cissues.activemq.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r3543ead2317dcd3306f69ee37b07dd383dbba6e2f47ff11eb55879ad%40%3Cusers.activemq.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r3543ead2317dcd3306f69ee37b07dd383dbba6e2f47ff11eb55879ad@%3Cusers.activemq.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r356d57d6225f91fdc30f8b0a2bed229d1ece55e16e552878c5fa809a%40%3Cissues.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r356d57d6225f91fdc30f8b0a2bed229d1ece55e16e552878c5fa809a@%3Cissues.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r3784834e80df2f284577a5596340fb84346c91a2dea6a073e65e3397%40%3Cissues.activemq.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r3784834e80df2f284577a5596340fb84346c91a2dea6a073e65e3397@%3Cissues.activemq.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r3a85514a518f3080ab1fc2652cfe122c2ccf67cfb32356acb1b08fe8%40%3Cdev.tika.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r3a85514a518f3080ab1fc2652cfe122c2ccf67cfb32356acb1b08fe8@%3Cdev.tika.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r3bf7b982dfa0779f8a71f843d2aa6b4184a53e6be7f149ee079387fd%40%3Cdev.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r3bf7b982dfa0779f8a71f843d2aa6b4184a53e6be7f149ee079387fd@%3Cdev.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r3c575cabc7386e646fb12cb82b0b38ae5a6ade8a800f827107824495%40%3Cjira.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r3c575cabc7386e646fb12cb82b0b38ae5a6ade8a800f827107824495@%3Cjira.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r3cf50d05ce8cec8c09392624b7bae750e7643dae60ef2438641ee015%40%3Cissues.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r3cf50d05ce8cec8c09392624b7bae750e7643dae60ef2438641ee015@%3Cissues.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r3d666e4e8905157f3c046d31398b04f2bfd4519e31f266de108c6919%40%3Cissues.activemq.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r3d666e4e8905157f3c046d31398b04f2bfd4519e31f266de108c6919@%3Cissues.activemq.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r48d5019bd42e0770f7e5351e420a63a41ff1f16924942442c6aff6a8%40%3Ccommits.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r48d5019bd42e0770f7e5351e420a63a41ff1f16924942442c6aff6a8@%3Ccommits.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r48efc7cb5aeb4e1f67aaa06fb4b5479a5635d12f07d0b93fc2d08809%40%3Ccommits.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r48efc7cb5aeb4e1f67aaa06fb4b5479a5635d12f07d0b93fc2d08809@%3Ccommits.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r4ac89cbecd9e298ae9fafb5afda6fa77ac75c78d1ac957837e066c4e%40%3Cuser.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r4ac89cbecd9e298ae9fafb5afda6fa77ac75c78d1ac957837e066c4e@%3Cuser.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r4b25538be50126194cc646836c718b1a4d8f71bd9c912af5b59134ad%40%3Cdev.tika.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r4b25538be50126194cc646836c718b1a4d8f71bd9c912af5b59134ad@%3Cdev.tika.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r52a5129df402352adc34d052bab9234c8ef63596306506a89fdc7328%40%3Cusers.activemq.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r52a5129df402352adc34d052bab9234c8ef63596306506a89fdc7328@%3Cusers.activemq.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r594411f4bddebaf48a4c70266d0b7849e0d82bb72826f61b3a35bba7%40%3Cissues.bookkeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r594411f4bddebaf48a4c70266d0b7849e0d82bb72826f61b3a35bba7@%3Cissues.bookkeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r5c084578b3e3b40bd903c9d9e525097421bcd88178e672f612102eb2%40%3Cjira.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r5c084578b3e3b40bd903c9d9e525097421bcd88178e672f612102eb2@%3Cjira.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r61590890edcc64140e0c606954b29a063c3d08a2b41d447256d51a78%40%3Cissues.activemq.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r61590890edcc64140e0c606954b29a063c3d08a2b41d447256d51a78@%3Cissues.activemq.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r6236b5f8646d48af8b66d5050f288304016840788e508c883356fe0e%40%3Clog4j-user.logging.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r6236b5f8646d48af8b66d5050f288304016840788e508c883356fe0e@%3Clog4j-user.logging.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r681b4432d0605f327b68b9f8a42662993e699d04614de4851c35ffd1%40%3Cdev.tika.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r681b4432d0605f327b68b9f8a42662993e699d04614de4851c35ffd1@%3Cdev.tika.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r696507338dd5f44efc23d98cafe30f217cf3ba78e77ed1324c7a5179%40%3Cjira.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r696507338dd5f44efc23d98cafe30f217cf3ba78e77ed1324c7a5179@%3Cjira.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r6aec6b8f70167fa325fb98b3b5c9ce0ffaed026e697b69b85ac24628%40%3Cissues.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r6aec6b8f70167fa325fb98b3b5c9ce0ffaed026e697b69b85ac24628@%3Cissues.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r6b45a2fcc8e98ac93a179183dbb7f340027bdb8e3ab393418076b153%40%3Ccommon-issues.hadoop.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r6b45a2fcc8e98ac93a179183dbb7f340027bdb8e3ab393418076b153@%3Ccommon-issues.hadoop.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r6d34da5a0ca17ab08179a30c971446c7421af0e96f6d60867eabfc52%40%3Cissues.bookkeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r6d34da5a0ca17ab08179a30c971446c7421af0e96f6d60867eabfc52@%3Cissues.bookkeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r71e26f9c2d5826c6f95ad60f7d052d75e1e70b0d2dd853db6fc26d5f%40%3Cjira.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r71e26f9c2d5826c6f95ad60f7d052d75e1e70b0d2dd853db6fc26d5f@%3Cjira.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r746fbc3fc13aee292ae6851f7a5080f592fa3a67b983c6887cdb1fc5%40%3Cdev.tika.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r746fbc3fc13aee292ae6851f7a5080f592fa3a67b983c6887cdb1fc5@%3Cdev.tika.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r7a1acc95373105169bd44df710c2f462cad31fb805364d2958a5ee03%40%3Cjira.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r7a1acc95373105169bd44df710c2f462cad31fb805364d2958a5ee03@%3Cjira.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r7bcdc710857725c311b856c0b82cee6207178af5dcde1bd43d289826%40%3Cissues.activemq.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r7bcdc710857725c311b856c0b82cee6207178af5dcde1bd43d289826@%3Cissues.activemq.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r7f462c69d5ded4c0223e014d95a3496690423c5f6f05c09e2f2a407a%40%3Cjira.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r7f462c69d5ded4c0223e014d95a3496690423c5f6f05c09e2f2a407a@%3Cjira.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd%40%3Cusers.activemq.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r8418a0dff1729f19cf1024937e23a2db4c0f94f2794a423f5c10e8e7%40%3Cissues.bookkeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r8418a0dff1729f19cf1024937e23a2db4c0f94f2794a423f5c10e8e7@%3Cissues.bookkeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r8890b8f18f1de821595792b58b968a89692a255bc20d86d395270740%40%3Ccommits.druid.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r8890b8f18f1de821595792b58b968a89692a255bc20d86d395270740@%3Ccommits.druid.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r8a1cfd4705258c106e488091fcec85f194c82f2bbde6bd151e201870%40%3Cjira.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r8a1cfd4705258c106e488091fcec85f194c82f2bbde6bd151e201870@%3Cjira.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r8c392ca48bb7e50754e4bc05865e9731b23d568d18a520fe3d8c1f75%40%3Ccommon-issues.hadoop.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r8c392ca48bb7e50754e4bc05865e9731b23d568d18a520fe3d8c1f75@%3Ccommon-issues.hadoop.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r8c6300245c0bcef095e9f07b48157e2c6471df0816db3408fcf1d748%40%3Ccommon-issues.hadoop.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r8c6300245c0bcef095e9f07b48157e2c6471df0816db3408fcf1d748@%3Ccommon-issues.hadoop.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r8d78a0fbb56d505461e29868d1026e98c402e6a568c13a6da67896a2%40%3Cdev.jena.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r8d78a0fbb56d505461e29868d1026e98c402e6a568c13a6da67896a2@%3Cdev.jena.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r8e3f7da12bf5750b0a02e69a78a61073a2ac950eed7451ce70a65177%40%3Ccommits.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r8e3f7da12bf5750b0a02e69a78a61073a2ac950eed7451ce70a65177@%3Ccommits.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r909b8e3a36913944d3b7bafe9635d4ca84f8f0e2cd146a1784f667c2%40%3Cissues.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r909b8e3a36913944d3b7bafe9635d4ca84f8f0e2cd146a1784f667c2@%3Cissues.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r90c23eb8c82835fa82df85ae5e88c81fd9241e20a22971b0fb8f2c34%40%3Cissues.bookkeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r90c23eb8c82835fa82df85ae5e88c81fd9241e20a22971b0fb8f2c34@%3Cissues.bookkeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r944183c871594fe9a555b8519a7c945bbcf6714d72461aa6c929028f%40%3Cissues.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r944183c871594fe9a555b8519a7c945bbcf6714d72461aa6c929028f@%3Cissues.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r9a9e3b42cd5d1c4536a14ef04f75048dec8e2740ac6a138ea912177f%40%3Cpluto-dev.portals.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r9a9e3b42cd5d1c4536a14ef04f75048dec8e2740ac6a138ea912177f@%3Cpluto-dev.portals.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r9d0d03f2e7d9e13c68b530f81d02b0fec33133edcf27330d8089fcfb%40%3Cissues.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r9d0d03f2e7d9e13c68b530f81d02b0fec33133edcf27330d8089fcfb@%3Cissues.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r9d2e28e71f91ba0b6f4114c8ecd96e2b1f7e0d06bdf8eb768c183aa9%40%3Ccommon-issues.hadoop.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r9d2e28e71f91ba0b6f4114c8ecd96e2b1f7e0d06bdf8eb768c183aa9@%3Ccommon-issues.hadoop.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r9dc2505651788ac668299774d9e7af4dc616be2f56fdc684d1170882%40%3Cusers.activemq.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r9dc2505651788ac668299774d9e7af4dc616be2f56fdc684d1170882@%3Cusers.activemq.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r9fb3238cfc3222f2392ca6517353aadae18f76866157318ac562e706%40%3Ccommon-issues.hadoop.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r9fb3238cfc3222f2392ca6517353aadae18f76866157318ac562e706@%3Ccommon-issues.hadoop.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/ra18a903f785aed9403aea38bc6f36844a056283c00dcfc6936b6318c%40%3Cissues.bookkeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/ra18a903f785aed9403aea38bc6f36844a056283c00dcfc6936b6318c@%3Cissues.bookkeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/ra38785cfc0e7f17f8e24bebf775dd032c033fadcaea29e5bc9fffc60%40%3Cdev.tika.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/ra38785cfc0e7f17f8e24bebf775dd032c033fadcaea29e5bc9fffc60@%3Cdev.tika.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/ra54fa49be3e773d99ccc9c2a422311cf77e3ecd3b8594ee93043a6b1%40%3Cdev.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/ra54fa49be3e773d99ccc9c2a422311cf77e3ecd3b8594ee93043a6b1@%3Cdev.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/ra9611a8431cb62369bce8909d7645597e1dd45c24b448836b1e54940%40%3Cissues.bookkeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/ra9611a8431cb62369bce8909d7645597e1dd45c24b448836b1e54940@%3Cissues.bookkeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/raedd12dc24412b3780432bf202a2618a21a727788543e5337a458ead%40%3Cissues.activemq.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/raedd12dc24412b3780432bf202a2618a21a727788543e5337a458ead@%3Cissues.activemq.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rb1b29aee737e1c37fe1d48528cb0febac4f5deed51f5412e6fdfe2bf%40%3Cissues.activemq.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rb1b29aee737e1c37fe1d48528cb0febac4f5deed51f5412e6fdfe2bf@%3Cissues.activemq.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rb3c94619728c8f8c176d8e175e0a1086ca737ecdfcd5a2214bb768bc%40%3Ccommits.bookkeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rb3c94619728c8f8c176d8e175e0a1086ca737ecdfcd5a2214bb768bc@%3Ccommits.bookkeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rbc45eb0f53fd6242af3e666c2189464f848a851d408289840cecc6e3%40%3Ccommits.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rbc45eb0f53fd6242af3e666c2189464f848a851d408289840cecc6e3@%3Ccommits.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rbd19de368abf0764e4383ec44d527bc9870176f488a494f09a40500d%40%3Ccommon-dev.hadoop.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rbd19de368abf0764e4383ec44d527bc9870176f488a494f09a40500d@%3Ccommon-dev.hadoop.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rbdf18e39428b5c80fc35113470198b1fe53b287a76a46b0f8780b5fd%40%3Cdev.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rbdf18e39428b5c80fc35113470198b1fe53b287a76a46b0f8780b5fd@%3Cdev.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rc17d8491beee51607693019857e41e769795366b85be00aa2f4b3159%40%3Cnotifications.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rc17d8491beee51607693019857e41e769795366b85be00aa2f4b3159@%3Cnotifications.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rc1eaed7f7d774d5d02f66e49baced31e04827a1293d61a70bd003ca7%40%3Cdev.tika.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rc1eaed7f7d774d5d02f66e49baced31e04827a1293d61a70bd003ca7@%3Cdev.tika.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rc628307962ae1b8cc2d21b8e4b7dd6d7755b2dd52fa56a151a27e4fd%40%3Cissues.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rc628307962ae1b8cc2d21b8e4b7dd6d7755b2dd52fa56a151a27e4fd@%3Cissues.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rca24a281000fb681d7e26e5c031a21eb4b0593a7735f781b53dae4e2%40%3Cdev.tika.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rca24a281000fb681d7e26e5c031a21eb4b0593a7735f781b53dae4e2@%3Cdev.tika.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rcd71280585425dad7e232f239c5709e425efdd0d3de4a92f808a4767%40%3Cissues.bookkeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rcd71280585425dad7e232f239c5709e425efdd0d3de4a92f808a4767@%3Cissues.bookkeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26%40%3Ccommits.pulsar.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rd3a9511eebab60e23f224841390a3f8cd5358cff605c5f7042171e47%40%3Cdev.tinkerpop.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rd3a9511eebab60e23f224841390a3f8cd5358cff605c5f7042171e47@%3Cdev.tinkerpop.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rd5dbeee4808c0f2b9b51479b50de3cc6adb1072c332a200d9107f13e%40%3Cissues.activemq.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rd5dbeee4808c0f2b9b51479b50de3cc6adb1072c332a200d9107f13e@%3Cissues.activemq.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rd6254837403e8cbfc7018baa9be29705f3f06bd007c83708f9a97679%40%3Cissues.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rd6254837403e8cbfc7018baa9be29705f3f06bd007c83708f9a97679@%3Cissues.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rd7805c1bf9388968508c6c8f84588773216e560055ddcc813d19f347%40%3Ccommon-issues.hadoop.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rd7805c1bf9388968508c6c8f84588773216e560055ddcc813d19f347@%3Ccommon-issues.hadoop.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rd882ab6b642fe59cbbe94dc02bd197342058208f482e57b537940a4b%40%3Cpluto-dev.portals.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rd882ab6b642fe59cbbe94dc02bd197342058208f482e57b537940a4b@%3Cpluto-dev.portals.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rda4849c6823dd3e83c7a356eb883180811d5c28359fe46865fd151c3%40%3Cusers.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rda4849c6823dd3e83c7a356eb883180811d5c28359fe46865fd151c3@%3Cusers.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rdb7ddf28807e27c7801f6e56a0dfb31092d34c61bdd4fa2de9182119%40%3Cissues.bookkeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rdb7ddf28807e27c7801f6e56a0dfb31092d34c61bdd4fa2de9182119@%3Cissues.bookkeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rdec0d8ac1f03e6905b0de2df1d5fcdb98b94556e4f6cccf7519fdb26%40%3Cdev.tika.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rdec0d8ac1f03e6905b0de2df1d5fcdb98b94556e4f6cccf7519fdb26@%3Cdev.tika.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rdf2a0d94c3b5b523aeff7741ae71347415276062811b687f30ea6573%40%3Ccommits.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rdf2a0d94c3b5b523aeff7741ae71347415276062811b687f30ea6573@%3Ccommits.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/re36da78e4f3955ba6c1c373a2ab85a4deb215ca74b85fcd66142fea1%40%3Cissues.bookkeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/re36da78e4f3955ba6c1c373a2ab85a4deb215ca74b85fcd66142fea1@%3Cissues.bookkeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/re8c21ed9dd218c217d242ffa90778428e446b082b5e1c29f567e8374%40%3Cissues.activemq.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/re8c21ed9dd218c217d242ffa90778428e446b082b5e1c29f567e8374@%3Cissues.activemq.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/reaf6b996f74f12b4557bc221abe88f58270ac583942fa41293c61f94%40%3Cpluto-scm.portals.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/reaf6b996f74f12b4557bc221abe88f58270ac583942fa41293c61f94@%3Cpluto-scm.portals.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rec34b1cccf907898e7cb36051ffac3ccf1ea89d0b261a2a3b3fb267f%40%3Ccommits.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rec34b1cccf907898e7cb36051ffac3ccf1ea89d0b261a2a3b3fb267f@%3Ccommits.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rf1b434e11834a4449cd7addb69ed0aef0923112b5938182b363a968c%40%3Cnotifications.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rf1b434e11834a4449cd7addb69ed0aef0923112b5938182b363a968c@%3Cnotifications.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rf2567488cfc9212b42e34c6393cfa1c14e30e4838b98dda84d71041f%40%3Cdev.tika.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rf2567488cfc9212b42e34c6393cfa1c14e30e4838b98dda84d71041f@%3Cdev.tika.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rf53eeefb7e7e524deaacb9f8671cbf01b8a253e865fb94e7656722c0%40%3Cissues.bookkeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rf53eeefb7e7e524deaacb9f8671cbf01b8a253e865fb94e7656722c0@%3Cissues.bookkeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rf77f79699c8d7e430c14cf480f12ed1297e6e8cf2ed379a425941e80%40%3Cpluto-dev.portals.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rf77f79699c8d7e430c14cf480f12ed1297e6e8cf2ed379a425941e80@%3Cpluto-dev.portals.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rf9c19bcc2f7a98a880fa3e3456c003d331812b55836b34ef648063c9%40%3Cjira.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rf9c19bcc2f7a98a880fa3e3456c003d331812b55836b34ef648063c9@%3Cjira.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rfdf65fa675c64a64459817344e0e6c44d51ee264beea6e5851fb60dc%40%3Cissues.bookkeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rfdf65fa675c64a64459817344e0e6c44d51ee264beea6e5851fb60dc@%3Cissues.bookkeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00008.html"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20200110-0001"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20200110-0001/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://usn.ubuntu.com/4495-1"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://usn.ubuntu.com/4495-1/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.debian.org/security/2020/dsa-4686"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpujul2020.html"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
          }
        },
        {
          "id": "1785616",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1785616"
          }
        },
        {
          "id": "947124",
          "source": {
            "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947124"
          }
        },
        {
          "id": "CVE-2019-17571",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17571"
          }
        },
        {
          "id": "GHSA-2qrg-x229-3v8q",
          "source": {
            "url": "https://github.com/advisories/GHSA-2qrg-x229-3v8q"
          }
        },
        {
          "id": "GLSA-202402-16",
          "source": {
            "url": "https://security.gentoo.org/glsa/202402-16"
          }
        },
        {
          "id": "RHSA-2017:1801",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2017:1801"
          }
        },
        {
          "id": "RHSA-2017:1802",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2017:1802"
          }
        },
        {
          "id": "RHSA-2017:2423",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2017:2423"
          }
        },
        {
          "id": "RHSA-2017:2633",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2017:2633"
          }
        },
        {
          "id": "RHSA-2017:2638",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2017:2638"
          }
        },
        {
          "id": "RHSA-2017:2810",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2017:2810"
          }
        },
        {
          "id": "RHSA-2017:2811",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2017:2811"
          }
        },
        {
          "id": "RHSA-2017:2888",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2017:2888"
          }
        },
        {
          "id": "RHSA-2017:2889",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2017:2889"
          }
        },
        {
          "id": "RHSA-2017:3244",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2017:3244"
          }
        },
        {
          "id": "RHSA-2017:3399",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2017:3399"
          }
        },
        {
          "id": "RHSA-2017:3400",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2017:3400"
          }
        },
        {
          "id": "RHSA-2019:1545",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2019:1545"
          }
        },
        {
          "id": "RHSA-2022:0497",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0497"
          }
        },
        {
          "id": "RHSA-2022:0507",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0507"
          }
        },
        {
          "id": "RHSA-2022:5053",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:5053"
          }
        },
        {
          "id": "USN-5998-1",
          "source": {
            "url": "https://usn.ubuntu.com/5998-1/"
          }
        },
        {
          "id": "cpe:2.3:a:apache:bookkeeper:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:bookkeeper:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:netapp:oncommand_system_manager:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_system_manager:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_network_integrity:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_integrity:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:endeca_information_discovery_studio:3.2.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:endeca_information_discovery_studio:3.2.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:financial_services_lending_and_leasing:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:financial_services_lending_and_leasing:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:financial_services_lending_and_leasing:12.5.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:financial_services_lending_and_leasing:12.5.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:rapid_planning:12.1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:rapid_planning:12.1:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:rapid_planning:12.2:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:rapid_planning:12.2:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_extract_transform_and_load:19.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_extract_transform_and_load:19.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_service_backbone:14.1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_service_backbone:14.1:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_service_backbone:15.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_service_backbone:15.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_service_backbone:16.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_service_backbone:16.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
          }
        }
      ],
      "source": {
        "name": "VulnerableCode",
        "url": "http://public.vulnerablecode.io/vulnerabilities/VCID-hh72-ne73-aaak"
      }
    },
    {
      "affects": [
        {
          "ref": "pkg:pypi/sqlparse@0.4.2"
        }
      ],
      "bom-ref": "BomRef.5324634893283979.6380128762422616",
      "description": "sqlparse contains a regular expression that is vulnerable to Regular Expression Denial of Service",
      "id": "VCID-jqv2-g2zj-aaae",
      "ratings": [
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-30608"
          },
          "vector": "0.42219"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-30608"
          },
          "vector": "0.42304"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-30608"
          },
          "vector": "0.42328"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-30608"
          },
          "vector": "0.42485"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-30608"
          },
          "vector": "0.46427"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-30608"
          },
          "vector": "0.46432"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-30608"
          },
          "vector": "0.46433"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-30608"
          },
          "vector": "0.46453"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-30608"
          },
          "vector": "0.46469"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-30608"
          },
          "vector": "0.50164"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-30608"
          },
          "vector": "0.50206"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-30608"
          },
          "vector": "0.50261"
        },
        {
          "score": 5.4,
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:6818"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"
        },
        {
          "score": 5.5,
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/sqlparse/PYSEC-2023-87.yaml"
          },
          "vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
        },
        {
          "score": 5.5,
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          },
          "vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
        },
        {
          "score": 5.5,
          "source": {
            "url": "https://github.com/andialbrecht/sqlparse"
          },
          "vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
        },
        {
          "score": 5.5,
          "source": {
            "url": "https://github.com/andialbrecht/sqlparse/commit/e75e35869473832a1eb67772b1adfee2db11b85a"
          },
          "vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
        },
        {
          "score": 5.5,
          "source": {
            "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00017.html"
          },
          "vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
        },
        {
          "score": 5.5,
          "source": {
            "url": "https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS"
          },
          "vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
        },
        {
          "score": 5.5,
          "source": {
            "url": "https://github.com/andialbrecht/sqlparse/commit/c457abd5f097dd13fb21543381e7cfafe7d31cfb"
          },
          "vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-30608"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-30608.json"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "source": {
            "url": "https://github.com/andialbrecht/sqlparse/security/advisories/GHSA-rrm6-wvj7-cwh2"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00017.html"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/advisories/GHSA-rrm6-wvj7-cwh2"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/andialbrecht/sqlparse"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/andialbrecht/sqlparse/commit/c457abd5f097dd13fb21543381e7cfafe7d31cfb"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/sqlparse/PYSEC-2023-87.yaml"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/andialbrecht/sqlparse/commit/e75e35869473832a1eb67772b1adfee2db11b85a"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:6818"
          },
          "vector": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-11T19:42:07Z/"
        }
      ],
      "references": [
        {
          "id": "",
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-30608.json"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-30608"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30608"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/andialbrecht/sqlparse"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/andialbrecht/sqlparse/commit/c457abd5f097dd13fb21543381e7cfafe7d31cfb"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/andialbrecht/sqlparse/commit/e75e35869473832a1eb67772b1adfee2db11b85a"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/sqlparse/PYSEC-2023-87.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00017.html"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS"
          }
        },
        {
          "id": "1034615",
          "source": {
            "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034615"
          }
        },
        {
          "id": "2187903",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187903"
          }
        },
        {
          "id": "CVE-2023-30608",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-30608"
          }
        },
        {
          "id": "GHSA-rrm6-wvj7-cwh2",
          "source": {
            "url": "https://github.com/advisories/GHSA-rrm6-wvj7-cwh2"
          }
        },
        {
          "id": "GHSA-rrm6-wvj7-cwh2",
          "source": {
            "url": "https://github.com/andialbrecht/sqlparse/security/advisories/GHSA-rrm6-wvj7-cwh2"
          }
        },
        {
          "id": "RHSA-2023:4591",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:4591"
          }
        },
        {
          "id": "RHSA-2023:6818",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:6818"
          }
        },
        {
          "id": "USN-6064-1",
          "source": {
            "url": "https://usn.ubuntu.com/6064-1/"
          }
        },
        {
          "id": "cpe:2.3:a:sqlparse_project:sqlparse:*:*:*:*:*:python:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlparse_project:sqlparse:*:*:*:*:*:python:*:*"
          }
        },
        {
          "id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
          }
        }
      ],
      "source": {
        "name": "VulnerableCode",
        "url": "http://public.vulnerablecode.io/vulnerabilities/VCID-jqv2-g2zj-aaae"
      }
    },
    {
      "affects": [
        {
          "ref": "pkg:pypi/django@4.0.8"
        }
      ],
      "bom-ref": "BomRef.1335333918245024.4750219707247325",
      "description": "Resource exhaustion in Django",
      "id": "VCID-khvz-sgc7-aaak",
      "ratings": [
        {
          "severity": "high",
          "source": {
            "url": "https://www.djangoproject.com/weblog/2023/feb/14/security-releases"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/django/django/commit/a665ed5179f5bbd3db95ce67286d0192eff041d8"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FKYVMMR7RPM6AHJ2SBVM2LO6D3NGFY7B"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2023-13.yaml"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://docs.djangoproject.com/en/4.1/releases/security"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://groups.google.com/forum/#!forum/django-announce"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VZS4G6NSZWPTVXMMZHJOJVQEPL3QTO77"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/django/django/commit/628b33a854a9c68ec8a0c51f382f304a0044ec92"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00023.html"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YJB6FUBBLVKKG655UMTLQNN6UQ6EDLSP"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "http://www.openwall.com/lists/oss-security/2023/02/14/1"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/django/django/commit/83f1ea83e4553e211c1c5a0dfc197b66d4e50432"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/advisories/GHSA-2hrw-hx67-34x6"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20230316-0006"
          },
          "vector": ""
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-24580"
          },
          "vector": "0.72537"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-24580"
          },
          "vector": "0.72697"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-24580"
          },
          "vector": "0.72736"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-24580"
          },
          "vector": "0.72747"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-24580"
          },
          "vector": "0.72790"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-24580"
          },
          "vector": "0.72791"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-24580"
          },
          "vector": "0.72793"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-24580"
          },
          "vector": "0.72800"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-24580"
          },
          "vector": "0.72801"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-24580"
          },
          "vector": "0.72871"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-24580"
          },
          "vector": "0.72885"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-24580"
          },
          "vector": "0.72916"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://groups.google.com/forum/#%21forum/django-announce"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://github.com/django/django"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2023-13.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VZS4G6NSZWPTVXMMZHJOJVQEPL3QTO77"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00023.html"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/django/django/commit/628b33a854a9c68ec8a0c51f382f304a0044ec92"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://groups.google.com/forum/#!forum/django-announce"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20230316-0006"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/django/django/commit/a665ed5179f5bbd3db95ce67286d0192eff041d8"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FKYVMMR7RPM6AHJ2SBVM2LO6D3NGFY7B"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://www.djangoproject.com/weblog/2023/feb/14/security-releases"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YJB6FUBBLVKKG655UMTLQNN6UQ6EDLSP"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "http://www.openwall.com/lists/oss-security/2023/02/14/1"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/django/django/commit/83f1ea83e4553e211c1c5a0dfc197b66d4e50432"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://docs.djangoproject.com/en/4.1/releases/security"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-24580.json"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24580"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "source": {
            "url": "https://github.com/django/django"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://groups.google.com/forum/#%21forum/django-announce"
          },
          "vector": ""
        }
      ],
      "references": [
        {
          "id": "",
          "source": {
            "url": "http://www.openwall.com/lists/oss-security/2023/02/14/1"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-24580.json"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-24580"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24580"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://docs.djangoproject.com/en/4.1/releases/security"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://docs.djangoproject.com/en/4.1/releases/security/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/django/django"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/django/django/commit/628b33a854a9c68ec8a0c51f382f304a0044ec92"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/django/django/commit/83f1ea83e4553e211c1c5a0dfc197b66d4e50432"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/django/django/commit/a665ed5179f5bbd3db95ce67286d0192eff041d8"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2023-13.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://groups.google.com/forum/#!forum/django-announce"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://groups.google.com/forum/#%21forum/django-announce"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00023.html"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FKYVMMR7RPM6AHJ2SBVM2LO6D3NGFY7B/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZS4G6NSZWPTVXMMZHJOJVQEPL3QTO77/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJB6FUBBLVKKG655UMTLQNN6UQ6EDLSP/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FKYVMMR7RPM6AHJ2SBVM2LO6D3NGFY7B"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FKYVMMR7RPM6AHJ2SBVM2LO6D3NGFY7B/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VZS4G6NSZWPTVXMMZHJOJVQEPL3QTO77"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VZS4G6NSZWPTVXMMZHJOJVQEPL3QTO77/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YJB6FUBBLVKKG655UMTLQNN6UQ6EDLSP"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YJB6FUBBLVKKG655UMTLQNN6UQ6EDLSP/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20230316-0006"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20230316-0006/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.djangoproject.com/weblog/2023/feb/14/security-releases"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.djangoproject.com/weblog/2023/feb/14/security-releases/"
          }
        },
        {
          "id": "1031290",
          "source": {
            "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031290"
          }
        },
        {
          "id": "2169402",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2169402"
          }
        },
        {
          "id": "CVE-2023-24580",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24580"
          }
        },
        {
          "id": "GHSA-2hrw-hx67-34x6",
          "source": {
            "url": "https://github.com/advisories/GHSA-2hrw-hx67-34x6"
          }
        },
        {
          "id": "RHSA-2023:2097",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:2097"
          }
        },
        {
          "id": "RHSA-2023:2101",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:2101"
          }
        },
        {
          "id": "RHSA-2023:4692",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:4692"
          }
        },
        {
          "id": "USN-5868-1",
          "source": {
            "url": "https://usn.ubuntu.com/5868-1/"
          }
        },
        {
          "id": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
          }
        }
      ],
      "source": {
        "name": "VulnerableCode",
        "url": "http://public.vulnerablecode.io/vulnerabilities/VCID-khvz-sgc7-aaak"
      }
    },
    {
      "affects": [
        {
          "ref": "pkg:pypi/selenium@3.141.0"
        }
      ],
      "bom-ref": "BomRef.7955558468001555.32355866256057175",
      "description": "Selenium Server (Grid) before 4 allows CSRF because it permits non-JSON content types such as application/x-www-form-urlencoded, multipart/form-data, and text/plain.",
      "id": "VCID-m2b4-c8vz-aaaa",
      "ratings": [
        {
          "severity": "high",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28108"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/SeleniumHQ/selenium"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://www.openwall.com/lists/oss-security/2022/02/07/3"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://www.gabriel.urdhr.fr/2022/02/07/selenium-standalone-server-csrf-dns-rebinding-rce"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://www.selenium.dev/downloads"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/advisories/GHSA-h2rr-m97p-6jq9"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://www.openwall.com/lists/oss-security/2022/04/14/2"
          },
          "vector": ""
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-28108"
          },
          "vector": "0.58078"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-28108"
          },
          "vector": "0.58292"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-28108"
          },
          "vector": "0.58359"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-28108"
          },
          "vector": "0.58379"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-28108"
          },
          "vector": "0.62298"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-28108"
          },
          "vector": "0.62307"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-28108"
          },
          "vector": "0.62314"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-28108"
          },
          "vector": "0.62325"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-28108"
          },
          "vector": "0.62337"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-28108"
          },
          "vector": "0.62454"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-28108"
          },
          "vector": "0.62486"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-28108"
          },
          "vector": "0.62505"
        },
        {
          "score": 8.8,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28108"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
        },
        {
          "score": 8.8,
          "source": {
            "url": "https://www.gabriel.urdhr.fr/2022/02/07/selenium-standalone-server-csrf-dns-rebinding-rce"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
        },
        {
          "score": 8.8,
          "source": {
            "url": "https://github.com/SeleniumHQ/selenium"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
        },
        {
          "score": 8.8,
          "source": {
            "url": "https://www.selenium.dev/downloads"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
        },
        {
          "score": 8.8,
          "source": {
            "url": "https://www.gabriel.urdhr.fr/2022/02/07/selenium-standalone-server-csrf-dns-rebinding-rce/"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
        },
        {
          "score": 8.8,
          "source": {
            "url": "https://www.openwall.com/lists/oss-security/2022/02/07/3"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
        },
        {
          "score": 8.8,
          "source": {
            "url": "https://www.selenium.dev/downloads/"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
        },
        {
          "score": 8.8,
          "source": {
            "url": "https://www.openwall.com/lists/oss-security/2022/04/14/2"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.3,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28108"
          },
          "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"
        }
      ],
      "references": [
        {
          "id": "",
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-28108"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/SeleniumHQ/selenium"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.gabriel.urdhr.fr/2022/02/07/selenium-standalone-server-csrf-dns-rebinding-rce"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.gabriel.urdhr.fr/2022/02/07/selenium-standalone-server-csrf-dns-rebinding-rce/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.openwall.com/lists/oss-security/2022/02/07/3"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.openwall.com/lists/oss-security/2022/04/14/2"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.selenium.dev/downloads"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.selenium.dev/downloads/"
          }
        },
        {
          "id": "CVE-2022-28108",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28108"
          }
        },
        {
          "id": "GHSA-h2rr-m97p-6jq9",
          "source": {
            "url": "https://github.com/advisories/GHSA-h2rr-m97p-6jq9"
          }
        },
        {
          "id": "cpe:2.3:a:selenium:selenium_grid:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:selenium:selenium_grid:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:selenium:selenium_grid:4.0.0:-:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:selenium:selenium_grid:4.0.0:-:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:selenium:selenium_grid:4.0.0:alpha1:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:selenium:selenium_grid:4.0.0:alpha1:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:selenium:selenium_grid:4.0.0:alpha2:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:selenium:selenium_grid:4.0.0:alpha2:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:selenium:selenium_grid:4.0.0:alpha3:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:selenium:selenium_grid:4.0.0:alpha3:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:selenium:selenium_grid:4.0.0:alpha4:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:selenium:selenium_grid:4.0.0:alpha4:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:selenium:selenium_grid:4.0.0:alpha5:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:selenium:selenium_grid:4.0.0:alpha5:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:selenium:selenium_grid:4.0.0:alpha6:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:selenium:selenium_grid:4.0.0:alpha6:*:*:*:*:*:*"
          }
        }
      ],
      "source": {
        "name": "VulnerableCode",
        "url": "http://public.vulnerablecode.io/vulnerabilities/VCID-m2b4-c8vz-aaaa"
      }
    },
    {
      "affects": [
        {
          "ref": "pkg:pypi/wheel@0.37.1"
        }
      ],
      "bom-ref": "BomRef.8791047151349827.34459302855819485",
      "description": "pypa/wheel vulnerable to Regular Expression denial of service (ReDoS)",
      "id": "VCID-mg48-8mnh-aaaa",
      "ratings": [
        {
          "severity": "high",
          "source": {
            "url": "https://pyup.io/vulnerabilities/CVE-2022-40898/51499"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40898"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/advisories/GHSA-qwmp-2cf2-g9g6"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://pypi.org/project/wheel"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/pypa/wheel/blob/main/src/wheel/wheelfile.py#L18"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/pypa/wheel"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/wheel/PYSEC-2022-43017.yaml"
          },
          "vector": ""
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-40898"
          },
          "vector": "0.72136"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-40898"
          },
          "vector": "0.72294"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-40898"
          },
          "vector": "0.72331"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-40898"
          },
          "vector": "0.72343"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-40898"
          },
          "vector": "0.72388"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-40898"
          },
          "vector": "0.72389"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-40898"
          },
          "vector": "0.72390"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-40898"
          },
          "vector": "0.72394"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-40898"
          },
          "vector": "0.72396"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-40898"
          },
          "vector": "0.72460"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-40898"
          },
          "vector": "0.72475"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-40898"
          },
          "vector": "0.72508"
        },
        {
          "score": 4.3,
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/pypa/wheel"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://pypi.org/project/wheel"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40898"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://pyup.io/vulnerabilities/CVE-2022-40898/51499"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/pypa/wheel/blob/main/src/wheel/wheelfile.py#L18"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/wheel/PYSEC-2022-43017.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40898.json"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        }
      ],
      "references": [
        {
          "id": "",
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40898.json"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-40898"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40898"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/wheel/PYSEC-2022-43017.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/pypa/wheel"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/pypa/wheel/blob/main/src/wheel/wheelfile.py#L18"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://pypi.org/project/wheel"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://pypi.org/project/wheel/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://pyup.io/vulnerabilities/CVE-2022-40898/51499"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://pyup.io/vulnerabilities/CVE-2022-40898/51499/"
          }
        },
        {
          "id": "2165864",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165864"
          }
        },
        {
          "id": "CVE-2022-40898",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40898"
          }
        },
        {
          "id": "GHSA-qwmp-2cf2-g9g6",
          "source": {
            "url": "https://github.com/advisories/GHSA-qwmp-2cf2-g9g6"
          }
        },
        {
          "id": "RHSA-2023:6712",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:6712"
          }
        },
        {
          "id": "RHSA-2023:6793",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:6793"
          }
        },
        {
          "id": "RHSA-2024:10761",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:10761"
          }
        },
        {
          "id": "USN-5821-1",
          "source": {
            "url": "https://usn.ubuntu.com/5821-1/"
          }
        },
        {
          "id": "USN-5821-3",
          "source": {
            "url": "https://usn.ubuntu.com/5821-3/"
          }
        },
        {
          "id": "USN-USN-5821-2",
          "source": {
            "url": "https://usn.ubuntu.com/USN-5821-2/"
          }
        },
        {
          "id": "cpe:2.3:a:wheel_project:wheel:*:*:*:*:*:python:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wheel_project:wheel:*:*:*:*:*:python:*:*"
          }
        }
      ],
      "source": {
        "name": "VulnerableCode",
        "url": "http://public.vulnerablecode.io/vulnerabilities/VCID-mg48-8mnh-aaaa"
      }
    },
    {
      "affects": [
        {
          "ref": "pkg:maven/log4j/log4j@1.2.17"
        }
      ],
      "bom-ref": "BomRef.6019179036873977.24148966412429507",
      "description": "JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data",
      "id": "VCID-mmty-783v-aaaf",
      "ratings": [
        {
          "severity": "critical",
          "source": {
            "url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://security.gentoo.org/glsa/202310-16"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2021:5186"
          }
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2021:5184"
          }
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2021:5107"
          }
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2021:5148"
          }
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2021:5141"
          }
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2021:5183"
          }
        },
        {
          "severity": "high",
          "source": {
            "url": "https://security.gentoo.org/glsa/202209-02"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20211223-0007"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://security.gentoo.org/glsa/202312-02"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0033"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "http://www.openwall.com/lists/oss-security/2022/01/18/3"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://security.gentoo.org/glsa/202312-04"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/apache/logging-log4j2"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://access.redhat.com/security/cve/CVE-2021-4104"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/advisories/GHSA-fp5r-v3w9-4333"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://www.kb.cert.org/vuls/id/930724"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:1297"
          }
        },
        {
          "severity": "low",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:1299"
          }
        },
        {
          "severity": "low",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0524"
          }
        },
        {
          "severity": "low",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0527"
          }
        },
        {
          "severity": "low",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0475"
          }
        },
        {
          "severity": "low",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:1296"
          }
        },
        {
          "severity": "medium",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031667"
          }
        },
        {
          "score": 0.2,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4104"
          },
          "vector": "0.96076"
        },
        {
          "score": 0.2,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4104"
          },
          "vector": "0.96102"
        },
        {
          "score": 0.2,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4104"
          },
          "vector": "0.96113"
        },
        {
          "score": 0.2,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4104"
          },
          "vector": "0.96115"
        },
        {
          "score": 0.2,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4104"
          },
          "vector": "0.96118"
        },
        {
          "score": 0.2,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4104"
          },
          "vector": "0.96120"
        },
        {
          "score": 0.2,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4104"
          },
          "vector": "0.96121"
        },
        {
          "score": 0.2,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4104"
          },
          "vector": "0.96132"
        },
        {
          "score": 0.2,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4104"
          },
          "vector": "0.96150"
        },
        {
          "score": 0.2,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4104"
          },
          "vector": "0.96157"
        },
        {
          "score": 5.3,
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
        },
        {
          "score": 6.0,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4104"
          },
          "vector": "AV:N/AC:M/Au:S/C:P/I:P/A:P"
        },
        {
          "score": 6.4,
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          },
          "vector": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 6.6,
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpujan2022.html"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 7.4,
          "source": {
            "url": "https://security.gentoo.org/glsa/202209-02"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20211223-0007"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4104"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0033"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://security.gentoo.org/glsa/202312-04"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4104.json"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://security.gentoo.org/glsa/202312-02"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/apache/logging-log4j2"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 8.1,
          "source": {
            "url": "https://access.redhat.com/security/cve/CVE-2021-4104"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 8.6,
          "source": {
            "url": "https://www.kb.cert.org/vuls/id/930724"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
        },
        {
          "score": 8.8,
          "source": {
            "url": "http://www.openwall.com/lists/oss-security/2022/01/18/3"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.0,
          "source": {
            "url": "https://security.gentoo.org/glsa/202310-16"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
        },
        {
          "score": 9.0,
          "source": {
            "url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
        },
        {
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpujan2022.html"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0438"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0430"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0507"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0448"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0435"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0291"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2021:5206"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0553"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0449"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0294"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0447"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:5460"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0437"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0446"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2021:5269"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0289"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0436"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:5459"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0450"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0290"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0497"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0661"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:5458"
          }
        }
      ],
      "references": [
        {
          "id": "",
          "source": {
            "url": "http://www.openwall.com/lists/oss-security/2022/01/18/3"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4104.json"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://access.redhat.com/security/cve/CVE-2021-4104"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4104"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4104"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/apache/logging-log4j2"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0033"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://security.gentoo.org/glsa/202209-02"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://security.gentoo.org/glsa/202310-16"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://security.gentoo.org/glsa/202312-02"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://security.gentoo.org/glsa/202312-04"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20211223-0007"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20211223-0007/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.kb.cert.org/vuls/id/930724"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpujan2022.html"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
          }
        },
        {
          "id": "2031667",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031667"
          }
        },
        {
          "id": "CVE-2021-4104",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4104"
          }
        },
        {
          "id": "GHSA-fp5r-v3w9-4333",
          "source": {
            "url": "https://github.com/advisories/GHSA-fp5r-v3w9-4333"
          }
        },
        {
          "id": "RHSA-2021:5107",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2021:5107"
          }
        },
        {
          "id": "RHSA-2021:5141",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2021:5141"
          }
        },
        {
          "id": "RHSA-2021:5148",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2021:5148"
          }
        },
        {
          "id": "RHSA-2021:5183",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2021:5183"
          }
        },
        {
          "id": "RHSA-2021:5184",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2021:5184"
          }
        },
        {
          "id": "RHSA-2021:5186",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2021:5186"
          }
        },
        {
          "id": "RHSA-2021:5206",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2021:5206"
          }
        },
        {
          "id": "RHSA-2021:5269",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2021:5269"
          }
        },
        {
          "id": "RHSA-2022:0289",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0289"
          }
        },
        {
          "id": "RHSA-2022:0290",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0290"
          }
        },
        {
          "id": "RHSA-2022:0291",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0291"
          }
        },
        {
          "id": "RHSA-2022:0294",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0294"
          }
        },
        {
          "id": "RHSA-2022:0430",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0430"
          }
        },
        {
          "id": "RHSA-2022:0435",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0435"
          }
        },
        {
          "id": "RHSA-2022:0436",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0436"
          }
        },
        {
          "id": "RHSA-2022:0437",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0437"
          }
        },
        {
          "id": "RHSA-2022:0438",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0438"
          }
        },
        {
          "id": "RHSA-2022:0444",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0444"
          }
        },
        {
          "id": "RHSA-2022:0445",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0445"
          }
        },
        {
          "id": "RHSA-2022:0446",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0446"
          }
        },
        {
          "id": "RHSA-2022:0447",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0447"
          }
        },
        {
          "id": "RHSA-2022:0448",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0448"
          }
        },
        {
          "id": "RHSA-2022:0449",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0449"
          }
        },
        {
          "id": "RHSA-2022:0450",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0450"
          }
        },
        {
          "id": "RHSA-2022:0475",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0475"
          }
        },
        {
          "id": "RHSA-2022:0497",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0497"
          }
        },
        {
          "id": "RHSA-2022:0507",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0507"
          }
        },
        {
          "id": "RHSA-2022:0524",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0524"
          }
        },
        {
          "id": "RHSA-2022:0527",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0527"
          }
        },
        {
          "id": "RHSA-2022:0553",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0553"
          }
        },
        {
          "id": "RHSA-2022:0661",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0661"
          }
        },
        {
          "id": "RHSA-2022:1296",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:1296"
          }
        },
        {
          "id": "RHSA-2022:1297",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:1297"
          }
        },
        {
          "id": "RHSA-2022:1299",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:1299"
          }
        },
        {
          "id": "RHSA-2022:5458",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:5458"
          }
        },
        {
          "id": "RHSA-2022:5459",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:5459"
          }
        },
        {
          "id": "RHSA-2022:5460",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:5460"
          }
        },
        {
          "id": "RHSA-2024:10207",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:10207"
          }
        },
        {
          "id": "RHSA-2024:5856",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:5856"
          }
        },
        {
          "id": "USN-5223-1",
          "source": {
            "url": "https://usn.ubuntu.com/5223-1/"
          }
        },
        {
          "id": "USN-USN-5223-2",
          "source": {
            "url": "https://usn.ubuntu.com/USN-5223-2/"
          }
        },
        {
          "id": "cpe:2.3:a:apache:log4j:1.2:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:log4j:1.2:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:advanced_supply_chain_planning:12.1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:advanced_supply_chain_planning:12.1:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:advanced_supply_chain_planning:12.2:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:advanced_supply_chain_planning:12.2:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:business_intelligence:12.2.1.3.0:*:*:*:enterprise:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:business_intelligence:12.2.1.3.0:*:*:*:enterprise:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:enterprise:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:enterprise:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:business_intelligence:5.9.0.0.0:*:*:*:enterprise:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:business_intelligence:5.9.0.0.0:*:*:*:enterprise:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:business_process_management_suite:12.2.1.3.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:business_process_management_suite:12.2.1.3.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:business_process_management_suite:12.2.1.4.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:business_process_management_suite:12.2.1.4.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_eagle_ftp_table_base_retrieval:4.5:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_eagle_ftp_table_base_retrieval:4.5:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_network_integrity:7.3.6:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_integrity:7.3.6:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_offline_mediation_controller:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_offline_mediation_controller:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.5.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.5.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.4:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.4:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.5:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.5:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:e-business_suite_cloud_manager_and_cloud_backup_module:2.2.1.1.1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:e-business_suite_cloud_manager_and_cloud_backup_module:2.2.1.1.1:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.5.0.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_base_platform:13.5.0.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.7.0.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.7.0.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.7.0.1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.7.0.1:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.8.0.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.8.0.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:fusion_middleware_common_libraries_and_tools:12.2.1.4.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:fusion_middleware_common_libraries_and_tools:12.2.1.4.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:goldengate:-:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:goldengate:-:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:healthcare_data_repository:8.1.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:healthcare_data_repository:8.1.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:hyperion_data_relationship_management:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion_data_relationship_management:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:hyperion_infrastructure_technology:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion_infrastructure_technology:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:identity_management_suite:12.2.1.3.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:identity_management_suite:12.2.1.3.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:identity_management_suite:12.2.1.4.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:identity_management_suite:12.2.1.4.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:jdeveloper:12.2.1.3.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdeveloper:12.2.1.3.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_allocation:14.1.3.2:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_allocation:14.1.3.2:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_allocation:15.0.3.1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_allocation:15.0.3.1:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_allocation:16.0.3:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_allocation:16.0.3:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_allocation:19.0.1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_allocation:19.0.1:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_extract_transform_and_load:13.2.5:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_extract_transform_and_load:13.2.5:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:stream_analytics:-:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:stream_analytics:-:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:timesten_grid:-:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:timesten_grid:-:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:tuxedo:12.2.2.0.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:tuxedo:12.2.2.0.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:utilities_testing_accelerator:6.0.0.1.1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:utilities_testing_accelerator:6.0.0.1.1:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:utilities_testing_accelerator:6.0.0.2.2:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:utilities_testing_accelerator:6.0.0.2.2:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:utilities_testing_accelerator:6.0.0.3.1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:utilities_testing_accelerator:6.0.0.3.1:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:redhat:codeready_studio:12.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:codeready_studio:12.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:redhat:integration_camel_quarkus:-:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:integration_camel_quarkus:-:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:redhat:jboss_a-mq:6.0.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_a-mq:6.0.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:redhat:jboss_a-mq_streaming:-:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_a-mq_streaming:-:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:redhat:jboss_data_virtualization:6.0.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_data_virtualization:6.0.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:redhat:jboss_fuse_service_works:6.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_fuse_service_works:6.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:redhat:jboss_operations_network:3.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_operations_network:3.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:redhat:jboss_web_server:3.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_web_server:3.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:redhat:openshift_application_runtimes:-:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_application_runtimes:-:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:redhat:openshift_container_platform:4.6:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.6:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:redhat:openshift_container_platform:4.7:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.7:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:redhat:openshift_container_platform:4.8:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.8:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"
          }
        }
      ],
      "source": {
        "name": "VulnerableCode",
        "url": "http://public.vulnerablecode.io/vulnerabilities/VCID-mmty-783v-aaaf"
      }
    },
    {
      "affects": [
        {
          "ref": "pkg:pypi/setuptools@62.3.2"
        }
      ],
      "bom-ref": "BomRef.3199343473218651.9558427332074061",
      "description": "pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools",
      "id": "VCID-pcf2-sk39-aaaa",
      "ratings": [
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/pypa/setuptools/commit/88807c7062788254f654ea8c03427adc859321f0"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/pypa/setuptools"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://huntr.com/bounties/d6362117-ad57-4e83-951f-b8141c6e7ca5"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/advisories/GHSA-cx63-2mw6-8hw5"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/pypa/setuptools/pull/4332"
          },
          "vector": ""
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6345"
          },
          "vector": "0.09902"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6345"
          },
          "vector": "0.10184"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6345"
          },
          "vector": "0.10278"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6345"
          },
          "vector": "0.10302"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6345"
          },
          "vector": "0.10364"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6345"
          },
          "vector": "0.10366"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6345"
          },
          "vector": "0.10377"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6345"
          },
          "vector": "0.10429"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6345"
          },
          "vector": "0.10484"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6345"
          },
          "vector": "0.10788"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6345"
          },
          "vector": "0.10843"
        },
        {
          "score": 7.0,
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          },
          "vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
        },
        {
          "score": 8.3,
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:7922"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
        },
        {
          "score": 8.8,
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6345.json"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
        },
        {
          "score": 8.8,
          "source": {
            "url": "https://github.com/pypa/setuptools/commit/88807c7062788254f654ea8c03427adc859321f0"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
        },
        {
          "score": 8.8,
          "source": {
            "url": "https://huntr.com/bounties/d6362117-ad57-4e83-951f-b8141c6e7ca5"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
        },
        {
          "score": 8.8,
          "source": {
            "url": "https://github.com/pypa/setuptools/pull/4332"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
        },
        {
          "score": 8.8,
          "source": {
            "url": "https://github.com/pypa/setuptools"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:7922"
          },
          "vector": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-13T17:59:41Z/"
        }
      ],
      "references": [
        {
          "id": "",
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6345.json"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6345"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6345"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/pypa/setuptools"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/pypa/setuptools/commit/88807c7062788254f654ea8c03427adc859321f0"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/pypa/setuptools/pull/4332"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://huntr.com/bounties/d6362117-ad57-4e83-951f-b8141c6e7ca5"
          }
        },
        {
          "id": "2297771",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297771"
          }
        },
        {
          "id": "CVE-2024-6345",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6345"
          }
        },
        {
          "id": "GHSA-cx63-2mw6-8hw5",
          "source": {
            "url": "https://github.com/advisories/GHSA-cx63-2mw6-8hw5"
          }
        },
        {
          "id": "RHSA-2024:10135",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:10135"
          }
        },
        {
          "id": "RHSA-2024:5000",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:5000"
          }
        },
        {
          "id": "RHSA-2024:5002",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:5002"
          }
        },
        {
          "id": "RHSA-2024:5040",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:5040"
          }
        },
        {
          "id": "RHSA-2024:5078",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:5078"
          }
        },
        {
          "id": "RHSA-2024:5084",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:5084"
          }
        },
        {
          "id": "RHSA-2024:5137",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:5137"
          }
        },
        {
          "id": "RHSA-2024:5279",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:5279"
          }
        },
        {
          "id": "RHSA-2024:5389",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:5389"
          }
        },
        {
          "id": "RHSA-2024:5530",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:5530"
          }
        },
        {
          "id": "RHSA-2024:5531",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:5531"
          }
        },
        {
          "id": "RHSA-2024:5532",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:5532"
          }
        },
        {
          "id": "RHSA-2024:5533",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:5533"
          }
        },
        {
          "id": "RHSA-2024:5534",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:5534"
          }
        },
        {
          "id": "RHSA-2024:5962",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:5962"
          }
        },
        {
          "id": "RHSA-2024:6220",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:6220"
          }
        },
        {
          "id": "RHSA-2024:6309",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:6309"
          }
        },
        {
          "id": "RHSA-2024:6311",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:6311"
          }
        },
        {
          "id": "RHSA-2024:6312",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:6312"
          }
        },
        {
          "id": "RHSA-2024:6488",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:6488"
          }
        },
        {
          "id": "RHSA-2024:6611",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:6611"
          }
        },
        {
          "id": "RHSA-2024:6612",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:6612"
          }
        },
        {
          "id": "RHSA-2024:6661",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:6661"
          }
        },
        {
          "id": "RHSA-2024:6662",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:6662"
          }
        },
        {
          "id": "RHSA-2024:6667",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:6667"
          }
        },
        {
          "id": "RHSA-2024:6726",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:6726"
          }
        },
        {
          "id": "RHSA-2024:6907",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:6907"
          }
        },
        {
          "id": "RHSA-2024:7213",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:7213"
          }
        },
        {
          "id": "RHSA-2024:7374",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:7374"
          }
        },
        {
          "id": "RHSA-2024:7922",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:7922"
          }
        },
        {
          "id": "RHSA-2024:8168",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:8168"
          }
        },
        {
          "id": "RHSA-2024:8170",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:8170"
          }
        },
        {
          "id": "RHSA-2024:8171",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:8171"
          }
        },
        {
          "id": "RHSA-2024:8172",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:8172"
          }
        },
        {
          "id": "RHSA-2024:8173",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:8173"
          }
        },
        {
          "id": "RHSA-2024:8179",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:8179"
          }
        },
        {
          "id": "USN-7002-1",
          "source": {
            "url": "https://usn.ubuntu.com/7002-1/"
          }
        }
      ],
      "source": {
        "name": "VulnerableCode",
        "url": "http://public.vulnerablecode.io/vulnerabilities/VCID-pcf2-sk39-aaaa"
      }
    },
    {
      "affects": [
        {
          "ref": "pkg:pypi/django@4.0.8"
        }
      ],
      "bom-ref": "BomRef.03628640183516818.002418164046819604",
      "description": "In Django 3.2 before 3.2.25, 4.2 before 4.2.11, and 5.0 before 5.0.3, the django.utils.text.Truncator.words() method (with html=True) and the truncatewords_html template filter are subject to a potential regular expression denial-of-service attack via a crafted string. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232 and CVE-2023-43665.",
      "id": "VCID-q4q6-yfng-aaag",
      "ratings": [
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-27351"
          },
          "vector": "0.11214"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-27351"
          },
          "vector": "0.11518"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-27351"
          },
          "vector": "0.11609"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-27351"
          },
          "vector": "0.11632"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-27351"
          },
          "vector": "0.11696"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-27351"
          },
          "vector": "0.11700"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-27351"
          },
          "vector": "0.11709"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-27351"
          },
          "vector": "0.11764"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-27351"
          },
          "vector": "0.11819"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-27351"
          },
          "vector": "0.12119"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-27351"
          },
          "vector": "0.12177"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-27351"
          },
          "vector": "0.12271"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://groups.google.com/forum/#%21forum/django-announce"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://github.com/django/django"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 5.3,
          "source": {
            "url": "https://github.com/django/django/commit/072963e4c4d0b3a7a8c5412bc0c7d27d1a9c3521"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"
        },
        {
          "score": 5.3,
          "source": {
            "url": "http://www.openwall.com/lists/oss-security/2024/03/04/1"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"
        },
        {
          "score": 5.3,
          "source": {
            "url": "https://github.com/django/django/commit/3c9a2771cc80821e041b16eb36c1c37af5349d4a"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"
        },
        {
          "score": 5.3,
          "source": {
            "url": "https://github.com/django/django/commit/3394fc6132436eca89e997083bae9985fb7e761e"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"
        },
        {
          "score": 5.3,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2JIRXEDP4ZET5KFMAPPYSK663Q52NEX"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"
        },
        {
          "score": 5.3,
          "source": {
            "url": "https://www.djangoproject.com/weblog/2024/mar/04/security-releases"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"
        },
        {
          "score": 5.3,
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2024-47.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"
        },
        {
          "score": 5.3,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN2PLJGYSAAG5KUVIUFJYKD3BLQ4OSN6"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"
        },
        {
          "score": 5.3,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"
        },
        {
          "score": 5.3,
          "source": {
            "url": "https://docs.djangoproject.com/en/5.0/releases/security"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27351.json"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2JIRXEDP4ZET5KFMAPPYSK663Q52NEX"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/django/django/commit/072963e4c4d0b3a7a8c5412bc0c7d27d1a9c3521"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://docs.djangoproject.com/en/5.0/releases/security"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/django/django"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/advisories/GHSA-vm8q-m57g-pff3"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2024-47.yaml"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://www.djangoproject.com/weblog/2024/mar/04/security-releases"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/django/django/commit/3394fc6132436eca89e997083bae9985fb7e761e"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "http://www.openwall.com/lists/oss-security/2024/03/04/1"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/django/django/commit/3c9a2771cc80821e041b16eb36c1c37af5349d4a"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://groups.google.com/forum/#%21forum/django-announce"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN2PLJGYSAAG5KUVIUFJYKD3BLQ4OSN6"
          },
          "vector": ""
        }
      ],
      "references": [
        {
          "id": "",
          "source": {
            "url": "http://www.openwall.com/lists/oss-security/2024/03/04/1"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27351.json"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-27351"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27351"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://docs.djangoproject.com/en/5.0/releases/security"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://docs.djangoproject.com/en/5.0/releases/security/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/django/django"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/django/django/commit/072963e4c4d0b3a7a8c5412bc0c7d27d1a9c3521"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/django/django/commit/3394fc6132436eca89e997083bae9985fb7e761e"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/django/django/commit/3c9a2771cc80821e041b16eb36c1c37af5349d4a"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2024-47.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://groups.google.com/forum/#%21forum/django-announce"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2JIRXEDP4ZET5KFMAPPYSK663Q52NEX"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2JIRXEDP4ZET5KFMAPPYSK663Q52NEX/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN2PLJGYSAAG5KUVIUFJYKD3BLQ4OSN6"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN2PLJGYSAAG5KUVIUFJYKD3BLQ4OSN6/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.djangoproject.com/weblog/2024/mar/04/security-releases"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.djangoproject.com/weblog/2024/mar/04/security-releases/"
          }
        },
        {
          "id": "2266045",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266045"
          }
        },
        {
          "id": "CVE-2024-27351",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27351"
          }
        },
        {
          "id": "GHSA-vm8q-m57g-pff3",
          "source": {
            "url": "https://github.com/advisories/GHSA-vm8q-m57g-pff3"
          }
        },
        {
          "id": "RHSA-2024:1878",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:1878"
          }
        },
        {
          "id": "RHSA-2024:3781",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:3781"
          }
        },
        {
          "id": "RHSA-2024:5662",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:5662"
          }
        },
        {
          "id": "USN-6674-1",
          "source": {
            "url": "https://usn.ubuntu.com/6674-1/"
          }
        },
        {
          "id": "USN-6674-2",
          "source": {
            "url": "https://usn.ubuntu.com/6674-2/"
          }
        }
      ],
      "source": {
        "name": "VulnerableCode",
        "url": "http://public.vulnerablecode.io/vulnerabilities/VCID-q4q6-yfng-aaag"
      }
    },
    {
      "affects": [
        {
          "ref": "pkg:maven/log4j/log4j@1.2.17"
        }
      ],
      "bom-ref": "BomRef.4246823967852934.5279411351514985",
      "description": "Apache Log4j 1.x (EOL) allows Denial of Service (DoS)",
      "id": "VCID-qzs5-6t9p-aaac",
      "ratings": [
        {
          "severity": "high",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20230505-0008"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://lists.apache.org/thread/wkx6grrcjkh86crr49p4blc1v1nflj3t"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/apache/logging-log4j2"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/advisories/GHSA-vp98-w2p3-mv35"
          },
          "vector": ""
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-26464"
          },
          "vector": "0.59027"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-26464"
          },
          "vector": "0.59243"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-26464"
          },
          "vector": "0.59306"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-26464"
          },
          "vector": "0.59321"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-26464"
          },
          "vector": "0.59365"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-26464"
          },
          "vector": "0.59377"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-26464"
          },
          "vector": "0.59379"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-26464"
          },
          "vector": "0.59387"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-26464"
          },
          "vector": "0.59411"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-26464"
          },
          "vector": "0.59522"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-26464"
          },
          "vector": "0.59558"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-26464"
          },
          "vector": "0.59592"
        },
        {
          "score": 6.5,
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:5484"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 6.5,
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:5485"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 6.5,
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:5488"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 6.5,
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:5486"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://lists.apache.org/thread/wkx6grrcjkh86crr49p4blc1v1nflj3t"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20230505-0008"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26464"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-26464.json"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/apache/logging-log4j2"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:5486"
          },
          "vector": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-26T20:01:33Z/"
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:5485"
          },
          "vector": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-26T20:01:33Z/"
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:5488"
          },
          "vector": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-26T20:01:33Z/"
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:5484"
          },
          "vector": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-26T20:01:33Z/"
        }
      ],
      "references": [
        {
          "id": "",
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-26464.json"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-26464"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/apache/logging-log4j2"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread/wkx6grrcjkh86crr49p4blc1v1nflj3t"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20230505-0008"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20230505-0008/"
          }
        },
        {
          "id": "2182864",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182864"
          }
        },
        {
          "id": "CVE-2023-26464",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26464"
          }
        },
        {
          "id": "GHSA-vp98-w2p3-mv35",
          "source": {
            "url": "https://github.com/advisories/GHSA-vp98-w2p3-mv35"
          }
        },
        {
          "id": "RHSA-2023:3663",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:3663"
          }
        },
        {
          "id": "RHSA-2023:5484",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:5484"
          }
        },
        {
          "id": "RHSA-2023:5485",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:5485"
          }
        },
        {
          "id": "RHSA-2023:5486",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:5486"
          }
        },
        {
          "id": "RHSA-2023:5488",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:5488"
          }
        },
        {
          "id": "RHSA-2024:10207",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:10207"
          }
        },
        {
          "id": "RHSA-2024:10208",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:10208"
          }
        },
        {
          "id": "cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*"
          }
        }
      ],
      "source": {
        "name": "VulnerableCode",
        "url": "http://public.vulnerablecode.io/vulnerabilities/VCID-qzs5-6t9p-aaac"
      }
    },
    {
      "affects": [
        {
          "ref": "pkg:pypi/urllib3@1.25.10"
        }
      ],
      "bom-ref": "BomRef.0350948671726905.8181117986128503",
      "description": "urllib3's request body not stripped after redirect from 303 status changes request method to GET",
      "id": "VCID-r496-vgsm-aaac",
      "ratings": [
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-45803"
          },
          "vector": "0.10768"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-45803"
          },
          "vector": "0.11060"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-45803"
          },
          "vector": "0.11151"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-45803"
          },
          "vector": "0.11176"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-45803"
          },
          "vector": "0.11240"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-45803"
          },
          "vector": "0.11244"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-45803"
          },
          "vector": "0.11250"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-45803"
          },
          "vector": "0.11301"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-45803"
          },
          "vector": "0.11355"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-45803"
          },
          "vector": "0.11657"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-45803"
          },
          "vector": "0.11711"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-45803"
          },
          "vector": "0.11805"
        },
        {
          "score": 4.2,
          "source": {
            "url": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get"
          },
          "vector": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "score": 4.2,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PPDPLM6UUMN55ESPQWJFLLIZY4ZKCNRX/"
          },
          "vector": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "score": 4.2,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803"
          },
          "vector": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "score": 4.2,
          "source": {
            "url": "https://github.com/urllib3/urllib3/commit/b594c5ceaca38e1ac215f916538fb128e3526a36"
          },
          "vector": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "score": 4.2,
          "source": {
            "url": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9"
          },
          "vector": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "score": 4.2,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5"
          },
          "vector": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "score": 4.2,
          "source": {
            "url": "https://github.com/urllib3/urllib3/releases/tag/1.26.18"
          },
          "vector": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "score": 4.2,
          "source": {
            "url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4"
          },
          "vector": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "score": 4.2,
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45803.json"
          },
          "vector": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "score": 4.2,
          "source": {
            "url": "https://github.com/urllib3/urllib3/releases/tag/2.0.7"
          },
          "vector": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "score": 4.2,
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/urllib3/PYSEC-2023-212.yaml"
          },
          "vector": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "score": 4.2,
          "source": {
            "url": "https://github.com/urllib3/urllib3/commit/4e50fbc5db74e32cabd5ccc1ab81fc103adfe0b3"
          },
          "vector": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "score": 4.2,
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          },
          "vector": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "score": 4.2,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PPDPLM6UUMN55ESPQWJFLLIZY4ZKCNRX"
          },
          "vector": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "score": 4.2,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4R2Y5XK3WALSR3FNAGN7JBYV2B343ZKB"
          },
          "vector": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "score": 4.4,
          "source": {
            "url": "https://github.com/urllib3/urllib3"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "source": {
            "url": "https://github.com/urllib3/urllib3"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4R2Y5XK3WALSR3FNAGN7JBYV2B343ZKB"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PPDPLM6UUMN55ESPQWJFLLIZY4ZKCNRX"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/urllib3/PYSEC-2023-212.yaml"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/urllib3/urllib3/releases/tag/1.26.18"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/advisories/GHSA-g4mx-q9vg-27p4"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/urllib3/urllib3/releases/tag/2.0.7"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/urllib3/urllib3/commit/b594c5ceaca38e1ac215f916538fb128e3526a36"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/urllib3/urllib3/commit/4e50fbc5db74e32cabd5ccc1ab81fc103adfe0b3"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4"
          },
          "vector": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:56:19Z/"
        }
      ],
      "references": [
        {
          "id": "",
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45803.json"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-45803"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45803"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/urllib3/PYSEC-2023-212.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/urllib3/urllib3"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/urllib3/urllib3/commit/4e50fbc5db74e32cabd5ccc1ab81fc103adfe0b3"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/urllib3/urllib3/commit/b594c5ceaca38e1ac215f916538fb128e3526a36"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/urllib3/urllib3/releases/tag/1.26.18"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/urllib3/urllib3/releases/tag/2.0.7"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4R2Y5XK3WALSR3FNAGN7JBYV2B343ZKB"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4R2Y5XK3WALSR3FNAGN7JBYV2B343ZKB/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PPDPLM6UUMN55ESPQWJFLLIZY4ZKCNRX"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PPDPLM6UUMN55ESPQWJFLLIZY4ZKCNRX/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get"
          }
        },
        {
          "id": "1054226",
          "source": {
            "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054226"
          }
        },
        {
          "id": "2246840",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
          }
        },
        {
          "id": "CVE-2023-45803",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803"
          }
        },
        {
          "id": "GHSA-g4mx-q9vg-27p4",
          "source": {
            "url": "https://github.com/advisories/GHSA-g4mx-q9vg-27p4"
          }
        },
        {
          "id": "GHSA-g4mx-q9vg-27p4",
          "source": {
            "url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4"
          }
        },
        {
          "id": "RHSA-2024:0116",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:0116"
          }
        },
        {
          "id": "RHSA-2024:0300",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:0300"
          }
        },
        {
          "id": "RHSA-2024:0464",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:0464"
          }
        },
        {
          "id": "RHSA-2024:0588",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:0588"
          }
        },
        {
          "id": "RHSA-2024:1155",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:1155"
          }
        },
        {
          "id": "RHSA-2024:1383",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:1383"
          }
        },
        {
          "id": "RHSA-2024:2132",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:2132"
          }
        },
        {
          "id": "RHSA-2024:2734",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:2734"
          }
        },
        {
          "id": "RHSA-2024:2952",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:2952"
          }
        },
        {
          "id": "RHSA-2024:2968",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:2968"
          }
        },
        {
          "id": "RHSA-2024:2988",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:2988"
          }
        },
        {
          "id": "USN-6473-1",
          "source": {
            "url": "https://usn.ubuntu.com/6473-1/"
          }
        },
        {
          "id": "USN-6473-2",
          "source": {
            "url": "https://usn.ubuntu.com/6473-2/"
          }
        },
        {
          "id": "cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*"
          }
        }
      ],
      "source": {
        "name": "VulnerableCode",
        "url": "http://public.vulnerablecode.io/vulnerabilities/VCID-r496-vgsm-aaac"
      }
    },
    {
      "affects": [
        {
          "ref": "pkg:pypi/redis@4.3.2"
        }
      ],
      "bom-ref": "BomRef.060163651472161184.8682352728134483",
      "description": "redis-py Race Condition due to incomplete fix",
      "id": "VCID-rqe1-dkmg-aaad",
      "ratings": [
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28859"
          },
          "vector": "0.40825"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28859"
          },
          "vector": "0.41098"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28859"
          },
          "vector": "0.41179"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28859"
          },
          "vector": "0.41205"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28859"
          },
          "vector": "0.41291"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28859"
          },
          "vector": "0.41296"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28859"
          },
          "vector": "0.41300"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28859"
          },
          "vector": "0.41307"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28859"
          },
          "vector": "0.41313"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28859"
          },
          "vector": "0.41491"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28859"
          },
          "vector": "0.41536"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28859"
          },
          "vector": "0.41608"
        },
        {
          "score": 4.3,
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28859.json"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 4.3,
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 6.5,
          "source": {
            "url": "https://github.com/redis/redis-py/pull/2671"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "score": 6.5,
          "source": {
            "url": "https://github.com/redis/redis-py/commit/66a4d6b2a493dd3a20cc299ab5fef3c14baad965"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "score": 6.5,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28859"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "score": 6.5,
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/redis/PYSEC-2023-46.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "score": 6.5,
          "source": {
            "url": "https://github.com/redis/redis-py/issues/2665"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "score": 6.5,
          "source": {
            "url": "https://github.com/redis/redis-py/releases/tag/v4.5.4"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "score": 6.5,
          "source": {
            "url": "https://github.com/redis/redis-py"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "score": 6.5,
          "source": {
            "url": "https://github.com/redis/redis-py/commit/b3c89acd0ffe8303649ad8207bc911b1d6a033eb"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "score": 6.5,
          "source": {
            "url": "https://github.com/redis/redis-py/pull/2666"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "score": 6.5,
          "source": {
            "url": "https://github.com/redis/redis-py/pull/2641"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "score": 6.5,
          "source": {
            "url": "https://github.com/redis/redis-py/pull/1899"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "score": 6.5,
          "source": {
            "url": "https://github.com/redis/redis-py/releases/tag/v4.4.4"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
        },
        {
          "source": {
            "url": "https://github.com/redis/redis-py"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/redis/redis-py/pull/2641"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/redis/redis-py/commit/66a4d6b2a493dd3a20cc299ab5fef3c14baad965"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/redis/redis-py/commit/b3c89acd0ffe8303649ad8207bc911b1d6a033eb"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/redis/redis-py/releases/tag/v4.4.4"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/redis/redis-py/releases/tag/v4.5.4"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/redis/PYSEC-2023-46.yaml"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/redis/redis-py/issues/2665"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/redis/redis-py/pull/2666"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/redis/redis-py/pull/2671"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/redis/redis-py/pull/1899"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/advisories/GHSA-8fww-64cx-x8p5"
          },
          "vector": ""
        }
      ],
      "references": [
        {
          "id": "",
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28859.json"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28859"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/redis/PYSEC-2023-46.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/redis/redis-py"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/redis/redis-py/commit/66a4d6b2a493dd3a20cc299ab5fef3c14baad965"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/redis/redis-py/commit/b3c89acd0ffe8303649ad8207bc911b1d6a033eb"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/redis/redis-py/issues/2665"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/redis/redis-py/pull/1899"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/redis/redis-py/pull/2641"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/redis/redis-py/pull/2666"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/redis/redis-py/pull/2671"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/redis/redis-py/releases/tag/v4.4.4"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/redis/redis-py/releases/tag/v4.5.4"
          }
        },
        {
          "id": "2182058",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182058"
          }
        },
        {
          "id": "CVE-2023-28859",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28859"
          }
        },
        {
          "id": "GHSA-8fww-64cx-x8p5",
          "source": {
            "url": "https://github.com/advisories/GHSA-8fww-64cx-x8p5"
          }
        },
        {
          "id": "cpe:2.3:a:redis:redis-py:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redis:redis-py:*:*:*:*:*:*:*:*"
          }
        }
      ],
      "source": {
        "name": "VulnerableCode",
        "url": "http://public.vulnerablecode.io/vulnerabilities/VCID-rqe1-dkmg-aaad"
      }
    },
    {
      "affects": [
        {
          "ref": "pkg:maven/log4j/log4j@1.2.17"
        }
      ],
      "bom-ref": "BomRef.28611996244999616.9551574122972042",
      "description": "Deserialization of Untrusted Data\nCVE-2020-9493 identified a deserialization issue that was present in Apache Chainsaw. Prior to Chainsaw V2.0 Chainsaw was a component of Apache Log4j where the same issue exists.",
      "id": "VCID-scm2-me5u-aaam",
      "ratings": [
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread/rg4yyc89vs3dw6kpy3r92xop9loywyhh"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://github.com/advisories/GHSA-f7vh-qwp3-x37m"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://logging.apache.org/log4j/1.2/index.html"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041967"
          }
        },
        {
          "severity": "low",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:1296"
          }
        },
        {
          "severity": "low",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:1297"
          }
        },
        {
          "severity": "low",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:1299"
          }
        },
        {
          "severity": "low",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0524"
          }
        },
        {
          "severity": "low",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0527"
          }
        },
        {
          "severity": "low",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0475"
          }
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23307"
          },
          "vector": "0.85615"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23307"
          },
          "vector": "0.85710"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23307"
          },
          "vector": "0.85729"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23307"
          },
          "vector": "0.85736"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23307"
          },
          "vector": "0.85747"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23307"
          },
          "vector": "0.85765"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23307"
          },
          "vector": "0.85768"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23307"
          },
          "vector": "0.85790"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23307"
          },
          "vector": "0.85796"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23307"
          },
          "vector": "0.85819"
        },
        {
          "score": 5.3,
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 8.1,
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 8.8,
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23307.json"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 8.8,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23307"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.0,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23307"
          },
          "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread/rg4yyc89vs3dw6kpy3r92xop9loywyhh"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://logging.apache.org/log4j/1.2/index.html"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0442"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0446"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0438"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0430"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0289"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0507"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0448"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0435"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0436"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:5459"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0291"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0450"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0553"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0294"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0449"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0290"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0439"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0447"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0497"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0661"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:5460"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:5458"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0467"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0437"
          }
        }
      ],
      "references": [
        {
          "id": "",
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23307.json"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23307"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23307"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread/rg4yyc89vs3dw6kpy3r92xop9loywyhh"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://logging.apache.org/log4j/1.2/index.html"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
          }
        },
        {
          "id": "1004482",
          "source": {
            "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004482"
          }
        },
        {
          "id": "2041967",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041967"
          }
        },
        {
          "id": "CVE-2022-23307",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23307"
          }
        },
        {
          "id": "GHSA-f7vh-qwp3-x37m",
          "source": {
            "url": "https://github.com/advisories/GHSA-f7vh-qwp3-x37m"
          }
        },
        {
          "id": "RHSA-2022:0289",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0289"
          }
        },
        {
          "id": "RHSA-2022:0290",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0290"
          }
        },
        {
          "id": "RHSA-2022:0291",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0291"
          }
        },
        {
          "id": "RHSA-2022:0294",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0294"
          }
        },
        {
          "id": "RHSA-2022:0430",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0430"
          }
        },
        {
          "id": "RHSA-2022:0435",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0435"
          }
        },
        {
          "id": "RHSA-2022:0436",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0436"
          }
        },
        {
          "id": "RHSA-2022:0437",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0437"
          }
        },
        {
          "id": "RHSA-2022:0438",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0438"
          }
        },
        {
          "id": "RHSA-2022:0439",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0439"
          }
        },
        {
          "id": "RHSA-2022:0442",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0442"
          }
        },
        {
          "id": "RHSA-2022:0444",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0444"
          }
        },
        {
          "id": "RHSA-2022:0445",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0445"
          }
        },
        {
          "id": "RHSA-2022:0446",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0446"
          }
        },
        {
          "id": "RHSA-2022:0447",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0447"
          }
        },
        {
          "id": "RHSA-2022:0448",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0448"
          }
        },
        {
          "id": "RHSA-2022:0449",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0449"
          }
        },
        {
          "id": "RHSA-2022:0450",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0450"
          }
        },
        {
          "id": "RHSA-2022:0467",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0467"
          }
        },
        {
          "id": "RHSA-2022:0469",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0469"
          }
        },
        {
          "id": "RHSA-2022:0475",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0475"
          }
        },
        {
          "id": "RHSA-2022:0497",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0497"
          }
        },
        {
          "id": "RHSA-2022:0507",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0507"
          }
        },
        {
          "id": "RHSA-2022:0524",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0524"
          }
        },
        {
          "id": "RHSA-2022:0527",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0527"
          }
        },
        {
          "id": "RHSA-2022:0553",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0553"
          }
        },
        {
          "id": "RHSA-2022:0661",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0661"
          }
        },
        {
          "id": "RHSA-2022:1296",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:1296"
          }
        },
        {
          "id": "RHSA-2022:1297",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:1297"
          }
        },
        {
          "id": "RHSA-2022:1299",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:1299"
          }
        },
        {
          "id": "RHSA-2022:5458",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:5458"
          }
        },
        {
          "id": "RHSA-2022:5459",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:5459"
          }
        },
        {
          "id": "RHSA-2022:5460",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:5460"
          }
        },
        {
          "id": "RHSA-2024:10207",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:10207"
          }
        },
        {
          "id": "RHSA-2024:5856",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:5856"
          }
        },
        {
          "id": "USN-5998-1",
          "source": {
            "url": "https://usn.ubuntu.com/5998-1/"
          }
        },
        {
          "id": "cpe:2.3:a:apache:chainsaw:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:chainsaw:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:advanced_supply_chain_planning:12.1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:advanced_supply_chain_planning:12.1:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:advanced_supply_chain_planning:12.2:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:advanced_supply_chain_planning:12.2:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:business_intelligence:12.2.1.3.0:*:*:*:enterprise:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:business_intelligence:12.2.1.3.0:*:*:*:enterprise:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:enterprise:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:enterprise:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:business_intelligence:5.9.0.0.0:*:*:*:enterprise:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:business_intelligence:5.9.0.0.0:*:*:*:enterprise:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:business_process_management_suite:12.2.1.3.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:business_process_management_suite:12.2.1.3.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:business_process_management_suite:12.2.1.4.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:business_process_management_suite:12.2.1.4.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_eagle_ftp_table_base_retrieval:4.5:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_eagle_ftp_table_base_retrieval:4.5:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.5.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.5.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_network_integrity:7.3.6:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_integrity:7.3.6:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_offline_mediation_controller:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_offline_mediation_controller:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.5.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.5.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:e-business_suite_cloud_manager_and_cloud_backup_module:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:e-business_suite_cloud_manager_and_cloud_backup_module:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:e-business_suite_cloud_manager_and_cloud_backup_module:2.2.1.1.1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:e-business_suite_cloud_manager_and_cloud_backup_module:2.2.1.1.1:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.5.0.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_base_platform:13.5.0.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.7.0.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.7.0.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.7.0.1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.7.0.1:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.8.0.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.8.0.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:healthcare_foundation:8.1.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:healthcare_foundation:8.1.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:hyperion_data_relationship_management:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion_data_relationship_management:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:hyperion_infrastructure_technology:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion_infrastructure_technology:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:identity_management_suite:12.2.1.3.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:identity_management_suite:12.2.1.3.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:identity_management_suite:12.2.1.4.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:identity_management_suite:12.2.1.4.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:identity_manager_connector:11.1.1.5.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:identity_manager_connector:11.1.1.5.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:jdeveloper:12.2.1.3.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdeveloper:12.2.1.3.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:middleware_common_libraries_and_tools:12.2.1.4.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:middleware_common_libraries_and_tools:12.2.1.4.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_extract_transform_and_load:13.2.5:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_extract_transform_and_load:13.2.5:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:tuxedo:12.2.2.0.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:tuxedo:12.2.2.0.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:qos:reload4j:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qos:reload4j:*:*:*:*:*:*:*:*"
          }
        }
      ],
      "source": {
        "name": "VulnerableCode",
        "url": "http://public.vulnerablecode.io/vulnerabilities/VCID-scm2-me5u-aaam"
      }
    },
    {
      "affects": [
        {
          "ref": "pkg:pypi/django@4.0.8"
        }
      ],
      "bom-ref": "BomRef.11210616144562857.04390596589553297",
      "description": "In Django 3.2 before 3.2.20, 4 before 4.1.10, and 4.2 before 4.2.3, EmailValidator and URLValidator are subject to a potential ReDoS (regular expression denial of service) attack via a very large number of domain name labels of emails and URLs.",
      "id": "VCID-ucbd-zk38-aaae",
      "ratings": [
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/django/django/commit/ad0410ec4f458aa39803e5f6b9a3736527062dcd"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NRDGTUN4LTI6HG4TWR3JYLSFVXPZT42A"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00022.html"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/django/django/commit/454f2fb93437f98917283336201b4048293f7582"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://docs.djangoproject.com/en/4.2/releases/security"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://groups.google.com/forum/#!forum/django-announce"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://www.djangoproject.com/weblog/2023/jul/03/security-releases"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/django/django/commit/b7c5feb35a31799de6e582ad6a5a91a9de74e0f9"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/django/django/commit/beb3f3d55940d9aa7198bf9d424ab74e873aec3d"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NRDGTUN4LTI6HG4TWR3JYLSFVXPZT42A"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XG5DYKPNDCEHJQ3TKPJQO7QGSR4FAYMS"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XG5DYKPNDCEHJQ3TKPJQO7QGSR4FAYMS"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://www.debian.org/security/2023/dsa-5465"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/advisories/GHSA-jh3w-4vvf-mjgr"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2023-100.yaml"
          },
          "vector": ""
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-36053"
          },
          "vector": "0.59212"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-36053"
          },
          "vector": "0.59244"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-36053"
          },
          "vector": "0.59219"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-36053"
          },
          "vector": "0.59425"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-36053"
          },
          "vector": "0.59488"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-36053"
          },
          "vector": "0.59504"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-36053"
          },
          "vector": "0.59549"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-36053"
          },
          "vector": "0.59560"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-36053"
          },
          "vector": "0.59563"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-36053"
          },
          "vector": "0.59570"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-36053"
          },
          "vector": "0.59593"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-36053"
          },
          "vector": "0.59704"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://groups.google.com/forum/#%21forum/django-announce"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://github.com/django/django"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 5.4,
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:6818"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"
        },
        {
          "score": 5.9,
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/django/django/commit/b7c5feb35a31799de6e582ad6a5a91a9de74e0f9"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00022.html"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-36053.json"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NRDGTUN4LTI6HG4TWR3JYLSFVXPZT42A"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://www.debian.org/security/2023/dsa-5465"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://groups.google.com/forum/#!forum/django-announce"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NRDGTUN4LTI6HG4TWR3JYLSFVXPZT42A"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XG5DYKPNDCEHJQ3TKPJQO7QGSR4FAYMS"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2023-100.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-36053"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/django/django/commit/ad0410ec4f458aa39803e5f6b9a3736527062dcd"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/django/django/commit/beb3f3d55940d9aa7198bf9d424ab74e873aec3d"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://www.djangoproject.com/weblog/2023/jul/03/security-releases"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/django/django/commit/454f2fb93437f98917283336201b4048293f7582"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XG5DYKPNDCEHJQ3TKPJQO7QGSR4FAYMS"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://docs.djangoproject.com/en/4.2/releases/security"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "source": {
            "url": "https://github.com/django/django"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://groups.google.com/forum/#%21forum/django-announce"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:6818"
          },
          "vector": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-11T19:42:07Z/"
        }
      ],
      "references": [
        {
          "id": "",
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-36053.json"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-36053"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36053"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://docs.djangoproject.com/en/4.2/releases/security"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://docs.djangoproject.com/en/4.2/releases/security/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/django/django"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/django/django/commit/454f2fb93437f98917283336201b4048293f7582"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/django/django/commit/ad0410ec4f458aa39803e5f6b9a3736527062dcd"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/django/django/commit/b7c5feb35a31799de6e582ad6a5a91a9de74e0f9"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/django/django/commit/beb3f3d55940d9aa7198bf9d424ab74e873aec3d"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2023-100.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://groups.google.com/forum/#!forum/django-announce"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://groups.google.com/forum/#%21forum/django-announce"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00022.html"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NRDGTUN4LTI6HG4TWR3JYLSFVXPZT42A"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NRDGTUN4LTI6HG4TWR3JYLSFVXPZT42A/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XG5DYKPNDCEHJQ3TKPJQO7QGSR4FAYMS"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XG5DYKPNDCEHJQ3TKPJQO7QGSR4FAYMS/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NRDGTUN4LTI6HG4TWR3JYLSFVXPZT42A"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NRDGTUN4LTI6HG4TWR3JYLSFVXPZT42A/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XG5DYKPNDCEHJQ3TKPJQO7QGSR4FAYMS"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XG5DYKPNDCEHJQ3TKPJQO7QGSR4FAYMS/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.debian.org/security/2023/dsa-5465"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.djangoproject.com/weblog/2023/jul/03/security-releases"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.djangoproject.com/weblog/2023/jul/03/security-releases/"
          }
        },
        {
          "id": "1040225",
          "source": {
            "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1040225"
          }
        },
        {
          "id": "2218004",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218004"
          }
        },
        {
          "id": "CVE-2023-36053",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-36053"
          }
        },
        {
          "id": "GHSA-jh3w-4vvf-mjgr",
          "source": {
            "url": "https://github.com/advisories/GHSA-jh3w-4vvf-mjgr"
          }
        },
        {
          "id": "RHSA-2023:4692",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:4692"
          }
        },
        {
          "id": "RHSA-2023:4693",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:4693"
          }
        },
        {
          "id": "RHSA-2023:5931",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:5931"
          }
        },
        {
          "id": "RHSA-2023:6818",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2023:6818"
          }
        },
        {
          "id": "RHSA-2024:0212",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:0212"
          }
        },
        {
          "id": "RHSA-2024:1878",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:1878"
          }
        },
        {
          "id": "USN-6203-1",
          "source": {
            "url": "https://usn.ubuntu.com/6203-1/"
          }
        },
        {
          "id": "USN-6203-2",
          "source": {
            "url": "https://usn.ubuntu.com/6203-2/"
          }
        },
        {
          "id": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*"
          }
        }
      ],
      "source": {
        "name": "VulnerableCode",
        "url": "http://public.vulnerablecode.io/vulnerabilities/VCID-ucbd-zk38-aaae"
      }
    },
    {
      "affects": [
        {
          "ref": "pkg:maven/log4j/log4j@1.2.17"
        }
      ],
      "bom-ref": "BomRef.9834220875582875.9973600924187886",
      "description": "Improper validation of certificate with host mismatch in Apache Log4j SMTP appender",
      "id": "VCID-v4hh-94r5-aaaj",
      "ratings": [
        {
          "severity": "critical",
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpujul2020.html"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpujan2021.html"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://www.debian.org/security/2021/dsa-5020"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2021:5134"
          }
        },
        {
          "severity": "high",
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpuoct2021.html"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00017.html"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/r2f209d271349bafd91537a558a279c08ebcff8fa3e547357d58833e6@%3Cdev.zookeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/r393943de452406f0f6f4b3def9f8d3c071f96323c1f6ed1a098f7fe4@%3Ctorque-dev.db.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/rc2dbc4633a6eea1fcbce6831876cfa17b73759a98c65326d1896cb1a@%3Ctorque-dev.db.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/r45916179811a32cbaa500f972de9098e6ee80ee81c7f134fce83e03a@%3Cissues.flink.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/r4db540cafc5d7232c62e076051ef661d37d345015b2e59b3f81a932f@%3Cdev.hive.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/r65578f3761a89bc164e8964acd5d913b9f8fd997967b195a89a97ca3@%3Cissues.hive.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/ra632b329b2ae2324fabbad5da204c4ec2e171ff60348ec4ba698fd40@%3Cissues.hive.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/r7641ee788e1eb1be4bb206a7d15f8a64ec6ef23e5ec6132d5a567695@%3Cnotifications.zookeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/r4d5dc9f3520071338d9ebc26f9f158a43ae28a91923d176b550a807b@%3Cdev.hive.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/rbc7642b9800249553f13457e46b813bea1aec99d2bc9106510e00ff3@%3Ctorque-dev.db.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/ra051e07a0eea4943fa104247e69596f094951f51512d42c924e86c75@%3Cissues.hive.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/rbc7642b9800249553f13457e46b813bea1aec99d2bc9106510e00ff3%40%3Ctorque-dev.db.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/rc6b81c013618d1de1b5d6b8c1088aaf87b4bacc10c2371f15a566701@%3Cnotifications.zookeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/r1fc73f0e16ec2fa249d3ad39a5194afb9cc5afb4c023dc0bab5a5881@%3Cissues.hive.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/rbc45eb0f53fd6242af3e666c2189464f848a851d408289840cecc6e3@%3Ccommits.zookeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/r9a79175c393d14d760a0ae3731b4a873230a16ef321aa9ca48a810cd@%3Cissues.zookeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/r5a68258e5ab12532dc179edae3d6e87037fa3b50ab9d63a90c432507@%3Cissues.hive.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/r9776e71e3c67c5d13a91c1eba0dc025b48b802eb7561cc6956d6961c@%3Cissues.hive.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/rd5d58088812cf8e677d99b07f73c654014c524c94e7fedbdee047604@%3Ctorque-dev.db.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/r7e739f2961753af95e2a3a637828fb88bfca68e5d6b0221d483a9ee5@%3Cnotifications.zookeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/re024d86dffa72ad800f2848d0c77ed93f0b78ee808350b477a6ed987@%3Cgitbox.hive.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/rf1c2a81a08034c688b8f15cf58a4cfab322d00002ca46d20133bee20@%3Cdev.kafka.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/r48bcd06049c1779ef709564544c3d8a32ae6ee5c3b7281a606ac4463@%3Cjira.kafka.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/rc2dbc4633a6eea1fcbce6831876cfa17b73759a98c65326d1896cb1a%40%3Ctorque-dev.db.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/r8c001b9a95c0bbec06f4457721edd94935a55932e64b82cc5582b846@%3Cissues.zookeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://github.com/advisories/GHSA-vwqq-5vrc-xw9h"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://issues.apache.org/jira/browse/LOG4J2-2819"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/rd5d58088812cf8e677d99b07f73c654014c524c94e7fedbdee047604%40%3Ctorque-dev.db.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/r33864a0fc171c1c4bf680645ebb6d4f8057899ab294a43e1e4fe9d04@%3Cissues.hive.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/rd55f65c6822ff235eda435d31488cfbb9aa7055cdf47481ebee777cc@%3Cissues.zookeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/rd8e87c4d69df335d0ba7d815b63be8bd8a6352f429765c52eb07ddac@%3Cissues.zookeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/r7e5c10534ed06bf805473ac85e8412fe3908a8fa4cabf5027bf11220@%3Cdev.kafka.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/r0df3d7a5acb98c57e64ab9266aa21eeee1d9b399addb96f9cf1cbe05@%3Cdev.zookeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/r4285398e5585a0456d3d9db021a4fce6e6fcf3ec027dfa13a450ec98@%3Cissues.zookeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/r3d1d00441c55144a4013adda74b051ae7864128ebcfb6ee9721a2eb3@%3Cissues.hive.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/r4ed1f49616a8603832d378cb9d13e7a8b9b27972bb46d946ccd8491f@%3Cissues.hive.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/r0a2699f724156a558afd1abb6c044fb9132caa66dce861b82699722a@%3Cjira.kafka.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20200504-0003"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/r22a56beb76dd8cf18e24fda9072f1e05990f49d6439662d3782a392f@%3Cissues.hive.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/r8e96c340004b7898cad3204ea51280ef6e4b553a684e1452bf1b18b1@%3Cjira.kafka.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/r48efc7cb5aeb4e1f67aaa06fb4b5479a5635d12f07d0b93fc2d08809@%3Ccommits.zookeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://lists.apache.org/thread.html/rec34b1cccf907898e7cb36051ffac3ccf1ea89d0b261a2a3b3fb267f@%3Ccommits.zookeeper.apache.org%3E"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2020:2391"
          }
        },
        {
          "severity": "low",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831139"
          }
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-9488"
          },
          "vector": "0.57271"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-9488"
          },
          "vector": "0.57507"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-9488"
          },
          "vector": "0.57576"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-9488"
          },
          "vector": "0.57595"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-9488"
          },
          "vector": "0.57650"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-9488"
          },
          "vector": "0.57654"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-9488"
          },
          "vector": "0.57657"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-9488"
          },
          "vector": "0.57673"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-9488"
          },
          "vector": "0.57699"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-9488"
          },
          "vector": "0.57820"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-9488"
          },
          "vector": "0.57855"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-9488"
          },
          "vector": "0.57896"
        },
        {
          "score": 3.3,
          "source": {
            "url": "https://lists.apache.org/thread.html/rc2dbc4633a6eea1fcbce6831876cfa17b73759a98c65326d1896cb1a%40%3Ctorque-dev.db.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.3,
          "source": {
            "url": "https://lists.apache.org/thread.html/rd5d58088812cf8e677d99b07f73c654014c524c94e7fedbdee047604%40%3Ctorque-dev.db.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.3,
          "source": {
            "url": "https://lists.apache.org/thread.html/rbc7642b9800249553f13457e46b813bea1aec99d2bc9106510e00ff3%40%3Ctorque-dev.db.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/rbc7642b9800249553f13457e46b813bea1aec99d2bc9106510e00ff3@%3Ctorque-dev.db.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/r8e96c340004b7898cad3204ea51280ef6e4b553a684e1452bf1b18b1@%3Cjira.kafka.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/rf1c2a81a08034c688b8f15cf58a4cfab322d00002ca46d20133bee20@%3Cdev.kafka.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9488"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/rd8e87c4d69df335d0ba7d815b63be8bd8a6352f429765c52eb07ddac@%3Cissues.zookeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/r0df3d7a5acb98c57e64ab9266aa21eeee1d9b399addb96f9cf1cbe05@%3Cdev.zookeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/r4d5dc9f3520071338d9ebc26f9f158a43ae28a91923d176b550a807b@%3Cdev.hive.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/r4db540cafc5d7232c62e076051ef661d37d345015b2e59b3f81a932f@%3Cdev.hive.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/r8c001b9a95c0bbec06f4457721edd94935a55932e64b82cc5582b846@%3Cissues.zookeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9488.json"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://issues.apache.org/jira/browse/LOG4J2-2819"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/re024d86dffa72ad800f2848d0c77ed93f0b78ee808350b477a6ed987@%3Cgitbox.hive.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/r1fc73f0e16ec2fa249d3ad39a5194afb9cc5afb4c023dc0bab5a5881@%3Cissues.hive.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/r5a68258e5ab12532dc179edae3d6e87037fa3b50ab9d63a90c432507@%3Cissues.hive.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/rc6b81c013618d1de1b5d6b8c1088aaf87b4bacc10c2371f15a566701@%3Cnotifications.zookeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/rec34b1cccf907898e7cb36051ffac3ccf1ea89d0b261a2a3b3fb267f@%3Ccommits.zookeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/r33864a0fc171c1c4bf680645ebb6d4f8057899ab294a43e1e4fe9d04@%3Cissues.hive.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/r4ed1f49616a8603832d378cb9d13e7a8b9b27972bb46d946ccd8491f@%3Cissues.hive.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/r9a79175c393d14d760a0ae3731b4a873230a16ef321aa9ca48a810cd@%3Cissues.zookeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/r65578f3761a89bc164e8964acd5d913b9f8fd997967b195a89a97ca3@%3Cissues.hive.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/ra632b329b2ae2324fabbad5da204c4ec2e171ff60348ec4ba698fd40@%3Cissues.hive.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/r0a2699f724156a558afd1abb6c044fb9132caa66dce861b82699722a@%3Cjira.kafka.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20200504-0003"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/r393943de452406f0f6f4b3def9f8d3c071f96323c1f6ed1a098f7fe4@%3Ctorque-dev.db.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/r22a56beb76dd8cf18e24fda9072f1e05990f49d6439662d3782a392f@%3Cissues.hive.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/r7641ee788e1eb1be4bb206a7d15f8a64ec6ef23e5ec6132d5a567695@%3Cnotifications.zookeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/r9776e71e3c67c5d13a91c1eba0dc025b48b802eb7561cc6956d6961c@%3Cissues.hive.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/rd55f65c6822ff235eda435d31488cfbb9aa7055cdf47481ebee777cc@%3Cissues.zookeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/rc2dbc4633a6eea1fcbce6831876cfa17b73759a98c65326d1896cb1a@%3Ctorque-dev.db.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/r48efc7cb5aeb4e1f67aaa06fb4b5479a5635d12f07d0b93fc2d08809@%3Ccommits.zookeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/r7e5c10534ed06bf805473ac85e8412fe3908a8fa4cabf5027bf11220@%3Cdev.kafka.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/r45916179811a32cbaa500f972de9098e6ee80ee81c7f134fce83e03a@%3Cissues.flink.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/r3d1d00441c55144a4013adda74b051ae7864128ebcfb6ee9721a2eb3@%3Cissues.hive.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/rd5d58088812cf8e677d99b07f73c654014c524c94e7fedbdee047604@%3Ctorque-dev.db.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/r7e739f2961753af95e2a3a637828fb88bfca68e5d6b0221d483a9ee5@%3Cnotifications.zookeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/ra051e07a0eea4943fa104247e69596f094951f51512d42c924e86c75@%3Cissues.hive.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/r48bcd06049c1779ef709564544c3d8a32ae6ee5c3b7281a606ac4463@%3Cjira.kafka.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/r2f209d271349bafd91537a558a279c08ebcff8fa3e547357d58833e6@%3Cdev.zookeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/rbc45eb0f53fd6242af3e666c2189464f848a851d408289840cecc6e3@%3Ccommits.zookeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 3.7,
          "source": {
            "url": "https://lists.apache.org/thread.html/r4285398e5585a0456d3d9db021a4fce6e6fcf3ec027dfa13a450ec98@%3Cissues.zookeeper.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
        },
        {
          "score": 4.3,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9488"
          },
          "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"
        },
        {
          "score": 4.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
        },
        {
          "score": 4.8,
          "source": {
            "url": "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26%40%3Ccommits.pulsar.apache.org%3E"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L"
        },
        {
          "score": 5.3,
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 8.2,
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpuoct2021.html"
          },
          "vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"
        },
        {
          "score": 8.6,
          "source": {
            "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00017.html"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpujul2020.html"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpujan2021.html"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 10.0,
          "source": {
            "url": "https://www.debian.org/security/2021/dsa-5020"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"
        },
        {
          "source": {
            "url": "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26%40%3Ccommits.pulsar.apache.org%3E"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2020:5568"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2020:3817"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0497"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2021:1044"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0507"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2020:3626"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2020:3779"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2021:0603"
          }
        }
      ],
      "references": [
        {
          "id": "",
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9488.json"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-9488"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9488"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://issues.apache.org/jira/browse/LOG4J2-2819"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r0a2699f724156a558afd1abb6c044fb9132caa66dce861b82699722a%40%3Cjira.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r0a2699f724156a558afd1abb6c044fb9132caa66dce861b82699722a@%3Cjira.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r0df3d7a5acb98c57e64ab9266aa21eeee1d9b399addb96f9cf1cbe05%40%3Cdev.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r0df3d7a5acb98c57e64ab9266aa21eeee1d9b399addb96f9cf1cbe05@%3Cdev.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r1fc73f0e16ec2fa249d3ad39a5194afb9cc5afb4c023dc0bab5a5881%40%3Cissues.hive.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r1fc73f0e16ec2fa249d3ad39a5194afb9cc5afb4c023dc0bab5a5881@%3Cissues.hive.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r22a56beb76dd8cf18e24fda9072f1e05990f49d6439662d3782a392f%40%3Cissues.hive.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r22a56beb76dd8cf18e24fda9072f1e05990f49d6439662d3782a392f@%3Cissues.hive.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe%40%3Cusers.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r2f209d271349bafd91537a558a279c08ebcff8fa3e547357d58833e6%40%3Cdev.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r2f209d271349bafd91537a558a279c08ebcff8fa3e547357d58833e6@%3Cdev.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r33864a0fc171c1c4bf680645ebb6d4f8057899ab294a43e1e4fe9d04%40%3Cissues.hive.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r33864a0fc171c1c4bf680645ebb6d4f8057899ab294a43e1e4fe9d04@%3Cissues.hive.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r393943de452406f0f6f4b3def9f8d3c071f96323c1f6ed1a098f7fe4%40%3Ctorque-dev.db.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r393943de452406f0f6f4b3def9f8d3c071f96323c1f6ed1a098f7fe4@%3Ctorque-dev.db.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r3d1d00441c55144a4013adda74b051ae7864128ebcfb6ee9721a2eb3%40%3Cissues.hive.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r3d1d00441c55144a4013adda74b051ae7864128ebcfb6ee9721a2eb3@%3Cissues.hive.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r4285398e5585a0456d3d9db021a4fce6e6fcf3ec027dfa13a450ec98%40%3Cissues.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r4285398e5585a0456d3d9db021a4fce6e6fcf3ec027dfa13a450ec98@%3Cissues.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r45916179811a32cbaa500f972de9098e6ee80ee81c7f134fce83e03a%40%3Cissues.flink.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r45916179811a32cbaa500f972de9098e6ee80ee81c7f134fce83e03a@%3Cissues.flink.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r48bcd06049c1779ef709564544c3d8a32ae6ee5c3b7281a606ac4463%40%3Cjira.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r48bcd06049c1779ef709564544c3d8a32ae6ee5c3b7281a606ac4463@%3Cjira.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r48efc7cb5aeb4e1f67aaa06fb4b5479a5635d12f07d0b93fc2d08809%40%3Ccommits.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r48efc7cb5aeb4e1f67aaa06fb4b5479a5635d12f07d0b93fc2d08809@%3Ccommits.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r4d5dc9f3520071338d9ebc26f9f158a43ae28a91923d176b550a807b%40%3Cdev.hive.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r4d5dc9f3520071338d9ebc26f9f158a43ae28a91923d176b550a807b@%3Cdev.hive.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r4db540cafc5d7232c62e076051ef661d37d345015b2e59b3f81a932f%40%3Cdev.hive.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r4db540cafc5d7232c62e076051ef661d37d345015b2e59b3f81a932f@%3Cdev.hive.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r4ed1f49616a8603832d378cb9d13e7a8b9b27972bb46d946ccd8491f%40%3Cissues.hive.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r4ed1f49616a8603832d378cb9d13e7a8b9b27972bb46d946ccd8491f@%3Cissues.hive.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r5a68258e5ab12532dc179edae3d6e87037fa3b50ab9d63a90c432507%40%3Cissues.hive.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r5a68258e5ab12532dc179edae3d6e87037fa3b50ab9d63a90c432507@%3Cissues.hive.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r65578f3761a89bc164e8964acd5d913b9f8fd997967b195a89a97ca3%40%3Cissues.hive.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r65578f3761a89bc164e8964acd5d913b9f8fd997967b195a89a97ca3@%3Cissues.hive.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r7641ee788e1eb1be4bb206a7d15f8a64ec6ef23e5ec6132d5a567695%40%3Cnotifications.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r7641ee788e1eb1be4bb206a7d15f8a64ec6ef23e5ec6132d5a567695@%3Cnotifications.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r7e5c10534ed06bf805473ac85e8412fe3908a8fa4cabf5027bf11220%40%3Cdev.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r7e5c10534ed06bf805473ac85e8412fe3908a8fa4cabf5027bf11220@%3Cdev.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r7e739f2961753af95e2a3a637828fb88bfca68e5d6b0221d483a9ee5%40%3Cnotifications.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r7e739f2961753af95e2a3a637828fb88bfca68e5d6b0221d483a9ee5@%3Cnotifications.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r8c001b9a95c0bbec06f4457721edd94935a55932e64b82cc5582b846%40%3Cissues.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r8c001b9a95c0bbec06f4457721edd94935a55932e64b82cc5582b846@%3Cissues.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r8e96c340004b7898cad3204ea51280ef6e4b553a684e1452bf1b18b1%40%3Cjira.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r8e96c340004b7898cad3204ea51280ef6e4b553a684e1452bf1b18b1@%3Cjira.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r9776e71e3c67c5d13a91c1eba0dc025b48b802eb7561cc6956d6961c%40%3Cissues.hive.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r9776e71e3c67c5d13a91c1eba0dc025b48b802eb7561cc6956d6961c@%3Cissues.hive.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r9a79175c393d14d760a0ae3731b4a873230a16ef321aa9ca48a810cd%40%3Cissues.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/r9a79175c393d14d760a0ae3731b4a873230a16ef321aa9ca48a810cd@%3Cissues.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/ra051e07a0eea4943fa104247e69596f094951f51512d42c924e86c75%40%3Cissues.hive.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/ra051e07a0eea4943fa104247e69596f094951f51512d42c924e86c75@%3Cissues.hive.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/ra632b329b2ae2324fabbad5da204c4ec2e171ff60348ec4ba698fd40%40%3Cissues.hive.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/ra632b329b2ae2324fabbad5da204c4ec2e171ff60348ec4ba698fd40@%3Cissues.hive.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rbc45eb0f53fd6242af3e666c2189464f848a851d408289840cecc6e3%40%3Ccommits.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rbc45eb0f53fd6242af3e666c2189464f848a851d408289840cecc6e3@%3Ccommits.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rbc7642b9800249553f13457e46b813bea1aec99d2bc9106510e00ff3%40%3Ctorque-dev.db.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rbc7642b9800249553f13457e46b813bea1aec99d2bc9106510e00ff3@%3Ctorque-dev.db.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rc2dbc4633a6eea1fcbce6831876cfa17b73759a98c65326d1896cb1a%40%3Ctorque-dev.db.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rc2dbc4633a6eea1fcbce6831876cfa17b73759a98c65326d1896cb1a@%3Ctorque-dev.db.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rc6b81c013618d1de1b5d6b8c1088aaf87b4bacc10c2371f15a566701%40%3Cnotifications.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rc6b81c013618d1de1b5d6b8c1088aaf87b4bacc10c2371f15a566701@%3Cnotifications.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26%40%3Ccommits.pulsar.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rd55f65c6822ff235eda435d31488cfbb9aa7055cdf47481ebee777cc%40%3Cissues.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rd55f65c6822ff235eda435d31488cfbb9aa7055cdf47481ebee777cc@%3Cissues.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rd5d58088812cf8e677d99b07f73c654014c524c94e7fedbdee047604%40%3Ctorque-dev.db.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rd5d58088812cf8e677d99b07f73c654014c524c94e7fedbdee047604@%3Ctorque-dev.db.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rd8e87c4d69df335d0ba7d815b63be8bd8a6352f429765c52eb07ddac%40%3Cissues.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rd8e87c4d69df335d0ba7d815b63be8bd8a6352f429765c52eb07ddac@%3Cissues.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/re024d86dffa72ad800f2848d0c77ed93f0b78ee808350b477a6ed987%40%3Cgitbox.hive.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/re024d86dffa72ad800f2848d0c77ed93f0b78ee808350b477a6ed987@%3Cgitbox.hive.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rec34b1cccf907898e7cb36051ffac3ccf1ea89d0b261a2a3b3fb267f%40%3Ccommits.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rec34b1cccf907898e7cb36051ffac3ccf1ea89d0b261a2a3b3fb267f@%3Ccommits.zookeeper.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rf1c2a81a08034c688b8f15cf58a4cfab322d00002ca46d20133bee20%40%3Cdev.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rf1c2a81a08034c688b8f15cf58a4cfab322d00002ca46d20133bee20@%3Cdev.kafka.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00017.html"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20200504-0003"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20200504-0003/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.debian.org/security/2021/dsa-5020"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpujan2021.html"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpujul2020.html"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpuoct2021.html"
          }
        },
        {
          "id": "1831139",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831139"
          }
        },
        {
          "id": "959450",
          "source": {
            "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959450"
          }
        },
        {
          "id": "CVE-2020-9488",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9488"
          }
        },
        {
          "id": "GHSA-vwqq-5vrc-xw9h",
          "source": {
            "url": "https://github.com/advisories/GHSA-vwqq-5vrc-xw9h"
          }
        },
        {
          "id": "GLSA-202402-16",
          "source": {
            "url": "https://security.gentoo.org/glsa/202402-16"
          }
        },
        {
          "id": "RHSA-2020:2391",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2020:2391"
          }
        },
        {
          "id": "RHSA-2020:3626",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2020:3626"
          }
        },
        {
          "id": "RHSA-2020:3779",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2020:3779"
          }
        },
        {
          "id": "RHSA-2020:3817",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2020:3817"
          }
        },
        {
          "id": "RHSA-2020:5568",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2020:5568"
          }
        },
        {
          "id": "RHSA-2021:0603",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2021:0603"
          }
        },
        {
          "id": "RHSA-2021:1044",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2021:1044"
          }
        },
        {
          "id": "RHSA-2021:5134",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2021:5134"
          }
        },
        {
          "id": "RHSA-2022:0497",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0497"
          }
        },
        {
          "id": "RHSA-2022:0507",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0507"
          }
        },
        {
          "id": "cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_application_session_controller:3.9m0p1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_application_session_controller:3.9m0p1:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.3.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.3.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:7.5.0.23.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_billing_and_revenue_management:7.5.0.23.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_eagle_ftp_table_base_retrieval:4.5:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_eagle_ftp_table_base_retrieval:4.5:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.3.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.3.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_services_gatekeeper:7.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_services_gatekeeper:7.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:data_integrator:12.2.1.3.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:data_integrator:12.2.1.3.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:data_integrator:12.2.1.4.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:data_integrator:12.2.1.4.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:enterprise_manager_for_peoplesoft:13.4.1.1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_for_peoplesoft:13.4.1.1:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.0.6:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.0.6:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.1.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.1.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.7.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.7.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.6:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.6:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.8:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.8:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.1.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.1.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:financial_services_price_creation_and_discovery:8.0.6:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:financial_services_price_creation_and_discovery:8.0.6:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:financial_services_price_creation_and_discovery:8.0.7:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:financial_services_price_creation_and_discovery:8.0.7:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:financial_services_retail_customer_analytics:8.0.6:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:financial_services_retail_customer_analytics:8.0.6:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:flexcube_core_banking:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:flexcube_core_banking:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:flexcube_core_banking:5.2.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:flexcube_core_banking:5.2.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:flexcube_private_banking:12.0.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:flexcube_private_banking:12.0.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:flexcube_private_banking:12.1.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:flexcube_private_banking:12.1.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:health_sciences_information_manager:3.0.1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:health_sciences_information_manager:3.0.1:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:insurance_insbridge_rating_and_underwriting:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:insurance_insbridge_rating_and_underwriting:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:insurance_insbridge_rating_and_underwriting:5.6.1.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:insurance_insbridge_rating_and_underwriting:5.6.1.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:insurance_policy_administration_j2ee:10.2.0.37:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:insurance_policy_administration_j2ee:10.2.0.37:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:insurance_policy_administration_j2ee:10.2.4.12:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:insurance_policy_administration_j2ee:10.2.4.12:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:insurance_policy_administration_j2ee:11.0.2.25:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:insurance_policy_administration_j2ee:11.0.2.25:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:insurance_policy_administration_j2ee:11.1.0.15:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:insurance_policy_administration_j2ee:11.1.0.15:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:insurance_policy_administration_j2ee:11.2.0.26:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:insurance_policy_administration_j2ee:11.2.0.26:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:insurance_rules_palette:10.2.0.37:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:insurance_rules_palette:10.2.0.37:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:insurance_rules_palette:10.2.4.12:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:insurance_rules_palette:10.2.4.12:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:insurance_rules_palette:11.0.2.25:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:insurance_rules_palette:11.0.2.25:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:insurance_rules_palette:11.1.0.15:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:insurance_rules_palette:11.1.0.15:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:insurance_rules_palette:11.2.0.26:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:insurance_rules_palette:11.2.0.26:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:jd_edwards_world_security:a9.4:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jd_edwards_world_security:a9.4:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:oracle_goldengate_application_adapters:19.1.0.0.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:oracle_goldengate_application_adapters:19.1.0.0.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:policy_automation:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:policy_automation:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:policy_automation_connector_for_siebel:10.4.6:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:policy_automation_connector_for_siebel:10.4.6:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:policy_automation_for_mobile_devices:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:policy_automation_for_mobile_devices:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:primavera_unifier:19.12:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:primavera_unifier:19.12:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_advanced_inventory_planning:14.1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_advanced_inventory_planning:14.1:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_assortment_planning:15.0.3.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_assortment_planning:15.0.3.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_assortment_planning:16.0.3.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_assortment_planning:16.0.3.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_bulk_data_integration:15.0.3.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_bulk_data_integration:15.0.3.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_bulk_data_integration:16.0.3.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_bulk_data_integration:16.0.3.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_customer_management_and_segmentation_foundation:16.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_customer_management_and_segmentation_foundation:16.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_customer_management_and_segmentation_foundation:17.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_customer_management_and_segmentation_foundation:17.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_customer_management_and_segmentation_foundation:18.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_customer_management_and_segmentation_foundation:18.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_customer_management_and_segmentation_foundation:19.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_customer_management_and_segmentation_foundation:19.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_eftlink:15.0.2:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_eftlink:15.0.2:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_eftlink:16.0.3:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_eftlink:16.0.3:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_eftlink:17.0.2:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_eftlink:17.0.2:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_eftlink:18.0.1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_eftlink:18.0.1:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_eftlink:19.0.1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_eftlink:19.0.1:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_insights_cloud_service_suite:19.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_insights_cloud_service_suite:19.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_integration_bus:14.1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_integration_bus:14.1:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_integration_bus:15.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_integration_bus:15.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_integration_bus:16.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_integration_bus:16.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_order_broker_cloud_service:16.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_order_broker_cloud_service:16.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_order_broker_cloud_service:18.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_order_broker_cloud_service:18.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_order_broker_cloud_service:19.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_order_broker_cloud_service:19.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_order_broker_cloud_service:19.1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_order_broker_cloud_service:19.1:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_order_broker_cloud_service:19.2:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_order_broker_cloud_service:19.2:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_order_broker_cloud_service:19.3:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_order_broker_cloud_service:19.3:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_predictive_application_server:14.1.3.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_predictive_application_server:14.1.3.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_predictive_application_server:15.0.3.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_predictive_application_server:15.0.3.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_predictive_application_server:16.0.3.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_predictive_application_server:16.0.3.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_xstore_point_of_service:15.0.4:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_xstore_point_of_service:15.0.4:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_xstore_point_of_service:16.0.6:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_xstore_point_of_service:16.0.6:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_xstore_point_of_service:17.0.4:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_xstore_point_of_service:17.0.4:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_xstore_point_of_service:18.0.3:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_xstore_point_of_service:18.0.3:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_xstore_point_of_service:19.0.2:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_xstore_point_of_service:19.0.2:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:siebel_apps_-_marketing:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:siebel_apps_-_marketing:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:siebel_ui_framework:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:siebel_ui_framework:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:spatial_and_graph:12.2.0.1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:spatial_and_graph:12.2.0.1:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:spatial_and_graph:18c:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:spatial_and_graph:18c:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:spatial_and_graph:19c:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:spatial_and_graph:19c:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:storagetek_acsls:8.5.1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:storagetek_acsls:8.5.1:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:storagetek_tape_analytics_sw_tool:2.3.1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:storagetek_tape_analytics_sw_tool:2.3.1:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:utilities_framework:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:utilities_framework:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:utilities_framework:2.2.0.0.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:utilities_framework:2.2.0.0.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:utilities_framework:4.2.0.2.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:utilities_framework:4.2.0.2.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:utilities_framework:4.2.0.3.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:utilities_framework:4.2.0.3.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:utilities_framework:4.4.0.0.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:utilities_framework:4.4.0.0.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:utilities_framework:4.4.0.2.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:utilities_framework:4.4.0.2.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:qos:reload4j:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qos:reload4j:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
          }
        }
      ],
      "source": {
        "name": "VulnerableCode",
        "url": "http://public.vulnerablecode.io/vulnerabilities/VCID-v4hh-94r5-aaaj"
      }
    },
    {
      "affects": [
        {
          "ref": "pkg:pypi/djangorestframework@3.13.1"
        }
      ],
      "bom-ref": "BomRef.7834107159981837.027126052284387803",
      "description": "Versions of the package djangorestframework before 3.15.2 are vulnerable to Cross-site Scripting (XSS) via the break_long_headers template filter due to improper input sanitization before splitting and joining with <br> tags.",
      "id": "VCID-v9uh-cjyb-aaae",
      "ratings": [
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21520"
          },
          "vector": "0.16666"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21520"
          },
          "vector": "0.16947"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21520"
          },
          "vector": "0.17041"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21520"
          },
          "vector": "0.17069"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21520"
          },
          "vector": "0.17142"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21520"
          },
          "vector": "0.17147"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21520"
          },
          "vector": "0.17164"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21520"
          },
          "vector": "0.17226"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21520"
          },
          "vector": "0.17329"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21520"
          },
          "vector": "0.17645"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21520"
          },
          "vector": "0.17732"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21520"
          },
          "vector": "0.17830"
        },
        {
          "score": 6.1,
          "source": {
            "url": "https://github.com/encode/django-rest-framework/commit/3b41f0124194430da957b119712978fa2266b642"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
        },
        {
          "score": 6.1,
          "source": {
            "url": "https://github.com/encode/django-rest-framework"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
        },
        {
          "score": 6.1,
          "source": {
            "url": "https://security.snyk.io/vuln/SNYK-PYTHON-DJANGORESTFRAMEWORK-7252137"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
        },
        {
          "score": 6.1,
          "source": {
            "url": "https://github.com/encode/django-rest-framework/pull/9435"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
        },
        {
          "score": 6.1,
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
        },
        {
          "score": 6.1,
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21520.json"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
        },
        {
          "score": 6.1,
          "source": {
            "url": "https://github.com/encode/django-rest-framework/compare/3.15.1...3.15.2"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
        },
        {
          "source": {
            "url": "https://github.com/encode/django-rest-framework/compare/3.15.1...3.15.2"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/encode/django-rest-framework"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/encode/django-rest-framework/pull/9435"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/encode/django-rest-framework/commit/3b41f0124194430da957b119712978fa2266b642"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://security.snyk.io/vuln/SNYK-PYTHON-DJANGORESTFRAMEWORK-7252137"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/advisories/GHSA-gw84-84pc-xp82"
          },
          "vector": ""
        }
      ],
      "references": [
        {
          "id": "",
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21520.json"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21520"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21520"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/encode/django-rest-framework"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/encode/django-rest-framework/commit/3b41f0124194430da957b119712978fa2266b642"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/encode/django-rest-framework/compare/3.15.1...3.15.2"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/encode/django-rest-framework/pull/9435"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://security.snyk.io/vuln/SNYK-PYTHON-DJANGORESTFRAMEWORK-7252137"
          }
        },
        {
          "id": "2294457",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294457"
          }
        },
        {
          "id": "CVE-2024-21520",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21520"
          }
        },
        {
          "id": "GHSA-gw84-84pc-xp82",
          "source": {
            "url": "https://github.com/advisories/GHSA-gw84-84pc-xp82"
          }
        },
        {
          "id": "RHSA-2024:7312",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:7312"
          }
        }
      ],
      "source": {
        "name": "VulnerableCode",
        "url": "http://public.vulnerablecode.io/vulnerabilities/VCID-v9uh-cjyb-aaae"
      }
    },
    {
      "affects": [
        {
          "ref": "pkg:maven/log4j/log4j@1.2.17"
        }
      ],
      "bom-ref": "BomRef.6209676074225114.14783066915414367",
      "description": "Deserialization of Untrusted Data in Log4j 1.x",
      "id": "VCID-wk9g-2r1h-aaan",
      "ratings": [
        {
          "severity": "critical",
          "source": {
            "url": "https://logging.apache.org/log4j/1.2/index.html"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://lists.apache.org/thread/bsr3l5qz4g0myrjhy9h67bcxodpkwj4w"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20220217-0006"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/apache/logging-log4j1"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/advisories/GHSA-w9p3-5cr8-m3jj"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "http://www.openwall.com/lists/oss-security/2022/01/18/3"
          },
          "vector": ""
        },
        {
          "severity": "low",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:1296"
          }
        },
        {
          "severity": "low",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:1297"
          }
        },
        {
          "severity": "low",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:1299"
          }
        },
        {
          "severity": "low",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0524"
          }
        },
        {
          "severity": "low",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0527"
          }
        },
        {
          "severity": "low",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0475"
          }
        },
        {
          "severity": "medium",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041949"
          }
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23302"
          },
          "vector": "0.77819"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23302"
          },
          "vector": "0.77952"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23302"
          },
          "vector": "0.77987"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23302"
          },
          "vector": "0.77998"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23302"
          },
          "vector": "0.78035"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23302"
          },
          "vector": "0.78037"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23302"
          },
          "vector": "0.78038"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23302"
          },
          "vector": "0.78052"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23302"
          },
          "vector": "0.78058"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23302"
          },
          "vector": "0.78115"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23302"
          },
          "vector": "0.78130"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23302"
          },
          "vector": "0.78145"
        },
        {
          "score": 5.3,
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
        },
        {
          "score": 6.0,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23302"
          },
          "vector": "AV:N/AC:M/Au:S/C:P/I:P/A:P"
        },
        {
          "score": 6.6,
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 8.8,
          "source": {
            "url": "https://lists.apache.org/thread/bsr3l5qz4g0myrjhy9h67bcxodpkwj4w"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 8.8,
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23302.json"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 8.8,
          "source": {
            "url": "http://www.openwall.com/lists/oss-security/2022/01/18/3"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 8.8,
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20220217-0006"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 8.8,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23302"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 8.8,
          "source": {
            "url": "https://github.com/apache/logging-log4j1"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://logging.apache.org/log4j/1.2/index.html"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0442"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0446"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0438"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0430"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0289"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0507"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0448"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0435"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0436"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:5459"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0291"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0450"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0553"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0449"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0294"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0290"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0439"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0447"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0497"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0661"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:5460"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:5458"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0467"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0437"
          }
        }
      ],
      "references": [
        {
          "id": "",
          "source": {
            "url": "http://www.openwall.com/lists/oss-security/2022/01/18/3"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23302.json"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23302"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23302"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/apache/logging-log4j1"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread/bsr3l5qz4g0myrjhy9h67bcxodpkwj4w"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://logging.apache.org/log4j/1.2/index.html"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20220217-0006"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20220217-0006/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
          }
        },
        {
          "id": "1004482",
          "source": {
            "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004482"
          }
        },
        {
          "id": "2041949",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041949"
          }
        },
        {
          "id": "CVE-2022-23302",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23302"
          }
        },
        {
          "id": "GHSA-w9p3-5cr8-m3jj",
          "source": {
            "url": "https://github.com/advisories/GHSA-w9p3-5cr8-m3jj"
          }
        },
        {
          "id": "GLSA-202402-16",
          "source": {
            "url": "https://security.gentoo.org/glsa/202402-16"
          }
        },
        {
          "id": "RHSA-2022:0289",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0289"
          }
        },
        {
          "id": "RHSA-2022:0290",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0290"
          }
        },
        {
          "id": "RHSA-2022:0291",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0291"
          }
        },
        {
          "id": "RHSA-2022:0294",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0294"
          }
        },
        {
          "id": "RHSA-2022:0430",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0430"
          }
        },
        {
          "id": "RHSA-2022:0435",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0435"
          }
        },
        {
          "id": "RHSA-2022:0436",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0436"
          }
        },
        {
          "id": "RHSA-2022:0437",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0437"
          }
        },
        {
          "id": "RHSA-2022:0438",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0438"
          }
        },
        {
          "id": "RHSA-2022:0439",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0439"
          }
        },
        {
          "id": "RHSA-2022:0442",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0442"
          }
        },
        {
          "id": "RHSA-2022:0444",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0444"
          }
        },
        {
          "id": "RHSA-2022:0445",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0445"
          }
        },
        {
          "id": "RHSA-2022:0446",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0446"
          }
        },
        {
          "id": "RHSA-2022:0447",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0447"
          }
        },
        {
          "id": "RHSA-2022:0448",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0448"
          }
        },
        {
          "id": "RHSA-2022:0449",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0449"
          }
        },
        {
          "id": "RHSA-2022:0450",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0450"
          }
        },
        {
          "id": "RHSA-2022:0467",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0467"
          }
        },
        {
          "id": "RHSA-2022:0469",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0469"
          }
        },
        {
          "id": "RHSA-2022:0475",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0475"
          }
        },
        {
          "id": "RHSA-2022:0497",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0497"
          }
        },
        {
          "id": "RHSA-2022:0507",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0507"
          }
        },
        {
          "id": "RHSA-2022:0524",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0524"
          }
        },
        {
          "id": "RHSA-2022:0527",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0527"
          }
        },
        {
          "id": "RHSA-2022:0553",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0553"
          }
        },
        {
          "id": "RHSA-2022:0661",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0661"
          }
        },
        {
          "id": "RHSA-2022:1296",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:1296"
          }
        },
        {
          "id": "RHSA-2022:1297",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:1297"
          }
        },
        {
          "id": "RHSA-2022:1299",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:1299"
          }
        },
        {
          "id": "RHSA-2022:5458",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:5458"
          }
        },
        {
          "id": "RHSA-2022:5459",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:5459"
          }
        },
        {
          "id": "RHSA-2022:5460",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:5460"
          }
        },
        {
          "id": "RHSA-2024:5856",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:5856"
          }
        },
        {
          "id": "USN-5998-1",
          "source": {
            "url": "https://usn.ubuntu.com/5998-1/"
          }
        },
        {
          "id": "cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:broadcom:brocade_sannav:-:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:broadcom:brocade_sannav:-:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:advanced_supply_chain_planning:12.1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:advanced_supply_chain_planning:12.1:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:advanced_supply_chain_planning:12.2:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:advanced_supply_chain_planning:12.2:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:business_intelligence:12.2.1.3.0:*:*:*:enterprise:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:business_intelligence:12.2.1.3.0:*:*:*:enterprise:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:enterprise:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:enterprise:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:business_intelligence:5.9.0.0.0:*:*:*:enterprise:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:business_intelligence:5.9.0.0.0:*:*:*:enterprise:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:business_process_management_suite:12.2.1.3.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:business_process_management_suite:12.2.1.3.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:business_process_management_suite:12.2.1.4.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:business_process_management_suite:12.2.1.4.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_eagle_ftp_table_base_retrieval:4.5:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_eagle_ftp_table_base_retrieval:4.5:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.5.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.5.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_network_integrity:7.3.6:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_integrity:7.3.6:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_offline_mediation_controller:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_offline_mediation_controller:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.5.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.5.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:e-business_suite_cloud_manager_and_cloud_backup_module:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:e-business_suite_cloud_manager_and_cloud_backup_module:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:e-business_suite_cloud_manager_and_cloud_backup_module:2.2.1.1.1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:e-business_suite_cloud_manager_and_cloud_backup_module:2.2.1.1.1:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.5.0.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_base_platform:13.5.0.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.7.0.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.7.0.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.7.0.1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.7.0.1:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.8.0.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.8.0.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:healthcare_foundation:8.1.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:healthcare_foundation:8.1.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:hyperion_data_relationship_management:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion_data_relationship_management:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:hyperion_infrastructure_technology:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion_infrastructure_technology:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:identity_management_suite:12.2.1.3.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:identity_management_suite:12.2.1.3.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:identity_management_suite:12.2.1.4.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:identity_management_suite:12.2.1.4.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:identity_manager_connector:11.1.1.5.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:identity_manager_connector:11.1.1.5.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:jdeveloper:12.2.1.3.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdeveloper:12.2.1.3.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:middleware_common_libraries_and_tools:12.2.1.4.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:middleware_common_libraries_and_tools:12.2.1.4.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:tuxedo:12.2.2.0.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:tuxedo:12.2.2.0.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:qos:reload4j:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qos:reload4j:*:*:*:*:*:*:*:*"
          }
        }
      ],
      "source": {
        "name": "VulnerableCode",
        "url": "http://public.vulnerablecode.io/vulnerabilities/VCID-wk9g-2r1h-aaan"
      }
    },
    {
      "affects": [
        {
          "ref": "pkg:maven/log4j/log4j@1.2.17"
        }
      ],
      "bom-ref": "BomRef.5380635454157253.03292817758092237",
      "description": "SQL Injection in Log4j 1.2.x",
      "id": "VCID-wueh-63zw-aaab",
      "ratings": [
        {
          "severity": "critical",
          "source": {
            "url": "https://lists.apache.org/thread/pt6lh3pbsvxqlwlp4c5l798dv2hkc85y"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20220217-0007"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://github.com/advisories/GHSA-65fg-84f6-3jq3"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "https://logging.apache.org/log4j/1.2/index.html"
          },
          "vector": ""
        },
        {
          "severity": "critical",
          "source": {
            "url": "http://www.openwall.com/lists/oss-security/2022/01/18/4"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://github.com/apache/logging-log4j1"
          },
          "vector": ""
        },
        {
          "severity": "high",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041959"
          }
        },
        {
          "severity": "low",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:1296"
          }
        },
        {
          "severity": "low",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:1297"
          }
        },
        {
          "severity": "low",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:1299"
          }
        },
        {
          "severity": "low",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0524"
          }
        },
        {
          "severity": "low",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0527"
          }
        },
        {
          "severity": "low",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0475"
          }
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23305"
          },
          "vector": "0.72655"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23305"
          },
          "vector": "0.72817"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23305"
          },
          "vector": "0.72858"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23305"
          },
          "vector": "0.72869"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23305"
          },
          "vector": "0.72912"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23305"
          },
          "vector": "0.72916"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23305"
          },
          "vector": "0.72925"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23305"
          },
          "vector": "0.72927"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23305"
          },
          "vector": "0.72997"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23305"
          },
          "vector": "0.73011"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23305"
          },
          "vector": "0.73043"
        },
        {
          "score": 5.3,
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
        },
        {
          "score": 6.8,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23305"
          },
          "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 8.1,
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 8.8,
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23305.json"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 8.8,
          "source": {
            "url": "https://github.com/apache/logging-log4j1"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://lists.apache.org/thread/pt6lh3pbsvxqlwlp4c5l798dv2hkc85y"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "http://www.openwall.com/lists/oss-security/2022/01/18/4"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://logging.apache.org/log4j/1.2/index.html"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20220217-0007"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 9.8,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23305"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0442"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0446"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0438"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0430"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0289"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0507"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0448"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0435"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0436"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:5459"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0291"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0450"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0553"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0449"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0294"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0290"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0439"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0447"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0497"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0661"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:5460"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:5458"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0467"
          }
        },
        {
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0437"
          }
        }
      ],
      "references": [
        {
          "id": "",
          "source": {
            "url": "http://www.openwall.com/lists/oss-security/2022/01/18/4"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23305.json"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23305"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23305"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/apache/logging-log4j1"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.apache.org/thread/pt6lh3pbsvxqlwlp4c5l798dv2hkc85y"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://logging.apache.org/log4j/1.2/index.html"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20220217-0007"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20220217-0007/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
          }
        },
        {
          "id": "1004482",
          "source": {
            "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004482"
          }
        },
        {
          "id": "2041959",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041959"
          }
        },
        {
          "id": "CVE-2022-23305",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23305"
          }
        },
        {
          "id": "GHSA-65fg-84f6-3jq3",
          "source": {
            "url": "https://github.com/advisories/GHSA-65fg-84f6-3jq3"
          }
        },
        {
          "id": "GLSA-202402-16",
          "source": {
            "url": "https://security.gentoo.org/glsa/202402-16"
          }
        },
        {
          "id": "RHSA-2022:0289",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0289"
          }
        },
        {
          "id": "RHSA-2022:0290",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0290"
          }
        },
        {
          "id": "RHSA-2022:0291",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0291"
          }
        },
        {
          "id": "RHSA-2022:0294",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0294"
          }
        },
        {
          "id": "RHSA-2022:0430",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0430"
          }
        },
        {
          "id": "RHSA-2022:0435",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0435"
          }
        },
        {
          "id": "RHSA-2022:0436",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0436"
          }
        },
        {
          "id": "RHSA-2022:0437",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0437"
          }
        },
        {
          "id": "RHSA-2022:0438",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0438"
          }
        },
        {
          "id": "RHSA-2022:0439",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0439"
          }
        },
        {
          "id": "RHSA-2022:0442",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0442"
          }
        },
        {
          "id": "RHSA-2022:0444",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0444"
          }
        },
        {
          "id": "RHSA-2022:0445",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0445"
          }
        },
        {
          "id": "RHSA-2022:0446",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0446"
          }
        },
        {
          "id": "RHSA-2022:0447",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0447"
          }
        },
        {
          "id": "RHSA-2022:0448",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0448"
          }
        },
        {
          "id": "RHSA-2022:0449",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0449"
          }
        },
        {
          "id": "RHSA-2022:0450",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0450"
          }
        },
        {
          "id": "RHSA-2022:0467",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0467"
          }
        },
        {
          "id": "RHSA-2022:0469",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0469"
          }
        },
        {
          "id": "RHSA-2022:0475",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0475"
          }
        },
        {
          "id": "RHSA-2022:0497",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0497"
          }
        },
        {
          "id": "RHSA-2022:0507",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0507"
          }
        },
        {
          "id": "RHSA-2022:0524",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0524"
          }
        },
        {
          "id": "RHSA-2022:0527",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0527"
          }
        },
        {
          "id": "RHSA-2022:0553",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0553"
          }
        },
        {
          "id": "RHSA-2022:0661",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:0661"
          }
        },
        {
          "id": "RHSA-2022:1296",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:1296"
          }
        },
        {
          "id": "RHSA-2022:1297",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:1297"
          }
        },
        {
          "id": "RHSA-2022:1299",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:1299"
          }
        },
        {
          "id": "RHSA-2022:5458",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:5458"
          }
        },
        {
          "id": "RHSA-2022:5459",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:5459"
          }
        },
        {
          "id": "RHSA-2022:5460",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2022:5460"
          }
        },
        {
          "id": "RHSA-2024:10207",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:10207"
          }
        },
        {
          "id": "RHSA-2024:5856",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:5856"
          }
        },
        {
          "id": "USN-5998-1",
          "source": {
            "url": "https://usn.ubuntu.com/5998-1/"
          }
        },
        {
          "id": "cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:broadcom:brocade_sannav:-:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:broadcom:brocade_sannav:-:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:advanced_supply_chain_planning:12.1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:advanced_supply_chain_planning:12.1:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:advanced_supply_chain_planning:12.2:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:advanced_supply_chain_planning:12.2:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:business_intelligence:12.2.1.3.0:*:*:*:enterprise:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:business_intelligence:12.2.1.3.0:*:*:*:enterprise:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:enterprise:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:enterprise:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:business_intelligence:5.9.0.0.0:*:*:*:enterprise:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:business_intelligence:5.9.0.0.0:*:*:*:enterprise:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:business_process_management_suite:12.2.1.3.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:business_process_management_suite:12.2.1.3.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:business_process_management_suite:12.2.1.4.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:business_process_management_suite:12.2.1.4.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_eagle_ftp_table_base_retrieval:4.5:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_eagle_ftp_table_base_retrieval:4.5:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.5.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.5.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_network_integrity:7.3.6:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_integrity:7.3.6:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_offline_mediation_controller:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_offline_mediation_controller:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.5.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.5.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:e-business_suite_cloud_manager_and_cloud_backup_module:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:e-business_suite_cloud_manager_and_cloud_backup_module:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:e-business_suite_cloud_manager_and_cloud_backup_module:2.2.1.1.1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:e-business_suite_cloud_manager_and_cloud_backup_module:2.2.1.1.1:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:e-business_suite_information_discovery:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:e-business_suite_information_discovery:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.5.0.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_base_platform:13.5.0.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.7.0.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.7.0.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.7.0.1:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.7.0.1:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.8.0.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.8.0.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:healthcare_foundation:8.1.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:healthcare_foundation:8.1.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:hyperion_data_relationship_management:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion_data_relationship_management:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:hyperion_infrastructure_technology:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion_infrastructure_technology:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:identity_management_suite:12.2.1.3.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:identity_management_suite:12.2.1.3.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:identity_management_suite:12.2.1.4.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:identity_management_suite:12.2.1.4.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:identity_manager_connector:11.1.1.5.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:identity_manager_connector:11.1.1.5.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:jdeveloper:12.2.1.3.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdeveloper:12.2.1.3.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:middleware_common_libraries_and_tools:12.2.1.4.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:middleware_common_libraries_and_tools:12.2.1.4.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:retail_extract_transform_and_load:13.2.5:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_extract_transform_and_load:13.2.5:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:tuxedo:12.2.2.0.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:tuxedo:12.2.2.0.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:qos:reload4j:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qos:reload4j:*:*:*:*:*:*:*:*"
          }
        }
      ],
      "source": {
        "name": "VulnerableCode",
        "url": "http://public.vulnerablecode.io/vulnerabilities/VCID-wueh-63zw-aaab"
      }
    },
    {
      "affects": [
        {
          "ref": "pkg:pypi/certifi@2022.5.18.1"
        }
      ],
      "bom-ref": "BomRef.9424967512577317.7733747826742606",
      "description": "Certifi removing TrustCor root certificate",
      "id": "VCID-yype-x2y2-aaae",
      "ratings": [
        {
          "severity": "low",
          "source": {
            "url": "https://github.com/certifi/python-certifi"
          },
          "vector": ""
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23491"
          },
          "vector": "0.24695"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23491"
          },
          "vector": "0.24993"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23491"
          },
          "vector": "0.25075"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23491"
          },
          "vector": "0.25098"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23491"
          },
          "vector": "0.25138"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23491"
          },
          "vector": "0.25151"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23491"
          },
          "vector": "0.25154"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23491"
          },
          "vector": "0.25162"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23491"
          },
          "vector": "0.25199"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23491"
          },
          "vector": "0.25439"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23491"
          },
          "vector": "0.25506"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23491"
          },
          "vector": "0.25596"
        },
        {
          "score": 6.6,
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
        },
        {
          "score": 6.8,
          "source": {
            "url": "https://github.com/certifi/python-certifi/commit/9e9e840925d7b8e76c76fdac1fab7e6e88c1c3b8"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N"
        },
        {
          "score": 6.8,
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/certifi/PYSEC-2022-42986.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N"
        },
        {
          "score": 6.8,
          "source": {
            "url": "https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/oxX69KFvsm4/m/yLohoVqtCgAJ"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23491.json"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://github.com/certifi/python-certifi"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 7.5,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23491"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/certifi/PYSEC-2022-42986.yaml"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/advisories/GHSA-43fp-rhv2-5gv8"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/certifi/python-certifi/commit/9e9e840925d7b8e76c76fdac1fab7e6e88c1c3b8"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/oxX69KFvsm4/m/yLohoVqtCgAJ"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/certifi/python-certifi/security/advisories/GHSA-43fp-rhv2-5gv8"
          },
          "vector": ""
        }
      ],
      "references": [
        {
          "id": "",
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23491.json"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23491"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23491"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/certifi/python-certifi"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/certifi/python-certifi/commit/9e9e840925d7b8e76c76fdac1fab7e6e88c1c3b8"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/certifi/PYSEC-2022-42986.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/oxX69KFvsm4/m/yLohoVqtCgAJ"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://security.netapp.com/advisory/ntap-20230223-0010/"
          }
        },
        {
          "id": "2180089",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180089"
          }
        },
        {
          "id": "CVE-2022-23491",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23491"
          }
        },
        {
          "id": "GHSA-43fp-rhv2-5gv8",
          "source": {
            "url": "https://github.com/advisories/GHSA-43fp-rhv2-5gv8"
          }
        },
        {
          "id": "GHSA-43fp-rhv2-5gv8",
          "source": {
            "url": "https://github.com/certifi/python-certifi/security/advisories/GHSA-43fp-rhv2-5gv8"
          }
        },
        {
          "id": "cpe:2.3:a:certifi_project:certifi:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:certifi_project:certifi:*:*:*:*:*:*:*:*"
          }
        },
        {
          "id": "cpe:2.3:a:certifi_project:certifi:2022.12.07:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:certifi_project:certifi:2022.12.07:*:*:*:*:*:*:*"
          }
        }
      ],
      "source": {
        "name": "VulnerableCode",
        "url": "http://public.vulnerablecode.io/vulnerabilities/VCID-yype-x2y2-aaae"
      }
    },
    {
      "affects": [
        {
          "ref": "pkg:pypi/python-ldap@3.2.0"
        }
      ],
      "bom-ref": "BomRef.19814764441004762.7024600408595396",
      "description": "ReDoS in LDAP schema parser",
      "id": "VCID-z1ua-283e-aaan",
      "ratings": [
        {
          "score": 6.5,
          "source": {
            "url": "https://github.com/python-ldap/python-ldap/issues/424"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 6.5,
          "source": {
            "url": "https://github.com/python-ldap/python-ldap/security/advisories/GHSA-r8wq-qrxc-hmcm"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 6.5,
          "source": {
            "url": "https://github.com/python-ldap/python-ldap"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "source": {
            "url": "https://github.com/python-ldap/python-ldap"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/python-ldap/python-ldap/security/advisories/GHSA-r8wq-qrxc-hmcm"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/advisories/GHSA-r8wq-qrxc-hmcm"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/python-ldap/python-ldap/issues/424"
          },
          "vector": ""
        }
      ],
      "references": [
        {
          "id": "",
          "source": {
            "url": "https://github.com/python-ldap/python-ldap"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/python-ldap/python-ldap/issues/424"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/python-ldap/python-ldap/security/advisories/GHSA-r8wq-qrxc-hmcm"
          }
        },
        {
          "id": "GHSA-r8wq-qrxc-hmcm",
          "source": {
            "url": "https://github.com/advisories/GHSA-r8wq-qrxc-hmcm"
          }
        }
      ],
      "source": {
        "name": "VulnerableCode",
        "url": "http://public.vulnerablecode.io/vulnerabilities/VCID-z1ua-283e-aaan"
      }
    },
    {
      "affects": [
        {
          "ref": "pkg:pypi/python-ldap@3.2.0"
        }
      ],
      "bom-ref": "BomRef.6459255854141074.4624041532666021",
      "description": "Denial of Service in python-ldap",
      "id": "VCID-znhx-qmrb-aaac",
      "ratings": [
        {
          "severity": "medium",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044615"
          }
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46823"
          },
          "vector": "0.50997"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46823"
          },
          "vector": "0.51269"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46823"
          },
          "vector": "0.51339"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46823"
          },
          "vector": "0.51361"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46823"
          },
          "vector": "0.51423"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46823"
          },
          "vector": "0.51425"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46823"
          },
          "vector": "0.51432"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46823"
          },
          "vector": "0.51440"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46823"
          },
          "vector": "0.51466"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46823"
          },
          "vector": "0.51608"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46823"
          },
          "vector": "0.51637"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46823"
          },
          "vector": "0.51694"
        },
        {
          "score": 4.0,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-46823"
          },
          "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
        },
        {
          "score": 6.5,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-46823"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 6.5,
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46823.json"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 6.5,
          "source": {
            "url": "https://github.com/python-ldap/python-ldap/security/advisories/GHSA-r8wq-qrxc-hmcm"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 6.5,
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 6.5,
          "source": {
            "url": "https://github.com/python-ldap/python-ldap"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "score": 6.5,
          "source": {
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/221507"
          },
          "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "source": {
            "url": "https://github.com/python-ldap/python-ldap"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/221507"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/python-ldap/python-ldap/security/advisories/GHSA-r8wq-qrxc-hmcm"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/advisories/GHSA-qfr5-wjpw-q4c4"
          },
          "vector": ""
        }
      ],
      "references": [
        {
          "id": "",
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46823.json"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46823"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46823"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/221507"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/python-ldap/python-ldap"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/python-ldap/python-ldap/security/advisories/GHSA-r8wq-qrxc-hmcm"
          }
        },
        {
          "id": "2044615",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044615"
          }
        },
        {
          "id": "CVE-2021-46823",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-46823"
          }
        },
        {
          "id": "GHSA-qfr5-wjpw-q4c4",
          "source": {
            "url": "https://github.com/advisories/GHSA-qfr5-wjpw-q4c4"
          }
        },
        {
          "id": "USN-5508-1",
          "source": {
            "url": "https://usn.ubuntu.com/5508-1/"
          }
        },
        {
          "id": "cpe:2.3:a:python-ldap:python-ldap:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python-ldap:python-ldap:*:*:*:*:*:*:*:*"
          }
        }
      ],
      "source": {
        "name": "VulnerableCode",
        "url": "http://public.vulnerablecode.io/vulnerabilities/VCID-znhx-qmrb-aaac"
      }
    },
    {
      "affects": [
        {
          "ref": "pkg:pypi/pip@22.1.2"
        }
      ],
      "bom-ref": "BomRef.7315705320547822.2512136140805895",
      "description": "",
      "id": "VCID-zv1y-y4jb-aaas",
      "ratings": [
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5752"
          },
          "vector": "0.16909"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5752"
          },
          "vector": "0.17196"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5752"
          },
          "vector": "0.17289"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5752"
          },
          "vector": "0.17318"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5752"
          },
          "vector": "0.17390"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5752"
          },
          "vector": "0.17395"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5752"
          },
          "vector": "0.17412"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5752"
          },
          "vector": "0.17474"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5752"
          },
          "vector": "0.17574"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5752"
          },
          "vector": "0.17890"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5752"
          },
          "vector": "0.17974"
        },
        {
          "score": 0.0,
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5752"
          },
          "vector": "0.18073"
        },
        {
          "score": 3.3,
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5752"
          },
          "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
        },
        {
          "score": 3.3,
          "source": {
            "url": "https://mail.python.org/archives/list/security-announce@python.org/thread/F4PL35U6X4VVHZ5ILJU3PWUWN7H7LZXL/"
          },
          "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
        },
        {
          "score": 3.3,
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          },
          "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
        },
        {
          "score": 3.3,
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5752.json"
          },
          "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
        },
        {
          "score": 5.5,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FXUVMJM25PUAZRQZBF54OFVKTY3MINPW"
          },
          "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 5.5,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YBSB3SUPQ3VIFYUMHPO3MEQI4BJAXKCZ"
          },
          "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 5.5,
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/pip/PYSEC-2023-228.yaml"
          },
          "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 5.5,
          "source": {
            "url": "https://github.com/pypa/pip"
          },
          "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 5.5,
          "source": {
            "url": "https://mail.python.org/archives/list/security-announce@python.org/thread/F4PL35U6X4VVHZ5ILJU3PWUWN7H7LZXL"
          },
          "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 5.5,
          "source": {
            "url": "https://github.com/pypa/pip/commit/389cb799d0da9a840749fcd14878928467ed49b4"
          },
          "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 5.5,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/65UKKF5LBHEFDCUSPBHUN4IHYX7SRMHH"
          },
          "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 5.5,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KFC2SPFG5FLCZBYY2K3T5MFW2D22NG6E"
          },
          "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 5.5,
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/622OZXWG72ISQPLM5Y57YCVIMWHD4C3U"
          },
          "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "score": 5.5,
          "source": {
            "url": "https://github.com/pypa/pip/pull/12306"
          },
          "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
        },
        {
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KFC2SPFG5FLCZBYY2K3T5MFW2D22NG6E"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YBSB3SUPQ3VIFYUMHPO3MEQI4BJAXKCZ"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/pip/PYSEC-2023-228.yaml"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://mail.python.org/archives/list/security-announce@python.org/thread/F4PL35U6X4VVHZ5ILJU3PWUWN7H7LZXL"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/pypa/pip"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/622OZXWG72ISQPLM5Y57YCVIMWHD4C3U"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/pypa/pip/commit/389cb799d0da9a840749fcd14878928467ed49b4"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FXUVMJM25PUAZRQZBF54OFVKTY3MINPW"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/65UKKF5LBHEFDCUSPBHUN4IHYX7SRMHH"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/pypa/pip/pull/12306"
          },
          "vector": ""
        },
        {
          "source": {
            "url": "https://github.com/advisories/GHSA-mq26-g339-26xf"
          },
          "vector": ""
        }
      ],
      "references": [
        {
          "id": "",
          "source": {
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5752.json"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5752"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5752"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/pypa/advisory-database/tree/main/vulns/pip/PYSEC-2023-228.yaml"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/pypa/pip"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/pypa/pip/commit/389cb799d0da9a840749fcd14878928467ed49b4"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://github.com/pypa/pip/pull/12306"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/622OZXWG72ISQPLM5Y57YCVIMWHD4C3U"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/622OZXWG72ISQPLM5Y57YCVIMWHD4C3U/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/65UKKF5LBHEFDCUSPBHUN4IHYX7SRMHH"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/65UKKF5LBHEFDCUSPBHUN4IHYX7SRMHH/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FXUVMJM25PUAZRQZBF54OFVKTY3MINPW"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FXUVMJM25PUAZRQZBF54OFVKTY3MINPW/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KFC2SPFG5FLCZBYY2K3T5MFW2D22NG6E"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KFC2SPFG5FLCZBYY2K3T5MFW2D22NG6E/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YBSB3SUPQ3VIFYUMHPO3MEQI4BJAXKCZ"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YBSB3SUPQ3VIFYUMHPO3MEQI4BJAXKCZ/"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://mail.python.org/archives/list/security-announce@python.org/thread/F4PL35U6X4VVHZ5ILJU3PWUWN7H7LZXL"
          }
        },
        {
          "id": "",
          "source": {
            "url": "https://mail.python.org/archives/list/security-announce@python.org/thread/F4PL35U6X4VVHZ5ILJU3PWUWN7H7LZXL/"
          }
        },
        {
          "id": "2250765",
          "source": {
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250765"
          }
        },
        {
          "id": "CVE-2023-5752",
          "source": {
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5752"
          }
        },
        {
          "id": "GHSA-mq26-g339-26xf",
          "source": {
            "url": "https://github.com/advisories/GHSA-mq26-g339-26xf"
          }
        },
        {
          "id": "RHSA-2024:3781",
          "source": {
            "url": "https://access.redhat.com/errata/RHSA-2024:3781"
          }
        },
        {
          "id": "cpe:2.3:a:pypa:pip:*:*:*:*:*:*:*:*",
          "source": {
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pypa:pip:*:*:*:*:*:*:*:*"
          }
        }
      ],
      "source": {
        "name": "VulnerableCode",
        "url": "http://public.vulnerablecode.io/vulnerabilities/VCID-zv1y-y4jb-aaas"
      }
    }
  ]
}