{"api_version":"1","generated_at":"2026-04-23T02:58:25+00:00","cve":"CVE-2022-1996","urls":{"html":"https://cve.report/CVE-2022-1996","api":"https://cve.report/api/cve/CVE-2022-1996.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-1996","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-1996"},"summary":{"title":"CVE-2022-1996","description":"Authorization Bypass Through User-Controlled Key in GitHub repository emicklei/go-restful prior to v3.8.0.","state":"PUBLIC","assigner":"security@huntr.dev","published_at":"2022-06-08 13:15:00","updated_at":"2023-11-07 03:42:00"},"problem_types":["CWE-639"],"metrics":[],"references":[{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/575BLJ3Y2EQBRNTFR2OSQQ6L2W6UCST3/","name":"FEDORA-2022-589a0ad690","refsource":"","tags":[],"title":"[SECURITY] Fedora 35 Update: golang-github-emicklei-restful-3.8.0-1.fc35 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z55VUVGO7E5PJFXIOVAY373NZRHBNCI5/","name":"FEDORA-2022-ba365d3703","refsource":"","tags":[],"title":"[SECURITY] Fedora 36 Update: golang-github-chromedp-0.8.1-2.fc36 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W56PP46JVZEKCANBKXFKRVSBBRRMCY6V/","name":"FEDORA-2023-6550d9323b","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 36 Update: golang-oras-0.15.1-1.20221105git690716b.fc36 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OBDD3Q23RCGAGHIXUCWBU6N3S4RNAKXB/","name":"FEDORA-2022-185697ef56","refsource":"","tags":[],"title":"[SECURITY] Fedora 36 Update: golang-github-emicklei-restful-3.8.0-1.fc36 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZY2SLWOQR4ZURQ7UBRZ7JIX6H6F5JHJR/","name":"FEDORA-2022-fae3ecee19","refsource":"","tags":[],"title":"[SECURITY] Fedora 36 Update: aquatone-1.7.0-7.fc36 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.netapp.com/advisory/ntap-20220923-0005/","name":"https://security.netapp.com/advisory/ntap-20220923-0005/","refsource":"CONFIRM","tags":[],"title":"CVE-2022-1996 go-restful Vulnerability in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/575BLJ3Y2EQBRNTFR2OSQQ6L2W6UCST3/","name":"FEDORA-2022-589a0ad690","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 35 Update: golang-github-emicklei-restful-3.8.0-1.fc35 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z55VUVGO7E5PJFXIOVAY373NZRHBNCI5/","name":"FEDORA-2022-ba365d3703","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 36 Update: golang-github-chromedp-0.8.1-2.fc36 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W56PP46JVZEKCANBKXFKRVSBBRRMCY6V/","name":"FEDORA-2023-6550d9323b","refsource":"","tags":[],"title":"[SECURITY] Fedora 36 Update: golang-oras-0.15.1-1.20221105git690716b.fc36 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBDD3Q23RCGAGHIXUCWBU6N3S4RNAKXB/","name":"FEDORA-2022-185697ef56","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 36 Update: golang-github-emicklei-restful-3.8.0-1.fc36 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZGQKWD6SE75PFBPFVSZYAKAVXKBZXKWS/","name":"FEDORA-2023-4e2068ba5d","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 38 Update: golang-helm-3-3.11.1-1.fc38 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SO5QC2JFW2PXBWAE27OYYYL5SPFUBHTY/","name":"FEDORA-2023-c9b2182a4e","refsource":"","tags":[],"title":"[SECURITY] Fedora 37 Update: golang-oras-0.15.1-1.20221105git690716b.fc37 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZY2SLWOQR4ZURQ7UBRZ7JIX6H6F5JHJR/","name":"FEDORA-2022-fae3ecee19","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 36 Update: aquatone-1.7.0-7.fc36 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://huntr.dev/bounties/be837427-415c-4d8c-808b-62ce20aa84f1","name":"https://huntr.dev/bounties/be837427-415c-4d8c-808b-62ce20aa84f1","refsource":"CONFIRM","tags":[],"title":"Authorization Bypass Through User-Controlled Key  vulnerability found in go-restful","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/emicklei/go-restful/commit/fd3c327a379ce08c68ef18765bdc925f5d9bad10","name":"https://github.com/emicklei/go-restful/commit/fd3c327a379ce08c68ef18765bdc925f5d9bad10","refsource":"MISC","tags":[],"title":"use exact matching of allowed domain entries, issue #489 (#493) · emicklei/go-restful@fd3c327 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SO5QC2JFW2PXBWAE27OYYYL5SPFUBHTY/","name":"FEDORA-2023-c9b2182a4e","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 37 Update: golang-oras-0.15.1-1.20221105git690716b.fc37 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RQXU752ALW53OJAF5MG3WMR5CCZVLWW6/","name":"FEDORA-2022-30c5ed5625","refsource":"","tags":[],"title":"[SECURITY] Fedora 35 Update: fzf-0.29.0-2.fc35 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RQXU752ALW53OJAF5MG3WMR5CCZVLWW6/","name":"FEDORA-2022-30c5ed5625","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 35 Update: fzf-0.29.0-2.fc35 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZGQKWD6SE75PFBPFVSZYAKAVXKBZXKWS/","name":"FEDORA-2023-4e2068ba5d","refsource":"","tags":[],"title":"[SECURITY] Fedora 38 Update: golang-helm-3-3.11.1-1.fc38 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-1996","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1996","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"1996","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"35","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"1996","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"36","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"1996","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"go-restful_project","cpe5":"go-restful","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-1996","qid":"184280","title":"Debian Security Update for golang-github-emicklei-go-restful (CVE-2022-1996)"},{"cve":"CVE-2022-1996","qid":"282858","title":"Fedora Security Update for golang (FEDORA-2022-589a0ad690)"},{"cve":"CVE-2022-1996","qid":"282859","title":"Fedora Security Update for golang (FEDORA-2022-185697ef56)"},{"cve":"CVE-2022-1996","qid":"282893","title":"Fedora Security Update for 3mux (FEDORA-2022-fae3ecee19)"},{"cve":"CVE-2022-1996","qid":"282931","title":"Fedora Security Update for apptainer (FEDORA-2022-ba365d3703)"},{"cve":"CVE-2022-1996","qid":"282947","title":"Fedora Security Update for 3mux (FEDORA-2022-3969b64d4b)"},{"cve":"CVE-2022-1996","qid":"283049","title":"Fedora Security Update for fzf (FEDORA-2022-30c5ed5625)"},{"cve":"CVE-2022-1996","qid":"283739","title":"Fedora Security Update for golang (FEDORA-2023-6550d9323b)"},{"cve":"CVE-2022-1996","qid":"283740","title":"Fedora Security Update for golang (FEDORA-2023-c9b2182a4e)"},{"cve":"CVE-2022-1996","qid":"284277","title":"Fedora Security Update for golang (FEDORA-2023-4e2068ba5d)"},{"cve":"CVE-2022-1996","qid":"284299","title":"Fedora Security Update for etcd (FEDORA-2022-28d38313c8)"},{"cve":"CVE-2022-1996","qid":"354064","title":"Amazon Linux Security Advisory for golist : ALAS2-2022-1847"},{"cve":"CVE-2022-1996","qid":"354067","title":"Amazon Linux Security Advisory for golang : ALAS2-2022-1846"},{"cve":"CVE-2022-1996","qid":"354069","title":"Amazon Linux Security Advisory for golang : ALAS-2022-1635"},{"cve":"CVE-2022-1996","qid":"354083","title":"Amazon Linux Security Advisory for runc : ALAS2DOCKER-2022-020"},{"cve":"CVE-2022-1996","qid":"354088","title":"Amazon Linux Security Advisory for golang-github-syndtr-gocapability : ALAS2-2022-1865"},{"cve":"CVE-2022-1996","qid":"354089","title":"Amazon Linux Security Advisory for golang-googlecode-sqlite : ALAS2-2022-1862"},{"cve":"CVE-2022-1996","qid":"354090","title":"Amazon Linux Security Advisory for golang-github-kr-pty : ALAS2-2022-1864"},{"cve":"CVE-2022-1996","qid":"354091","title":"Amazon Linux Security Advisory for go-rpm-macros : ALAS2-2022-1863"},{"cve":"CVE-2022-1996","qid":"354092","title":"Amazon Linux Security Advisory for golang-googlecode-net : ALAS2-2022-1861"},{"cve":"CVE-2022-1996","qid":"354093","title":"Amazon Linux Security Advisory for golang-github-gorilla-mux : ALAS2-2022-1860"},{"cve":"CVE-2022-1996","qid":"354094","title":"Amazon Linux Security Advisory for golang-github-gorilla-context : ALAS2-2022-1859"},{"cve":"CVE-2022-1996","qid":"354096","title":"Amazon Linux Security Advisory for golang-github-godbus-dbus : ALAS2-2022-1858"},{"cve":"CVE-2022-1996","qid":"354370","title":"Amazon Linux Security Advisory for golang-github-cpuguy83-md2man : ALAS2022-2022-140"},{"cve":"CVE-2022-1996","qid":"354493","title":"Amazon Linux Security Advisory for golist : ALAS2022-2022-133"},{"cve":"CVE-2022-1996","qid":"354504","title":"Amazon Linux Security Advisory for golist : ALAS2022-2022-192"},{"cve":"CVE-2022-1996","qid":"354527","title":"Amazon Linux Security Advisory for golang : ALAS2022-2022-193"},{"cve":"CVE-2022-1996","qid":"354566","title":"Amazon Linux Security Advisory for golang : ALAS-2022-193"},{"cve":"CVE-2022-1996","qid":"503184","title":"Alpine Linux Security Update for gitlab-runner"},{"cve":"CVE-2022-1996","qid":"506077","title":"Alpine Linux Security Update for gitlab-runner"},{"cve":"CVE-2022-1996","qid":"753059","title":"SUSE Enterprise Linux Security Update for helm (SUSE-SU-2022:4606-1)"},{"cve":"CVE-2022-1996","qid":"753186","title":"SUSE Enterprise Linux Security Update for kubevirt (SUSE-SU-2022:3333-1)"},{"cve":"CVE-2022-1996","qid":"753204","title":"SUSE Enterprise Linux Security Update for helm (SUSE-SU-2022:3666-1)"},{"cve":"CVE-2022-1996","qid":"753213","title":"SUSE Enterprise Linux Security Update for kubevirt (SUSE-SU-2022:3321-1)"},{"cve":"CVE-2022-1996","qid":"753225","title":"SUSE Enterprise Linux Security Update for cdi-apiserver-container (SUSE-SU-2022:3334-1)"},{"cve":"CVE-2022-1996","qid":"753403","title":"SUSE Enterprise Linux Security Update for cdi-apiserver-container (SUSE-SU-2022:3335-1)"},{"cve":"CVE-2022-1996","qid":"755442","title":"SUSE Enterprise Linux Security Update for catatonit, containerd, runc (SUSE-SU-2023:4727-1)"},{"cve":"CVE-2022-1996","qid":"904867","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for helm (12350)"},{"cve":"CVE-2022-1996","qid":"904961","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for moby-containerd (12363)"},{"cve":"CVE-2022-1996","qid":"904976","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for cert-manager (12463)"},{"cve":"CVE-2022-1996","qid":"905001","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for k3s (12503)"},{"cve":"CVE-2022-1996","qid":"905011","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for prometheus (12607)"},{"cve":"CVE-2022-1996","qid":"905046","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for rook (12626)"},{"cve":"CVE-2022-1996","qid":"905055","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for keda (12507)"},{"cve":"CVE-2022-1996","qid":"905074","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for containerized-data-importer (12480)"},{"cve":"CVE-2022-1996","qid":"905083","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for moby-containerd (12566)"},{"cve":"CVE-2022-1996","qid":"905096","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kube-vip-cloud-provider (12508)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security@huntr.dev","ID":"CVE-2022-1996","STATE":"PUBLIC","TITLE":"Authorization Bypass Through User-Controlled Key in emicklei/go-restful"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"emicklei/go-restful","version":{"version_data":[{"version_affected":"<","version_value":"v3.8.0"}]}}]},"vendor_name":"emicklei"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Authorization Bypass Through User-Controlled Key in GitHub repository emicklei/go-restful prior to v3.8.0."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":9.3,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N","version":"3.0"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-639 Authorization Bypass Through User-Controlled Key"}]}]},"references":{"reference_data":[{"name":"https://huntr.dev/bounties/be837427-415c-4d8c-808b-62ce20aa84f1","refsource":"CONFIRM","url":"https://huntr.dev/bounties/be837427-415c-4d8c-808b-62ce20aa84f1"},{"name":"https://github.com/emicklei/go-restful/commit/fd3c327a379ce08c68ef18765bdc925f5d9bad10","refsource":"MISC","url":"https://github.com/emicklei/go-restful/commit/fd3c327a379ce08c68ef18765bdc925f5d9bad10"},{"refsource":"FEDORA","name":"FEDORA-2022-185697ef56","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBDD3Q23RCGAGHIXUCWBU6N3S4RNAKXB/"},{"refsource":"FEDORA","name":"FEDORA-2022-589a0ad690","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/575BLJ3Y2EQBRNTFR2OSQQ6L2W6UCST3/"},{"refsource":"FEDORA","name":"FEDORA-2022-fae3ecee19","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZY2SLWOQR4ZURQ7UBRZ7JIX6H6F5JHJR/"},{"refsource":"FEDORA","name":"FEDORA-2022-ba365d3703","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z55VUVGO7E5PJFXIOVAY373NZRHBNCI5/"},{"refsource":"FEDORA","name":"FEDORA-2022-30c5ed5625","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RQXU752ALW53OJAF5MG3WMR5CCZVLWW6/"},{"refsource":"CONFIRM","name":"https://security.netapp.com/advisory/ntap-20220923-0005/","url":"https://security.netapp.com/advisory/ntap-20220923-0005/"},{"refsource":"FEDORA","name":"FEDORA-2023-6550d9323b","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W56PP46JVZEKCANBKXFKRVSBBRRMCY6V/"},{"refsource":"FEDORA","name":"FEDORA-2023-4e2068ba5d","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZGQKWD6SE75PFBPFVSZYAKAVXKBZXKWS/"},{"refsource":"FEDORA","name":"FEDORA-2023-c9b2182a4e","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SO5QC2JFW2PXBWAE27OYYYL5SPFUBHTY/"}]},"source":{"advisory":"be837427-415c-4d8c-808b-62ce20aa84f1","discovery":"EXTERNAL"}},"nvd":{"publishedDate":"2022-06-08 13:15:00","lastModifiedDate":"2023-11-07 03:42:00","problem_types":["CWE-639"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":9.1,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.2},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":6.4},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:go-restful_project:go-restful:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0.0","versionEndExcluding":"3.8.0","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:go-restful_project:go-restful:*:*:*:*:*:*:*:*","versionEndExcluding":"2.16.0","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}