Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5
Typedeb
Namespacedebian
Namelibxml2
Version2.9.14+dfsg-1.3~deb12u5
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.15.1+dfsg-2
Latest_non_vulnerable_version2.15.1+dfsg-2
Affected_by_vulnerabilities
0
url VCID-62bb-e8vk-7uh4
vulnerability_id VCID-62bb-e8vk-7uh4
summary libxml2: libxml2: Denial of Service via uncontrolled recursion in XML catalog processing
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0990.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0990.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-0990
reference_id
reference_type
scores
0
value 0.00056
scoring_system epss
scoring_elements 0.17538
published_at 2026-04-21T12:55:00Z
1
value 0.00056
scoring_system epss
scoring_elements 0.17648
published_at 2026-04-11T12:55:00Z
2
value 0.00056
scoring_system epss
scoring_elements 0.17601
published_at 2026-04-12T12:55:00Z
3
value 0.00056
scoring_system epss
scoring_elements 0.17549
published_at 2026-04-13T12:55:00Z
4
value 0.00056
scoring_system epss
scoring_elements 0.17493
published_at 2026-04-16T12:55:00Z
5
value 0.00056
scoring_system epss
scoring_elements 0.17502
published_at 2026-04-18T12:55:00Z
6
value 0.0006
scoring_system epss
scoring_elements 0.19146
published_at 2026-04-04T12:55:00Z
7
value 0.0006
scoring_system epss
scoring_elements 0.19094
published_at 2026-04-02T12:55:00Z
8
value 0.0006
scoring_system epss
scoring_elements 0.18942
published_at 2026-04-08T12:55:00Z
9
value 0.0006
scoring_system epss
scoring_elements 0.18996
published_at 2026-04-09T12:55:00Z
10
value 0.0006
scoring_system epss
scoring_elements 0.18863
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-0990
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0990
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0990
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.gnome.org/GNOME/libxml2/-/issues/1018
reference_id 1018
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-15T16:31:20Z/
url https://gitlab.gnome.org/GNOME/libxml2/-/issues/1018
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125695
reference_id 1125695
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125695
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2429959
reference_id 2429959
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-15T16:31:20Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2429959
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
reference_id cpe:/a:redhat:hummingbird:1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:jboss_core_services:1
reference_id cpe:/a:redhat:jboss_core_services:1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:jboss_core_services:1
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
15
reference_url https://access.redhat.com/security/cve/CVE-2026-0990
reference_id CVE-2026-0990
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-15T16:31:20Z/
url https://access.redhat.com/security/cve/CVE-2026-0990
16
reference_url https://access.redhat.com/errata/RHSA-2026:7519
reference_id RHSA-2026:7519
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-15T16:31:20Z/
url https://access.redhat.com/errata/RHSA-2026:7519
17
reference_url https://usn.ubuntu.com/7974-1/
reference_id USN-7974-1
reference_type
scores
url https://usn.ubuntu.com/7974-1/
fixed_packages
0
url pkg:deb/debian/libxml2@2.15.1%2Bdfsg-2
purl pkg:deb/debian/libxml2@2.15.1%2Bdfsg-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.15.1%252Bdfsg-2
aliases CVE-2026-0990
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-62bb-e8vk-7uh4
1
url VCID-d1ar-1945-sygd
vulnerability_id VCID-d1ar-1945-sygd
summary libxml2: libxml2: Denial of Service via crafted XML catalogs
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0992.json
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0992.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-0992
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05561
published_at 2026-04-21T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05454
published_at 2026-04-11T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05441
published_at 2026-04-12T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05435
published_at 2026-04-13T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05386
published_at 2026-04-16T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05393
published_at 2026-04-18T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06103
published_at 2026-04-04T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06075
published_at 2026-04-02T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.06127
published_at 2026-04-08T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06166
published_at 2026-04-09T12:55:00Z
10
value 0.00023
scoring_system epss
scoring_elements 0.06086
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-0992
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0992
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.gnome.org/GNOME/libxml2/-/issues/1019
reference_id 1019
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-15T16:31:06Z/
url https://gitlab.gnome.org/GNOME/libxml2/-/issues/1019
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125696
reference_id 1125696
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125696
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2429975
reference_id 2429975
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-15T16:31:06Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2429975
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
reference_id cpe:/a:redhat:hummingbird:1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:jboss_core_services:1
reference_id cpe:/a:redhat:jboss_core_services:1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:jboss_core_services:1
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
15
reference_url https://access.redhat.com/security/cve/CVE-2026-0992
reference_id CVE-2026-0992
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-15T16:31:06Z/
url https://access.redhat.com/security/cve/CVE-2026-0992
16
reference_url https://access.redhat.com/errata/RHSA-2026:7519
reference_id RHSA-2026:7519
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-15T16:31:06Z/
url https://access.redhat.com/errata/RHSA-2026:7519
17
reference_url https://usn.ubuntu.com/7974-1/
reference_id USN-7974-1
reference_type
scores
url https://usn.ubuntu.com/7974-1/
fixed_packages
0
url pkg:deb/debian/libxml2@2.15.1%2Bdfsg-2
purl pkg:deb/debian/libxml2@2.15.1%2Bdfsg-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.15.1%252Bdfsg-2
aliases CVE-2026-0992
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d1ar-1945-sygd
2
url VCID-knx8-5fpz-zbgn
vulnerability_id VCID-knx8-5fpz-zbgn
summary libxml2: Unbounded RelaxNG Include Recursion Leading to Stack Overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0989.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0989.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-0989
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.05252
published_at 2026-04-21T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.05181
published_at 2026-04-11T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.05165
published_at 2026-04-12T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.05151
published_at 2026-04-13T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.05094
published_at 2026-04-16T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.051
published_at 2026-04-18T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.05492
published_at 2026-04-04T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05458
published_at 2026-04-02T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05531
published_at 2026-04-08T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.05552
published_at 2026-04-09T12:55:00Z
10
value 0.0002
scoring_system epss
scoring_elements 0.05495
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-0989
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0989
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125691
reference_id 1125691
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125691
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2429933
reference_id 2429933
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-15T16:31:12Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2429933
6
reference_url https://gitlab.gnome.org/GNOME/libxml2/-/issues/998
reference_id 998
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-15T16:31:12Z/
url https://gitlab.gnome.org/GNOME/libxml2/-/issues/998
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
reference_id cpe:/a:redhat:hummingbird:1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:jboss_core_services:1
reference_id cpe:/a:redhat:jboss_core_services:1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:jboss_core_services:1
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
15
reference_url https://access.redhat.com/security/cve/CVE-2026-0989
reference_id CVE-2026-0989
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-15T16:31:12Z/
url https://access.redhat.com/security/cve/CVE-2026-0989
16
reference_url https://access.redhat.com/errata/RHSA-2026:7519
reference_id RHSA-2026:7519
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-15T16:31:12Z/
url https://access.redhat.com/errata/RHSA-2026:7519
17
reference_url https://usn.ubuntu.com/7974-1/
reference_id USN-7974-1
reference_type
scores
url https://usn.ubuntu.com/7974-1/
fixed_packages
0
url pkg:deb/debian/libxml2@2.15.1%2Bdfsg-2
purl pkg:deb/debian/libxml2@2.15.1%2Bdfsg-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.15.1%252Bdfsg-2
aliases CVE-2026-0989
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-knx8-5fpz-zbgn
3
url VCID-nj3a-zqw9-6bga
vulnerability_id VCID-nj3a-zqw9-6bga
summary libxml2: Memory Leak Leading to Local Denial of Service in xmllint Interactive Shell
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1757.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1757.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-1757
reference_id
reference_type
scores
0
value 7e-05
scoring_system epss
scoring_elements 0.0044
published_at 2026-04-08T12:55:00Z
1
value 7e-05
scoring_system epss
scoring_elements 0.00494
published_at 2026-04-12T12:55:00Z
2
value 7e-05
scoring_system epss
scoring_elements 0.00492
published_at 2026-04-16T12:55:00Z
3
value 7e-05
scoring_system epss
scoring_elements 0.00497
published_at 2026-04-18T12:55:00Z
4
value 7e-05
scoring_system epss
scoring_elements 0.00528
published_at 2026-04-21T12:55:00Z
5
value 7e-05
scoring_system epss
scoring_elements 0.00454
published_at 2026-04-02T12:55:00Z
6
value 7e-05
scoring_system epss
scoring_elements 0.00451
published_at 2026-04-04T12:55:00Z
7
value 7e-05
scoring_system epss
scoring_elements 0.00443
published_at 2026-04-07T12:55:00Z
8
value 7e-05
scoring_system epss
scoring_elements 0.00442
published_at 2026-04-09T12:55:00Z
9
value 7e-05
scoring_system epss
scoring_elements 0.00496
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-1757
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1757
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.gnome.org/GNOME/libxml2/-/issues/1009
reference_id 1009
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:35:15Z/
url https://gitlab.gnome.org/GNOME/libxml2/-/issues/1009
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2435940
reference_id 2435940
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:35:15Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2435940
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
reference_id cpe:/a:redhat:hummingbird:1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:jboss_core_services:1
reference_id cpe:/a:redhat:jboss_core_services:1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:jboss_core_services:1
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
14
reference_url https://access.redhat.com/security/cve/CVE-2026-1757
reference_id CVE-2026-1757
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:35:15Z/
url https://access.redhat.com/security/cve/CVE-2026-1757
15
reference_url https://access.redhat.com/errata/RHSA-2026:7519
reference_id RHSA-2026:7519
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:35:15Z/
url https://access.redhat.com/errata/RHSA-2026:7519
fixed_packages
0
url pkg:deb/debian/libxml2@2.15.1%2Bdfsg-2
purl pkg:deb/debian/libxml2@2.15.1%2Bdfsg-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.15.1%252Bdfsg-2
aliases CVE-2026-1757
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nj3a-zqw9-6bga
Fixing_vulnerabilities
0
url VCID-27jd-t23h-73f4
vulnerability_id VCID-27jd-t23h-73f4
summary libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6021.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6021.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-6021
reference_id
reference_type
scores
0
value 0.00759
scoring_system epss
scoring_elements 0.73267
published_at 2026-04-07T12:55:00Z
1
value 0.00759
scoring_system epss
scoring_elements 0.73272
published_at 2026-04-02T12:55:00Z
2
value 0.00759
scoring_system epss
scoring_elements 0.73295
published_at 2026-04-04T12:55:00Z
3
value 0.01733
scoring_system epss
scoring_elements 0.82504
published_at 2026-04-21T12:55:00Z
4
value 0.02116
scoring_system epss
scoring_elements 0.84147
published_at 2026-04-18T12:55:00Z
5
value 0.02116
scoring_system epss
scoring_elements 0.84123
published_at 2026-04-13T12:55:00Z
6
value 0.02116
scoring_system epss
scoring_elements 0.84145
published_at 2026-04-16T12:55:00Z
7
value 0.02116
scoring_system epss
scoring_elements 0.84109
published_at 2026-04-08T12:55:00Z
8
value 0.02116
scoring_system epss
scoring_elements 0.84115
published_at 2026-04-09T12:55:00Z
9
value 0.02116
scoring_system epss
scoring_elements 0.84133
published_at 2026-04-11T12:55:00Z
10
value 0.02116
scoring_system epss
scoring_elements 0.84127
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-6021
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6021
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107720
reference_id 1107720
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107720
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2372406
reference_id 2372406
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-03T14:41:19Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2372406
6
reference_url https://gitlab.gnome.org/GNOME/libxml2/-/issues/926
reference_id 926
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-03T14:41:19Z/
url https://gitlab.gnome.org/GNOME/libxml2/-/issues/926
7
reference_url https://security.archlinux.org/AVG-2899
reference_id AVG-2899
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2899
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
reference_id cpe:/a:redhat:discovery:2::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
reference_id cpe:/a:redhat:hummingbird:1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
reference_id cpe:/a:redhat:insights_proxy:1.5::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:jboss_core_services:1
reference_id cpe:/a:redhat:jboss_core_services:1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:jboss_core_services:1
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.12::el8
reference_id cpe:/a:redhat:openshift:4.12::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.12::el8
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.13::el9
reference_id cpe:/a:redhat:openshift:4.13::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.13::el9
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.14::el8
reference_id cpe:/a:redhat:openshift:4.14::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.14::el8
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.14::el9
reference_id cpe:/a:redhat:openshift:4.14::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.14::el9
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.15::el9
reference_id cpe:/a:redhat:openshift:4.15::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.15::el9
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.16::el9
reference_id cpe:/a:redhat:openshift:4.16::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.16::el9
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.17::el9
reference_id cpe:/a:redhat:openshift:4.17::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.17::el9
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.18::el9
reference_id cpe:/a:redhat:openshift:4.18::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.18::el9
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.19::el9
reference_id cpe:/a:redhat:openshift:4.19::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.19::el9
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
reference_id cpe:/o:redhat:rhel_aus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.0::baseos
reference_id cpe:/o:redhat:rhel_e4s:9.0::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.0::baseos
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_id cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
reference_id cpe:/o:redhat:rhel_eus:9.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
reference_id cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
reference_id cpe:/o:redhat:rhel_tus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.8::baseos
reference_id cpe:/o:redhat:rhel_tus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.8::baseos
50
reference_url https://access.redhat.com/security/cve/CVE-2025-6021
reference_id CVE-2025-6021
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-03T14:41:19Z/
url https://access.redhat.com/security/cve/CVE-2025-6021
51
reference_url https://access.redhat.com/errata/RHSA-2025:10630
reference_id RHSA-2025:10630
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-03T14:41:19Z/
url https://access.redhat.com/errata/RHSA-2025:10630
52
reference_url https://access.redhat.com/errata/RHSA-2025:10698
reference_id RHSA-2025:10698
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-03T14:41:19Z/
url https://access.redhat.com/errata/RHSA-2025:10698
53
reference_url https://access.redhat.com/errata/RHSA-2025:10699
reference_id RHSA-2025:10699
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-03T14:41:19Z/
url https://access.redhat.com/errata/RHSA-2025:10699
54
reference_url https://access.redhat.com/errata/RHSA-2025:11580
reference_id RHSA-2025:11580
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-03T14:41:19Z/
url https://access.redhat.com/errata/RHSA-2025:11580
55
reference_url https://access.redhat.com/errata/RHSA-2025:11673
reference_id RHSA-2025:11673
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-03T14:41:19Z/
url https://access.redhat.com/errata/RHSA-2025:11673
56
reference_url https://access.redhat.com/errata/RHSA-2025:12098
reference_id RHSA-2025:12098
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-03T14:41:19Z/
url https://access.redhat.com/errata/RHSA-2025:12098
57
reference_url https://access.redhat.com/errata/RHSA-2025:12099
reference_id RHSA-2025:12099
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-03T14:41:19Z/
url https://access.redhat.com/errata/RHSA-2025:12099
58
reference_url https://access.redhat.com/errata/RHSA-2025:12199
reference_id RHSA-2025:12199
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-03T14:41:19Z/
url https://access.redhat.com/errata/RHSA-2025:12199
59
reference_url https://access.redhat.com/errata/RHSA-2025:12237
reference_id RHSA-2025:12237
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-03T14:41:19Z/
url https://access.redhat.com/errata/RHSA-2025:12237
60
reference_url https://access.redhat.com/errata/RHSA-2025:12239
reference_id RHSA-2025:12239
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-03T14:41:19Z/
url https://access.redhat.com/errata/RHSA-2025:12239
61
reference_url https://access.redhat.com/errata/RHSA-2025:12240
reference_id RHSA-2025:12240
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-03T14:41:19Z/
url https://access.redhat.com/errata/RHSA-2025:12240
62
reference_url https://access.redhat.com/errata/RHSA-2025:12241
reference_id RHSA-2025:12241
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-03T14:41:19Z/
url https://access.redhat.com/errata/RHSA-2025:12241
63
reference_url https://access.redhat.com/errata/RHSA-2025:13267
reference_id RHSA-2025:13267
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-03T14:41:19Z/
url https://access.redhat.com/errata/RHSA-2025:13267
64
reference_url https://access.redhat.com/errata/RHSA-2025:13289
reference_id RHSA-2025:13289
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-03T14:41:19Z/
url https://access.redhat.com/errata/RHSA-2025:13289
65
reference_url https://access.redhat.com/errata/RHSA-2025:13325
reference_id RHSA-2025:13325
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-03T14:41:19Z/
url https://access.redhat.com/errata/RHSA-2025:13325
66
reference_url https://access.redhat.com/errata/RHSA-2025:13335
reference_id RHSA-2025:13335
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-03T14:41:19Z/
url https://access.redhat.com/errata/RHSA-2025:13335
67
reference_url https://access.redhat.com/errata/RHSA-2025:13336
reference_id RHSA-2025:13336
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-03T14:41:19Z/
url https://access.redhat.com/errata/RHSA-2025:13336
68
reference_url https://access.redhat.com/errata/RHSA-2025:14059
reference_id RHSA-2025:14059
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-03T14:41:19Z/
url https://access.redhat.com/errata/RHSA-2025:14059
69
reference_url https://access.redhat.com/errata/RHSA-2025:14396
reference_id RHSA-2025:14396
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-03T14:41:19Z/
url https://access.redhat.com/errata/RHSA-2025:14396
70
reference_url https://access.redhat.com/errata/RHSA-2025:15308
reference_id RHSA-2025:15308
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-03T14:41:19Z/
url https://access.redhat.com/errata/RHSA-2025:15308
71
reference_url https://access.redhat.com/errata/RHSA-2025:15672
reference_id RHSA-2025:15672
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-03T14:41:19Z/
url https://access.redhat.com/errata/RHSA-2025:15672
72
reference_url https://access.redhat.com/errata/RHSA-2025:19020
reference_id RHSA-2025:19020
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-03T14:41:19Z/
url https://access.redhat.com/errata/RHSA-2025:19020
73
reference_url https://access.redhat.com/errata/RHSA-2026:7519
reference_id RHSA-2026:7519
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-03T14:41:19Z/
url https://access.redhat.com/errata/RHSA-2026:7519
74
reference_url https://usn.ubuntu.com/7694-1/
reference_id USN-7694-1
reference_type
scores
url https://usn.ubuntu.com/7694-1/
fixed_packages
0
url pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5
purl pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-62bb-e8vk-7uh4
1
vulnerability VCID-d1ar-1945-sygd
2
vulnerability VCID-knx8-5fpz-zbgn
3
vulnerability VCID-nj3a-zqw9-6bga
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.9.14%252Bdfsg-1.3~deb12u5
aliases CVE-2025-6021
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-27jd-t23h-73f4
1
url VCID-31w8-13b6-8beh
vulnerability_id VCID-31w8-13b6-8beh
summary libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24928.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24928.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24928
reference_id
reference_type
scores
0
value 0.00235
scoring_system epss
scoring_elements 0.46331
published_at 2026-04-02T12:55:00Z
1
value 0.00235
scoring_system epss
scoring_elements 0.46415
published_at 2026-04-18T12:55:00Z
2
value 0.00235
scoring_system epss
scoring_elements 0.46356
published_at 2026-04-09T12:55:00Z
3
value 0.00235
scoring_system epss
scoring_elements 0.46379
published_at 2026-04-11T12:55:00Z
4
value 0.00235
scoring_system epss
scoring_elements 0.46351
published_at 2026-04-12T12:55:00Z
5
value 0.00235
scoring_system epss
scoring_elements 0.46361
published_at 2026-04-21T12:55:00Z
6
value 0.00235
scoring_system epss
scoring_elements 0.46418
published_at 2026-04-16T12:55:00Z
7
value 0.00235
scoring_system epss
scoring_elements 0.46352
published_at 2026-04-04T12:55:00Z
8
value 0.00235
scoring_system epss
scoring_elements 0.463
published_at 2026-04-07T12:55:00Z
9
value 0.00235
scoring_system epss
scoring_elements 0.46355
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24928
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24928
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098321
reference_id 1098321
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098321
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2346421
reference_id 2346421
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2346421
6
reference_url https://issues.oss-fuzz.com/issues/392687022
reference_id 392687022
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-23T03:55:31Z/
url https://issues.oss-fuzz.com/issues/392687022
7
reference_url https://gitlab.gnome.org/GNOME/libxml2/-/issues/847
reference_id 847
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-23T03:55:31Z/
url https://gitlab.gnome.org/GNOME/libxml2/-/issues/847
8
reference_url https://access.redhat.com/errata/RHSA-2025:2482
reference_id RHSA-2025:2482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2482
9
reference_url https://access.redhat.com/errata/RHSA-2025:2483
reference_id RHSA-2025:2483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2483
10
reference_url https://access.redhat.com/errata/RHSA-2025:2507
reference_id RHSA-2025:2507
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2507
11
reference_url https://access.redhat.com/errata/RHSA-2025:2513
reference_id RHSA-2025:2513
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2513
12
reference_url https://access.redhat.com/errata/RHSA-2025:2654
reference_id RHSA-2025:2654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2654
13
reference_url https://access.redhat.com/errata/RHSA-2025:2660
reference_id RHSA-2025:2660
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2660
14
reference_url https://access.redhat.com/errata/RHSA-2025:2673
reference_id RHSA-2025:2673
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2673
15
reference_url https://access.redhat.com/errata/RHSA-2025:2678
reference_id RHSA-2025:2678
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2678
16
reference_url https://access.redhat.com/errata/RHSA-2025:2679
reference_id RHSA-2025:2679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2679
17
reference_url https://access.redhat.com/errata/RHSA-2025:2686
reference_id RHSA-2025:2686
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2686
18
reference_url https://access.redhat.com/errata/RHSA-2025:2789
reference_id RHSA-2025:2789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2789
19
reference_url https://access.redhat.com/errata/RHSA-2025:3055
reference_id RHSA-2025:3055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3055
20
reference_url https://access.redhat.com/errata/RHSA-2025:3368
reference_id RHSA-2025:3368
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3368
21
reference_url https://access.redhat.com/errata/RHSA-2025:3397
reference_id RHSA-2025:3397
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3397
22
reference_url https://access.redhat.com/errata/RHSA-2025:3453
reference_id RHSA-2025:3453
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3453
23
reference_url https://access.redhat.com/errata/RHSA-2025:3569
reference_id RHSA-2025:3569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3569
24
reference_url https://access.redhat.com/errata/RHSA-2025:3775
reference_id RHSA-2025:3775
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3775
25
reference_url https://access.redhat.com/errata/RHSA-2025:3780
reference_id RHSA-2025:3780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3780
26
reference_url https://access.redhat.com/errata/RHSA-2025:3867
reference_id RHSA-2025:3867
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3867
27
reference_url https://access.redhat.com/errata/RHSA-2025:4005
reference_id RHSA-2025:4005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4005
28
reference_url https://access.redhat.com/errata/RHSA-2025:9895
reference_id RHSA-2025:9895
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:9895
29
reference_url https://usn.ubuntu.com/7302-1/
reference_id USN-7302-1
reference_type
scores
url https://usn.ubuntu.com/7302-1/
fixed_packages
0
url pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5
purl pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-62bb-e8vk-7uh4
1
vulnerability VCID-d1ar-1945-sygd
2
vulnerability VCID-knx8-5fpz-zbgn
3
vulnerability VCID-nj3a-zqw9-6bga
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.9.14%252Bdfsg-1.3~deb12u5
aliases CVE-2025-24928
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-31w8-13b6-8beh
2
url VCID-464a-typa-7qbu
vulnerability_id VCID-464a-typa-7qbu
summary libxml2: Stack Buffer Overflow in xmllint Interactive Shell Command Handling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6170.json
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6170.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-6170
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.09984
published_at 2026-04-07T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.10028
published_at 2026-04-02T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.10087
published_at 2026-04-04T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.10061
published_at 2026-04-08T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.10121
published_at 2026-04-09T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.10161
published_at 2026-04-11T12:55:00Z
6
value 0.00038
scoring_system epss
scoring_elements 0.11253
published_at 2026-04-21T12:55:00Z
7
value 0.00118
scoring_system epss
scoring_elements 0.30661
published_at 2026-04-18T12:55:00Z
8
value 0.00118
scoring_system epss
scoring_elements 0.30698
published_at 2026-04-12T12:55:00Z
9
value 0.00118
scoring_system epss
scoring_elements 0.30654
published_at 2026-04-13T12:55:00Z
10
value 0.00118
scoring_system epss
scoring_elements 0.30679
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-6170
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6170
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6170
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107938
reference_id 1107938
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107938
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2372952
reference_id 2372952
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-16T16:05:03Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2372952
6
reference_url https://gitlab.gnome.org/GNOME/libxml2/-/issues/941
reference_id 941
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-16T16:05:03Z/
url https://gitlab.gnome.org/GNOME/libxml2/-/issues/941
7
reference_url https://security.archlinux.org/AVG-2898
reference_id AVG-2898
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2898
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
reference_id cpe:/a:redhat:hummingbird:1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:jboss_core_services:1
reference_id cpe:/a:redhat:jboss_core_services:1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:jboss_core_services:1
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
16
reference_url https://access.redhat.com/security/cve/CVE-2025-6170
reference_id CVE-2025-6170
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-16T16:05:03Z/
url https://access.redhat.com/security/cve/CVE-2025-6170
17
reference_url https://access.redhat.com/errata/RHSA-2026:7519
reference_id RHSA-2026:7519
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-16T16:05:03Z/
url https://access.redhat.com/errata/RHSA-2026:7519
18
reference_url https://usn.ubuntu.com/7694-1/
reference_id USN-7694-1
reference_type
scores
url https://usn.ubuntu.com/7694-1/
fixed_packages
0
url pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5
purl pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-62bb-e8vk-7uh4
1
vulnerability VCID-d1ar-1945-sygd
2
vulnerability VCID-knx8-5fpz-zbgn
3
vulnerability VCID-nj3a-zqw9-6bga
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.9.14%252Bdfsg-1.3~deb12u5
aliases CVE-2025-6170
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-464a-typa-7qbu
3
url VCID-4m3j-qy8c-4uhk
vulnerability_id VCID-4m3j-qy8c-4uhk
summary NULL Pointer Dereference allows attackers to cause a denial of service (or application crash). This only applies when lxml is used together with libxml2 2.9.10 through 2.9.14. libxml2 2.9.9 and earlier are not affected. It allows triggering crashes through forged input data, given a vulnerable code sequence in the application. The vulnerability is caused by the iterwalk function (also used by the canonicalize function). Such code shouldn't be in wide-spread use, given that parsing + iterwalk would usually be replaced with the more efficient iterparse function. However, an XML converter that serialises to C14N would also be vulnerable, for example, and there are legitimate use cases for this code sequence. If untrusted input is received (also remotely) and processed via iterwalk function, a crash can be triggered.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2309.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2309.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2309
reference_id
reference_type
scores
0
value 0.00868
scoring_system epss
scoring_elements 0.75188
published_at 2026-04-21T12:55:00Z
1
value 0.00868
scoring_system epss
scoring_elements 0.75199
published_at 2026-04-18T12:55:00Z
2
value 0.00868
scoring_system epss
scoring_elements 0.75193
published_at 2026-04-16T12:55:00Z
3
value 0.00868
scoring_system epss
scoring_elements 0.75167
published_at 2026-04-12T12:55:00Z
4
value 0.00868
scoring_system epss
scoring_elements 0.75189
published_at 2026-04-11T12:55:00Z
5
value 0.00868
scoring_system epss
scoring_elements 0.75168
published_at 2026-04-09T12:55:00Z
6
value 0.00868
scoring_system epss
scoring_elements 0.75155
published_at 2026-04-13T12:55:00Z
7
value 0.00868
scoring_system epss
scoring_elements 0.75144
published_at 2026-04-04T12:55:00Z
8
value 0.00868
scoring_system epss
scoring_elements 0.75114
published_at 2026-04-02T12:55:00Z
9
value 0.00868
scoring_system epss
scoring_elements 0.75121
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2309
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2309
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/advisories/GHSA-wrxv-2j5q-m38w
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
3
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-wrxv-2j5q-m38w
5
reference_url https://github.com/lxml/lxml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/lxml/lxml
6
reference_url https://github.com/lxml/lxml/blob/master/CHANGES.txt
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/lxml/lxml/blob/master/CHANGES.txt
7
reference_url https://github.com/lxml/lxml/commit/86368e9cf70a0ad23cccd5ee32de847149af0c6f
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/lxml/lxml/commit/86368e9cf70a0ad23cccd5ee32de847149af0c6f
8
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/lxml/PYSEC-2022-230.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/lxml/PYSEC-2022-230.yaml
9
reference_url https://huntr.dev/bounties/8264e74f-edda-4c40-9956-49de635105ba
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://huntr.dev/bounties/8264e74f-edda-4c40-9956-49de635105ba
10
reference_url https://lists.debian.org/debian-lts-announce/2024/09/msg00021.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2024/09/msg00021.html
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HGYC6L7ENH5VEGN3YWFBYMGKX6WNS7HZ
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HGYC6L7ENH5VEGN3YWFBYMGKX6WNS7HZ
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/URHHSIBTPTALXMECRLAC2EVDNAFSR5NO
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/URHHSIBTPTALXMECRLAC2EVDNAFSR5NO
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HGYC6L7ENH5VEGN3YWFBYMGKX6WNS7HZ
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HGYC6L7ENH5VEGN3YWFBYMGKX6WNS7HZ
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URHHSIBTPTALXMECRLAC2EVDNAFSR5NO
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URHHSIBTPTALXMECRLAC2EVDNAFSR5NO
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-2309
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-2309
16
reference_url https://security.gentoo.org/glsa/202208-06
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/202208-06
17
reference_url https://security.netapp.com/advisory/ntap-20220915-0006
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20220915-0006
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014766
reference_id 1014766
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014766
19
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1039991
reference_id 1039991
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1039991
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2107571
reference_id 2107571
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2107571
21
reference_url https://access.redhat.com/errata/RHSA-2022:8226
reference_id RHSA-2022:8226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8226
22
reference_url https://usn.ubuntu.com/5760-1/
reference_id USN-5760-1
reference_type
scores
url https://usn.ubuntu.com/5760-1/
23
reference_url https://usn.ubuntu.com/6028-2/
reference_id USN-6028-2
reference_type
scores
url https://usn.ubuntu.com/6028-2/
fixed_packages
0
url pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5
purl pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-62bb-e8vk-7uh4
1
vulnerability VCID-d1ar-1945-sygd
2
vulnerability VCID-knx8-5fpz-zbgn
3
vulnerability VCID-nj3a-zqw9-6bga
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.9.14%252Bdfsg-1.3~deb12u5
aliases CVE-2022-2309, GHSA-wrxv-2j5q-m38w, PYSEC-2022-230
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4m3j-qy8c-4uhk
4
url VCID-74y5-vcxn-2ygr
vulnerability_id VCID-74y5-vcxn-2ygr
summary libxml: Heap use after free (UAF) leads to Denial of service (DoS)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49794.json
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49794.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-49794
reference_id
reference_type
scores
0
value 0.00123
scoring_system epss
scoring_elements 0.31508
published_at 2026-04-02T12:55:00Z
1
value 0.00123
scoring_system epss
scoring_elements 0.31549
published_at 2026-04-04T12:55:00Z
2
value 0.00123
scoring_system epss
scoring_elements 0.31368
published_at 2026-04-07T12:55:00Z
3
value 0.00123
scoring_system epss
scoring_elements 0.31421
published_at 2026-04-08T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.31452
published_at 2026-04-09T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.31455
published_at 2026-04-11T12:55:00Z
6
value 0.00363
scoring_system epss
scoring_elements 0.58432
published_at 2026-04-21T12:55:00Z
7
value 0.00445
scoring_system epss
scoring_elements 0.63467
published_at 2026-04-16T12:55:00Z
8
value 0.00445
scoring_system epss
scoring_elements 0.63469
published_at 2026-04-12T12:55:00Z
9
value 0.00445
scoring_system epss
scoring_elements 0.63434
published_at 2026-04-13T12:55:00Z
10
value 0.00445
scoring_system epss
scoring_elements 0.63475
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-49794
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49794
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107755
reference_id 1107755
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107755
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2372373
reference_id 2372373
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:50:46Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2372373
6
reference_url https://gitlab.gnome.org/GNOME/libxml2/-/issues/931
reference_id 931
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:50:46Z/
url https://gitlab.gnome.org/GNOME/libxml2/-/issues/931
7
reference_url https://security.archlinux.org/AVG-2898
reference_id AVG-2898
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2898
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:cert_manager:1.16::el9
reference_id cpe:/a:redhat:cert_manager:1.16::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:cert_manager:1.16::el9
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
reference_id cpe:/a:redhat:hummingbird:1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
reference_id cpe:/a:redhat:insights_proxy:1.5::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:jboss_core_services:1
reference_id cpe:/a:redhat:jboss_core_services:1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:jboss_core_services:1
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.12::el8
reference_id cpe:/a:redhat:openshift:4.12::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.12::el8
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.13::el9
reference_id cpe:/a:redhat:openshift:4.13::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.13::el9
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.14::el9
reference_id cpe:/a:redhat:openshift:4.14::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.14::el9
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.17::el9
reference_id cpe:/a:redhat:openshift:4.17::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.17::el9
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.18::el9
reference_id cpe:/a:redhat:openshift:4.18::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.18::el9
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.19::el9
reference_id cpe:/a:redhat:openshift:4.19::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.19::el9
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.20::el9
reference_id cpe:/a:redhat:openshift:4.20::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.20::el9
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_file_integrity_operator:1::el9
reference_id cpe:/a:redhat:openshift_file_integrity_operator:1::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_file_integrity_operator:1::el9
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_serverless:1.36::el8
reference_id cpe:/a:redhat:openshift_serverless:1.36::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_serverless:1.36::el8
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:webterminal:1.11::el9
reference_id cpe:/a:redhat:webterminal:1.11::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:webterminal:1.11::el9
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:webterminal:1.12::el9
reference_id cpe:/a:redhat:webterminal:1.12::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:webterminal:1.12::el9
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
reference_id cpe:/o:redhat:rhel_aus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.0::baseos
reference_id cpe:/o:redhat:rhel_e4s:9.0::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.0::baseos
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_id cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
reference_id cpe:/o:redhat:rhel_eus:9.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
reference_id cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
reference_id cpe:/o:redhat:rhel_tus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.8::baseos
reference_id cpe:/o:redhat:rhel_tus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.8::baseos
52
reference_url https://access.redhat.com/security/cve/CVE-2025-49794
reference_id CVE-2025-49794
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:50:46Z/
url https://access.redhat.com/security/cve/CVE-2025-49794
53
reference_url https://access.redhat.com/errata/RHSA-2025:10630
reference_id RHSA-2025:10630
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:50:46Z/
url https://access.redhat.com/errata/RHSA-2025:10630
54
reference_url https://access.redhat.com/errata/RHSA-2025:10698
reference_id RHSA-2025:10698
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:50:46Z/
url https://access.redhat.com/errata/RHSA-2025:10698
55
reference_url https://access.redhat.com/errata/RHSA-2025:10699
reference_id RHSA-2025:10699
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:50:46Z/
url https://access.redhat.com/errata/RHSA-2025:10699
56
reference_url https://access.redhat.com/errata/RHSA-2025:11580
reference_id RHSA-2025:11580
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:50:46Z/
url https://access.redhat.com/errata/RHSA-2025:11580
57
reference_url https://access.redhat.com/errata/RHSA-2025:12098
reference_id RHSA-2025:12098
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:50:46Z/
url https://access.redhat.com/errata/RHSA-2025:12098
58
reference_url https://access.redhat.com/errata/RHSA-2025:12099
reference_id RHSA-2025:12099
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:50:46Z/
url https://access.redhat.com/errata/RHSA-2025:12099
59
reference_url https://access.redhat.com/errata/RHSA-2025:12199
reference_id RHSA-2025:12199
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:50:46Z/
url https://access.redhat.com/errata/RHSA-2025:12199
60
reference_url https://access.redhat.com/errata/RHSA-2025:12237
reference_id RHSA-2025:12237
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:50:46Z/
url https://access.redhat.com/errata/RHSA-2025:12237
61
reference_url https://access.redhat.com/errata/RHSA-2025:12239
reference_id RHSA-2025:12239
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:50:46Z/
url https://access.redhat.com/errata/RHSA-2025:12239
62
reference_url https://access.redhat.com/errata/RHSA-2025:12240
reference_id RHSA-2025:12240
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:50:46Z/
url https://access.redhat.com/errata/RHSA-2025:12240
63
reference_url https://access.redhat.com/errata/RHSA-2025:12241
reference_id RHSA-2025:12241
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:50:46Z/
url https://access.redhat.com/errata/RHSA-2025:12241
64
reference_url https://access.redhat.com/errata/RHSA-2025:13335
reference_id RHSA-2025:13335
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:50:46Z/
url https://access.redhat.com/errata/RHSA-2025:13335
65
reference_url https://access.redhat.com/errata/RHSA-2025:15827
reference_id RHSA-2025:15827
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:50:46Z/
url https://access.redhat.com/errata/RHSA-2025:15827
66
reference_url https://access.redhat.com/errata/RHSA-2025:15828
reference_id RHSA-2025:15828
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:50:46Z/
url https://access.redhat.com/errata/RHSA-2025:15828
67
reference_url https://access.redhat.com/errata/RHSA-2025:18219
reference_id RHSA-2025:18219
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:50:46Z/
url https://access.redhat.com/errata/RHSA-2025:18219
68
reference_url https://access.redhat.com/errata/RHSA-2025:19020
reference_id RHSA-2025:19020
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:50:46Z/
url https://access.redhat.com/errata/RHSA-2025:19020
69
reference_url https://access.redhat.com/errata/RHSA-2025:21913
reference_id RHSA-2025:21913
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:50:46Z/
url https://access.redhat.com/errata/RHSA-2025:21913
70
reference_url https://access.redhat.com/errata/RHSA-2026:0934
reference_id RHSA-2026:0934
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:50:46Z/
url https://access.redhat.com/errata/RHSA-2026:0934
71
reference_url https://access.redhat.com/errata/RHSA-2026:7519
reference_id RHSA-2026:7519
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:50:46Z/
url https://access.redhat.com/errata/RHSA-2026:7519
72
reference_url https://usn.ubuntu.com/7694-1/
reference_id USN-7694-1
reference_type
scores
url https://usn.ubuntu.com/7694-1/
fixed_packages
0
url pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5
purl pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-62bb-e8vk-7uh4
1
vulnerability VCID-d1ar-1945-sygd
2
vulnerability VCID-knx8-5fpz-zbgn
3
vulnerability VCID-nj3a-zqw9-6bga
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.9.14%252Bdfsg-1.3~deb12u5
aliases CVE-2025-49794
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-74y5-vcxn-2ygr
5
url VCID-8d2w-3c3p-zqaz
vulnerability_id VCID-8d2w-3c3p-zqaz
summary libxml2: buffer over-read in xmlHTMLPrintFileContext in xmllint.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-34459.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-34459.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-34459
reference_id
reference_type
scores
0
value 0.0078
scoring_system epss
scoring_elements 0.7372
published_at 2026-04-16T12:55:00Z
1
value 0.0078
scoring_system epss
scoring_elements 0.73676
published_at 2026-04-13T12:55:00Z
2
value 0.0078
scoring_system epss
scoring_elements 0.73685
published_at 2026-04-12T12:55:00Z
3
value 0.0078
scoring_system epss
scoring_elements 0.73702
published_at 2026-04-11T12:55:00Z
4
value 0.0078
scoring_system epss
scoring_elements 0.7368
published_at 2026-04-09T12:55:00Z
5
value 0.0078
scoring_system epss
scoring_elements 0.73667
published_at 2026-04-08T12:55:00Z
6
value 0.0078
scoring_system epss
scoring_elements 0.73632
published_at 2026-04-07T12:55:00Z
7
value 0.0078
scoring_system epss
scoring_elements 0.73635
published_at 2026-04-02T12:55:00Z
8
value 0.0078
scoring_system epss
scoring_elements 0.73659
published_at 2026-04-04T12:55:00Z
9
value 0.03141
scoring_system epss
scoring_elements 0.86905
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-34459
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34459
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34459
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1071162
reference_id 1071162
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1071162
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2280532
reference_id 2280532
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2280532
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5HVUXKYTBWT3G5DEEQX62STJQBY367NL/
reference_id 5HVUXKYTBWT3G5DEEQX62STJQBY367NL
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-22T17:18:58Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5HVUXKYTBWT3G5DEEQX62STJQBY367NL/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/INKSSLW5VMZIXHRPZBAW4TJUX5SQKARG/
reference_id INKSSLW5VMZIXHRPZBAW4TJUX5SQKARG
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-22T17:18:58Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/INKSSLW5VMZIXHRPZBAW4TJUX5SQKARG/
8
reference_url https://usn.ubuntu.com/7240-1/
reference_id USN-7240-1
reference_type
scores
url https://usn.ubuntu.com/7240-1/
9
reference_url https://usn.ubuntu.com/7302-1/
reference_id USN-7302-1
reference_type
scores
url https://usn.ubuntu.com/7302-1/
10
reference_url https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.11.8
reference_id v2.11.8
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-22T17:18:58Z/
url https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.11.8
11
reference_url https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.7
reference_id v2.12.7
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-22T17:18:58Z/
url https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.7
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VRDJCNQP32LV56KESUQ5SNZKAJWSZZRI/
reference_id VRDJCNQP32LV56KESUQ5SNZKAJWSZZRI
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-22T17:18:58Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VRDJCNQP32LV56KESUQ5SNZKAJWSZZRI/
fixed_packages
0
url pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5
purl pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-62bb-e8vk-7uh4
1
vulnerability VCID-d1ar-1945-sygd
2
vulnerability VCID-knx8-5fpz-zbgn
3
vulnerability VCID-nj3a-zqw9-6bga
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.9.14%252Bdfsg-1.3~deb12u5
aliases CVE-2024-34459
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8d2w-3c3p-zqaz
6
url VCID-aasn-u7fd-8bhy
vulnerability_id VCID-aasn-u7fd-8bhy
summary
Improper Restriction of Operations within the Bounds of a Memory Buffer
Xmlsoft Libxml2 v2.11.0 was discovered to contain a global buffer overflow via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted XML file.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39615.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39615.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39615
reference_id
reference_type
scores
0
value 0.00117
scoring_system epss
scoring_elements 0.30578
published_at 2026-04-21T12:55:00Z
1
value 0.00117
scoring_system epss
scoring_elements 0.30649
published_at 2026-04-12T12:55:00Z
2
value 0.00117
scoring_system epss
scoring_elements 0.30604
published_at 2026-04-13T12:55:00Z
3
value 0.00117
scoring_system epss
scoring_elements 0.30629
published_at 2026-04-16T12:55:00Z
4
value 0.00117
scoring_system epss
scoring_elements 0.30612
published_at 2026-04-18T12:55:00Z
5
value 0.00128
scoring_system epss
scoring_elements 0.32184
published_at 2026-04-09T12:55:00Z
6
value 0.00128
scoring_system epss
scoring_elements 0.32187
published_at 2026-04-11T12:55:00Z
7
value 0.0014
scoring_system epss
scoring_elements 0.34244
published_at 2026-04-02T12:55:00Z
8
value 0.0014
scoring_system epss
scoring_elements 0.34276
published_at 2026-04-04T12:55:00Z
9
value 0.00155
scoring_system epss
scoring_elements 0.36251
published_at 2026-04-07T12:55:00Z
10
value 0.00155
scoring_system epss
scoring_elements 0.363
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39615
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39615
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.gnome.org/GNOME/libxml2/-/issues/535
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T13:25:30Z/
url https://gitlab.gnome.org/GNOME/libxml2/-/issues/535
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051230
reference_id 1051230
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051230
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2235864
reference_id 2235864
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2235864
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-39615
reference_id CVE-2023-39615
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-39615
8
reference_url https://access.redhat.com/errata/RHSA-2023:7544
reference_id RHSA-2023:7544
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7544
9
reference_url https://access.redhat.com/errata/RHSA-2023:7626
reference_id RHSA-2023:7626
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7626
10
reference_url https://access.redhat.com/errata/RHSA-2023:7747
reference_id RHSA-2023:7747
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7747
11
reference_url https://access.redhat.com/errata/RHSA-2024:0119
reference_id RHSA-2024:0119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0119
12
reference_url https://access.redhat.com/errata/RHSA-2024:0413
reference_id RHSA-2024:0413
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0413
13
reference_url https://access.redhat.com/errata/RHSA-2024:1317
reference_id RHSA-2024:1317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1317
14
reference_url https://access.redhat.com/errata/RHSA-2024:1383
reference_id RHSA-2024:1383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1383
15
reference_url https://access.redhat.com/errata/RHSA-2024:1477
reference_id RHSA-2024:1477
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1477
fixed_packages
0
url pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5
purl pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-62bb-e8vk-7uh4
1
vulnerability VCID-d1ar-1945-sygd
2
vulnerability VCID-knx8-5fpz-zbgn
3
vulnerability VCID-nj3a-zqw9-6bga
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.9.14%252Bdfsg-1.3~deb12u5
aliases CVE-2023-39615
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aasn-u7fd-8bhy
7
url VCID-ahha-vnq4-7qd2
vulnerability_id VCID-ahha-vnq4-7qd2
summary libxslt: libxml2: Inifinite recursion at exsltDynMapFunction function in libexslt/dynamic.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9714.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9714.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-9714
reference_id
reference_type
scores
0
value 9e-05
scoring_system epss
scoring_elements 0.00812
published_at 2026-04-04T12:55:00Z
1
value 9e-05
scoring_system epss
scoring_elements 0.00963
published_at 2026-04-21T12:55:00Z
2
value 9e-05
scoring_system epss
scoring_elements 0.00909
published_at 2026-04-13T12:55:00Z
3
value 9e-05
scoring_system epss
scoring_elements 0.00905
published_at 2026-04-16T12:55:00Z
4
value 9e-05
scoring_system epss
scoring_elements 0.00913
published_at 2026-04-18T12:55:00Z
5
value 9e-05
scoring_system epss
scoring_elements 0.00924
published_at 2026-04-09T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.00927
published_at 2026-04-08T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.00912
published_at 2026-04-11T12:55:00Z
8
value 9e-05
scoring_system epss
scoring_elements 0.00907
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-9714
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9714
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2392605
reference_id 2392605
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2392605
5
reference_url https://gitlab.gnome.org/GNOME/libxml2/-/commit/677a42645ef22b5a50741bad5facf9d8a8bc6d21
reference_id 677a42645ef22b5a50741bad5facf9d8a8bc6d21
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-10T18:46:42Z/
url https://gitlab.gnome.org/GNOME/libxml2/-/commit/677a42645ef22b5a50741bad5facf9d8a8bc6d21
6
reference_url https://access.redhat.com/errata/RHSA-2025:22162
reference_id RHSA-2025:22162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22162
7
reference_url https://access.redhat.com/errata/RHSA-2025:22163
reference_id RHSA-2025:22163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22163
8
reference_url https://access.redhat.com/errata/RHSA-2025:22177
reference_id RHSA-2025:22177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22177
9
reference_url https://access.redhat.com/errata/RHSA-2025:22376
reference_id RHSA-2025:22376
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22376
10
reference_url https://access.redhat.com/errata/RHSA-2025:22377
reference_id RHSA-2025:22377
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22377
11
reference_url https://access.redhat.com/errata/RHSA-2025:22868
reference_id RHSA-2025:22868
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22868
12
reference_url https://access.redhat.com/errata/RHSA-2025:23202
reference_id RHSA-2025:23202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23202
13
reference_url https://access.redhat.com/errata/RHSA-2025:23204
reference_id RHSA-2025:23204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23204
14
reference_url https://access.redhat.com/errata/RHSA-2025:23205
reference_id RHSA-2025:23205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23205
15
reference_url https://access.redhat.com/errata/RHSA-2025:23209
reference_id RHSA-2025:23209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23209
16
reference_url https://access.redhat.com/errata/RHSA-2025:23227
reference_id RHSA-2025:23227
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23227
17
reference_url https://access.redhat.com/errata/RHSA-2025:23234
reference_id RHSA-2025:23234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23234
18
reference_url https://access.redhat.com/errata/RHSA-2025:23449
reference_id RHSA-2025:23449
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23449
19
reference_url https://access.redhat.com/errata/RHSA-2026:0414
reference_id RHSA-2026:0414
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0414
20
reference_url https://access.redhat.com/errata/RHSA-2026:0677
reference_id RHSA-2026:0677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0677
21
reference_url https://access.redhat.com/errata/RHSA-2026:0702
reference_id RHSA-2026:0702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0702
22
reference_url https://access.redhat.com/errata/RHSA-2026:0978
reference_id RHSA-2026:0978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0978
23
reference_url https://access.redhat.com/errata/RHSA-2026:0980
reference_id RHSA-2026:0980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0980
24
reference_url https://access.redhat.com/errata/RHSA-2026:0985
reference_id RHSA-2026:0985
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0985
25
reference_url https://access.redhat.com/errata/RHSA-2026:0996
reference_id RHSA-2026:0996
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0996
26
reference_url https://access.redhat.com/errata/RHSA-2026:1539
reference_id RHSA-2026:1539
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1539
27
reference_url https://access.redhat.com/errata/RHSA-2026:1541
reference_id RHSA-2026:1541
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1541
28
reference_url https://access.redhat.com/errata/RHSA-2026:1652
reference_id RHSA-2026:1652
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1652
29
reference_url https://access.redhat.com/errata/RHSA-2026:3461
reference_id RHSA-2026:3461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3461
30
reference_url https://access.redhat.com/errata/RHSA-2026:3462
reference_id RHSA-2026:3462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3462
31
reference_url https://access.redhat.com/errata/RHSA-2026:7519
reference_id RHSA-2026:7519
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7519
32
reference_url https://usn.ubuntu.com/7743-1/
reference_id USN-7743-1
reference_type
scores
url https://usn.ubuntu.com/7743-1/
fixed_packages
0
url pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5
purl pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-62bb-e8vk-7uh4
1
vulnerability VCID-d1ar-1945-sygd
2
vulnerability VCID-knx8-5fpz-zbgn
3
vulnerability VCID-nj3a-zqw9-6bga
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.9.14%252Bdfsg-1.3~deb12u5
aliases CVE-2025-9714
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ahha-vnq4-7qd2
8
url VCID-bz1e-1ypb-kkgg
vulnerability_id VCID-bz1e-1ypb-kkgg
summary libxml: Type confusion leads to Denial of service (DoS)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49796.json
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49796.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-49796
reference_id
reference_type
scores
0
value 0.00496
scoring_system epss
scoring_elements 0.65791
published_at 2026-04-04T12:55:00Z
1
value 0.00496
scoring_system epss
scoring_elements 0.65761
published_at 2026-04-02T12:55:00Z
2
value 0.00496
scoring_system epss
scoring_elements 0.65756
published_at 2026-04-07T12:55:00Z
3
value 0.00496
scoring_system epss
scoring_elements 0.65809
published_at 2026-04-08T12:55:00Z
4
value 0.00496
scoring_system epss
scoring_elements 0.6582
published_at 2026-04-09T12:55:00Z
5
value 0.00496
scoring_system epss
scoring_elements 0.6584
published_at 2026-04-11T12:55:00Z
6
value 0.01455
scoring_system epss
scoring_elements 0.80845
published_at 2026-04-21T12:55:00Z
7
value 0.01777
scoring_system epss
scoring_elements 0.82725
published_at 2026-04-18T12:55:00Z
8
value 0.01777
scoring_system epss
scoring_elements 0.82689
published_at 2026-04-12T12:55:00Z
9
value 0.01777
scoring_system epss
scoring_elements 0.82685
published_at 2026-04-13T12:55:00Z
10
value 0.01777
scoring_system epss
scoring_elements 0.82724
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-49796
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49796
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107752
reference_id 1107752
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107752
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2372385
reference_id 2372385
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:32:55Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2372385
6
reference_url https://gitlab.gnome.org/GNOME/libxml2/-/issues/933
reference_id 933
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:32:55Z/
url https://gitlab.gnome.org/GNOME/libxml2/-/issues/933
7
reference_url https://security.archlinux.org/AVG-2898
reference_id AVG-2898
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2898
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:cert_manager:1.16::el9
reference_id cpe:/a:redhat:cert_manager:1.16::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:cert_manager:1.16::el9
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
reference_id cpe:/a:redhat:discovery:2::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
reference_id cpe:/a:redhat:hummingbird:1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
reference_id cpe:/a:redhat:insights_proxy:1.5::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:jboss_core_services:1
reference_id cpe:/a:redhat:jboss_core_services:1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:jboss_core_services:1
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.12::el8
reference_id cpe:/a:redhat:openshift:4.12::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.12::el8
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.13::el9
reference_id cpe:/a:redhat:openshift:4.13::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.13::el9
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.14::el9
reference_id cpe:/a:redhat:openshift:4.14::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.14::el9
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.17::el9
reference_id cpe:/a:redhat:openshift:4.17::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.17::el9
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.18::el9
reference_id cpe:/a:redhat:openshift:4.18::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.18::el9
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.19::el9
reference_id cpe:/a:redhat:openshift:4.19::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.19::el9
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.20::el9
reference_id cpe:/a:redhat:openshift:4.20::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.20::el9
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_file_integrity_operator:1::el9
reference_id cpe:/a:redhat:openshift_file_integrity_operator:1::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_file_integrity_operator:1::el9
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_serverless:1.36::el8
reference_id cpe:/a:redhat:openshift_serverless:1.36::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_serverless:1.36::el8
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:webterminal:1.11::el9
reference_id cpe:/a:redhat:webterminal:1.11::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:webterminal:1.11::el9
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:webterminal:1.12::el9
reference_id cpe:/a:redhat:webterminal:1.12::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:webterminal:1.12::el9
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
reference_id cpe:/o:redhat:rhel_aus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.0::baseos
reference_id cpe:/o:redhat:rhel_e4s:9.0::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.0::baseos
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_id cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
reference_id cpe:/o:redhat:rhel_eus:9.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
reference_id cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
reference_id cpe:/o:redhat:rhel_tus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.8::baseos
reference_id cpe:/o:redhat:rhel_tus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.8::baseos
53
reference_url https://access.redhat.com/security/cve/CVE-2025-49796
reference_id CVE-2025-49796
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:32:55Z/
url https://access.redhat.com/security/cve/CVE-2025-49796
54
reference_url https://access.redhat.com/errata/RHSA-2025:10630
reference_id RHSA-2025:10630
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:32:55Z/
url https://access.redhat.com/errata/RHSA-2025:10630
55
reference_url https://access.redhat.com/errata/RHSA-2025:10698
reference_id RHSA-2025:10698
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:32:55Z/
url https://access.redhat.com/errata/RHSA-2025:10698
56
reference_url https://access.redhat.com/errata/RHSA-2025:10699
reference_id RHSA-2025:10699
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:32:55Z/
url https://access.redhat.com/errata/RHSA-2025:10699
57
reference_url https://access.redhat.com/errata/RHSA-2025:11580
reference_id RHSA-2025:11580
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:32:55Z/
url https://access.redhat.com/errata/RHSA-2025:11580
58
reference_url https://access.redhat.com/errata/RHSA-2025:12098
reference_id RHSA-2025:12098
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:32:55Z/
url https://access.redhat.com/errata/RHSA-2025:12098
59
reference_url https://access.redhat.com/errata/RHSA-2025:12099
reference_id RHSA-2025:12099
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:32:55Z/
url https://access.redhat.com/errata/RHSA-2025:12099
60
reference_url https://access.redhat.com/errata/RHSA-2025:12199
reference_id RHSA-2025:12199
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:32:55Z/
url https://access.redhat.com/errata/RHSA-2025:12199
61
reference_url https://access.redhat.com/errata/RHSA-2025:12237
reference_id RHSA-2025:12237
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:32:55Z/
url https://access.redhat.com/errata/RHSA-2025:12237
62
reference_url https://access.redhat.com/errata/RHSA-2025:12239
reference_id RHSA-2025:12239
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:32:55Z/
url https://access.redhat.com/errata/RHSA-2025:12239
63
reference_url https://access.redhat.com/errata/RHSA-2025:12240
reference_id RHSA-2025:12240
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:32:55Z/
url https://access.redhat.com/errata/RHSA-2025:12240
64
reference_url https://access.redhat.com/errata/RHSA-2025:12241
reference_id RHSA-2025:12241
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:32:55Z/
url https://access.redhat.com/errata/RHSA-2025:12241
65
reference_url https://access.redhat.com/errata/RHSA-2025:13267
reference_id RHSA-2025:13267
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:32:55Z/
url https://access.redhat.com/errata/RHSA-2025:13267
66
reference_url https://access.redhat.com/errata/RHSA-2025:13335
reference_id RHSA-2025:13335
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:32:55Z/
url https://access.redhat.com/errata/RHSA-2025:13335
67
reference_url https://access.redhat.com/errata/RHSA-2025:15827
reference_id RHSA-2025:15827
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:32:55Z/
url https://access.redhat.com/errata/RHSA-2025:15827
68
reference_url https://access.redhat.com/errata/RHSA-2025:15828
reference_id RHSA-2025:15828
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:32:55Z/
url https://access.redhat.com/errata/RHSA-2025:15828
69
reference_url https://access.redhat.com/errata/RHSA-2025:18219
reference_id RHSA-2025:18219
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:32:55Z/
url https://access.redhat.com/errata/RHSA-2025:18219
70
reference_url https://access.redhat.com/errata/RHSA-2025:19020
reference_id RHSA-2025:19020
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:32:55Z/
url https://access.redhat.com/errata/RHSA-2025:19020
71
reference_url https://access.redhat.com/errata/RHSA-2025:21913
reference_id RHSA-2025:21913
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:32:55Z/
url https://access.redhat.com/errata/RHSA-2025:21913
72
reference_url https://access.redhat.com/errata/RHSA-2026:0934
reference_id RHSA-2026:0934
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:32:55Z/
url https://access.redhat.com/errata/RHSA-2026:0934
73
reference_url https://access.redhat.com/errata/RHSA-2026:7519
reference_id RHSA-2026:7519
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-16T15:32:55Z/
url https://access.redhat.com/errata/RHSA-2026:7519
74
reference_url https://usn.ubuntu.com/7694-1/
reference_id USN-7694-1
reference_type
scores
url https://usn.ubuntu.com/7694-1/
fixed_packages
0
url pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5
purl pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-62bb-e8vk-7uh4
1
vulnerability VCID-d1ar-1945-sygd
2
vulnerability VCID-knx8-5fpz-zbgn
3
vulnerability VCID-nj3a-zqw9-6bga
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.9.14%252Bdfsg-1.3~deb12u5
aliases CVE-2025-49796
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bz1e-1ypb-kkgg
9
url VCID-c9ds-faa9-t7be
vulnerability_id VCID-c9ds-faa9-t7be
summary libxml2: Use-After-Free in libxml2
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56171.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56171.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-56171
reference_id
reference_type
scores
0
value 0.00183
scoring_system epss
scoring_elements 0.3994
published_at 2026-04-21T12:55:00Z
1
value 0.00183
scoring_system epss
scoring_elements 0.39997
published_at 2026-04-13T12:55:00Z
2
value 0.00183
scoring_system epss
scoring_elements 0.40048
published_at 2026-04-16T12:55:00Z
3
value 0.00183
scoring_system epss
scoring_elements 0.40018
published_at 2026-04-18T12:55:00Z
4
value 0.00183
scoring_system epss
scoring_elements 0.40029
published_at 2026-04-02T12:55:00Z
5
value 0.00183
scoring_system epss
scoring_elements 0.40055
published_at 2026-04-04T12:55:00Z
6
value 0.00183
scoring_system epss
scoring_elements 0.39977
published_at 2026-04-07T12:55:00Z
7
value 0.00183
scoring_system epss
scoring_elements 0.4003
published_at 2026-04-08T12:55:00Z
8
value 0.00183
scoring_system epss
scoring_elements 0.40044
published_at 2026-04-09T12:55:00Z
9
value 0.00183
scoring_system epss
scoring_elements 0.40054
published_at 2026-04-11T12:55:00Z
10
value 0.00183
scoring_system epss
scoring_elements 0.40017
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-56171
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56171
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56171
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098320
reference_id 1098320
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098320
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2346416
reference_id 2346416
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2346416
6
reference_url https://gitlab.gnome.org/GNOME/libxml2/-/issues/828
reference_id 828
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-19T16:26:31Z/
url https://gitlab.gnome.org/GNOME/libxml2/-/issues/828
7
reference_url https://access.redhat.com/errata/RHSA-2025:2482
reference_id RHSA-2025:2482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2482
8
reference_url https://access.redhat.com/errata/RHSA-2025:2483
reference_id RHSA-2025:2483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2483
9
reference_url https://access.redhat.com/errata/RHSA-2025:2507
reference_id RHSA-2025:2507
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2507
10
reference_url https://access.redhat.com/errata/RHSA-2025:2513
reference_id RHSA-2025:2513
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2513
11
reference_url https://access.redhat.com/errata/RHSA-2025:2654
reference_id RHSA-2025:2654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2654
12
reference_url https://access.redhat.com/errata/RHSA-2025:2660
reference_id RHSA-2025:2660
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2660
13
reference_url https://access.redhat.com/errata/RHSA-2025:2673
reference_id RHSA-2025:2673
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2673
14
reference_url https://access.redhat.com/errata/RHSA-2025:2678
reference_id RHSA-2025:2678
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2678
15
reference_url https://access.redhat.com/errata/RHSA-2025:2679
reference_id RHSA-2025:2679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2679
16
reference_url https://access.redhat.com/errata/RHSA-2025:2686
reference_id RHSA-2025:2686
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2686
17
reference_url https://access.redhat.com/errata/RHSA-2025:2789
reference_id RHSA-2025:2789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2789
18
reference_url https://access.redhat.com/errata/RHSA-2025:3055
reference_id RHSA-2025:3055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3055
19
reference_url https://access.redhat.com/errata/RHSA-2025:3059
reference_id RHSA-2025:3059
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3059
20
reference_url https://access.redhat.com/errata/RHSA-2025:3066
reference_id RHSA-2025:3066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3066
21
reference_url https://access.redhat.com/errata/RHSA-2025:3368
reference_id RHSA-2025:3368
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3368
22
reference_url https://access.redhat.com/errata/RHSA-2025:3397
reference_id RHSA-2025:3397
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3397
23
reference_url https://access.redhat.com/errata/RHSA-2025:3453
reference_id RHSA-2025:3453
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3453
24
reference_url https://access.redhat.com/errata/RHSA-2025:3569
reference_id RHSA-2025:3569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3569
25
reference_url https://access.redhat.com/errata/RHSA-2025:3867
reference_id RHSA-2025:3867
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3867
26
reference_url https://access.redhat.com/errata/RHSA-2025:4005
reference_id RHSA-2025:4005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4005
27
reference_url https://access.redhat.com/errata/RHSA-2025:9895
reference_id RHSA-2025:9895
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:9895
28
reference_url https://usn.ubuntu.com/7302-1/
reference_id USN-7302-1
reference_type
scores
url https://usn.ubuntu.com/7302-1/
fixed_packages
0
url pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5
purl pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-62bb-e8vk-7uh4
1
vulnerability VCID-d1ar-1945-sygd
2
vulnerability VCID-knx8-5fpz-zbgn
3
vulnerability VCID-nj3a-zqw9-6bga
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.9.14%252Bdfsg-1.3~deb12u5
aliases CVE-2024-56171
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c9ds-faa9-t7be
10
url VCID-d68t-f8j1-h3am
vulnerability_id VCID-d68t-f8j1-h3am
summary
Use After Free
When using the XML Reader interface with DTD validation and XInclude expansion enabled, processing crafted XML documents can lead to an xmlValidatePopElement use-after-free.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-25062.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-25062.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-25062
reference_id
reference_type
scores
0
value 0.00165
scoring_system epss
scoring_elements 0.37508
published_at 2026-04-21T12:55:00Z
1
value 0.00165
scoring_system epss
scoring_elements 0.37608
published_at 2026-04-11T12:55:00Z
2
value 0.00165
scoring_system epss
scoring_elements 0.37574
published_at 2026-04-12T12:55:00Z
3
value 0.00165
scoring_system epss
scoring_elements 0.37547
published_at 2026-04-13T12:55:00Z
4
value 0.00165
scoring_system epss
scoring_elements 0.37591
published_at 2026-04-16T12:55:00Z
5
value 0.00165
scoring_system epss
scoring_elements 0.37572
published_at 2026-04-18T12:55:00Z
6
value 0.00165
scoring_system epss
scoring_elements 0.37627
published_at 2026-04-02T12:55:00Z
7
value 0.00165
scoring_system epss
scoring_elements 0.37651
published_at 2026-04-04T12:55:00Z
8
value 0.00165
scoring_system epss
scoring_elements 0.37529
published_at 2026-04-07T12:55:00Z
9
value 0.00165
scoring_system epss
scoring_elements 0.37581
published_at 2026-04-08T12:55:00Z
10
value 0.00165
scoring_system epss
scoring_elements 0.37594
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-25062
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25062
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25062
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.gnome.org/GNOME/libxml2/-/issues/604
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T17:35:33Z/
url https://gitlab.gnome.org/GNOME/libxml2/-/issues/604
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1063234
reference_id 1063234
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1063234
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2262726
reference_id 2262726
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2262726
7
reference_url https://security.gentoo.org/glsa/202402-11
reference_id GLSA-202402-11
reference_type
scores
url https://security.gentoo.org/glsa/202402-11
8
reference_url https://access.redhat.com/errata/RHSA-2024:1317
reference_id RHSA-2024:1317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1317
9
reference_url https://access.redhat.com/errata/RHSA-2024:2679
reference_id RHSA-2024:2679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2679
10
reference_url https://access.redhat.com/errata/RHSA-2024:3299
reference_id RHSA-2024:3299
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3299
11
reference_url https://access.redhat.com/errata/RHSA-2024:3303
reference_id RHSA-2024:3303
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3303
12
reference_url https://access.redhat.com/errata/RHSA-2024:3625
reference_id RHSA-2024:3625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3625
13
reference_url https://access.redhat.com/errata/RHSA-2024:3626
reference_id RHSA-2024:3626
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3626
14
reference_url https://gitlab.gnome.org/GNOME/libxml2/-/tags
reference_id tags
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T17:35:33Z/
url https://gitlab.gnome.org/GNOME/libxml2/-/tags
15
reference_url https://usn.ubuntu.com/6658-1/
reference_id USN-6658-1
reference_type
scores
url https://usn.ubuntu.com/6658-1/
16
reference_url https://usn.ubuntu.com/6658-2/
reference_id USN-6658-2
reference_type
scores
url https://usn.ubuntu.com/6658-2/
fixed_packages
0
url pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5
purl pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-62bb-e8vk-7uh4
1
vulnerability VCID-d1ar-1945-sygd
2
vulnerability VCID-knx8-5fpz-zbgn
3
vulnerability VCID-nj3a-zqw9-6bga
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.9.14%252Bdfsg-1.3~deb12u5
aliases CVE-2024-25062
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d68t-f8j1-h3am
11
url VCID-drkd-yykc-ayge
vulnerability_id VCID-drkd-yykc-ayge
summary libxml2: Out-of-Bounds Read in libxml2
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32414.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32414.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32414
reference_id
reference_type
scores
0
value 0.00178
scoring_system epss
scoring_elements 0.3946
published_at 2026-04-02T12:55:00Z
1
value 0.00178
scoring_system epss
scoring_elements 0.39361
published_at 2026-04-21T12:55:00Z
2
value 0.00178
scoring_system epss
scoring_elements 0.39424
published_at 2026-04-13T12:55:00Z
3
value 0.00178
scoring_system epss
scoring_elements 0.39476
published_at 2026-04-16T12:55:00Z
4
value 0.00178
scoring_system epss
scoring_elements 0.39447
published_at 2026-04-18T12:55:00Z
5
value 0.00178
scoring_system epss
scoring_elements 0.39483
published_at 2026-04-04T12:55:00Z
6
value 0.00178
scoring_system epss
scoring_elements 0.39397
published_at 2026-04-07T12:55:00Z
7
value 0.00178
scoring_system epss
scoring_elements 0.39453
published_at 2026-04-08T12:55:00Z
8
value 0.00178
scoring_system epss
scoring_elements 0.39468
published_at 2026-04-09T12:55:00Z
9
value 0.00178
scoring_system epss
scoring_elements 0.39479
published_at 2026-04-11T12:55:00Z
10
value 0.00178
scoring_system epss
scoring_elements 0.39441
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32414
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32414
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102521
reference_id 1102521
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102521
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2358121
reference_id 2358121
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2358121
6
reference_url https://access.redhat.com/errata/RHSA-2025:12098
reference_id RHSA-2025:12098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12098
7
reference_url https://access.redhat.com/errata/RHSA-2025:12237
reference_id RHSA-2025:12237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12237
8
reference_url https://access.redhat.com/errata/RHSA-2025:12239
reference_id RHSA-2025:12239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12239
9
reference_url https://access.redhat.com/errata/RHSA-2025:12240
reference_id RHSA-2025:12240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12240
10
reference_url https://access.redhat.com/errata/RHSA-2025:12241
reference_id RHSA-2025:12241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12241
11
reference_url https://access.redhat.com/errata/RHSA-2025:13428
reference_id RHSA-2025:13428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13428
12
reference_url https://access.redhat.com/errata/RHSA-2025:13429
reference_id RHSA-2025:13429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13429
13
reference_url https://access.redhat.com/errata/RHSA-2025:13677
reference_id RHSA-2025:13677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13677
14
reference_url https://access.redhat.com/errata/RHSA-2025:13681
reference_id RHSA-2025:13681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13681
15
reference_url https://access.redhat.com/errata/RHSA-2025:13683
reference_id RHSA-2025:13683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13683
16
reference_url https://access.redhat.com/errata/RHSA-2025:13684
reference_id RHSA-2025:13684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13684
17
reference_url https://access.redhat.com/errata/RHSA-2025:14059
reference_id RHSA-2025:14059
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14059
18
reference_url https://access.redhat.com/errata/RHSA-2025:14644
reference_id RHSA-2025:14644
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14644
19
reference_url https://access.redhat.com/errata/RHSA-2025:14818
reference_id RHSA-2025:14818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14818
20
reference_url https://access.redhat.com/errata/RHSA-2025:14819
reference_id RHSA-2025:14819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14819
21
reference_url https://access.redhat.com/errata/RHSA-2025:14853
reference_id RHSA-2025:14853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14853
22
reference_url https://access.redhat.com/errata/RHSA-2025:14858
reference_id RHSA-2025:14858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14858
23
reference_url https://access.redhat.com/errata/RHSA-2025:15308
reference_id RHSA-2025:15308
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15308
24
reference_url https://access.redhat.com/errata/RHSA-2025:15672
reference_id RHSA-2025:15672
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15672
25
reference_url https://access.redhat.com/errata/RHSA-2025:16159
reference_id RHSA-2025:16159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16159
26
reference_url https://access.redhat.com/errata/RHSA-2025:22529
reference_id RHSA-2025:22529
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22529
27
reference_url https://access.redhat.com/errata/RHSA-2025:8958
reference_id RHSA-2025:8958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8958
28
reference_url https://access.redhat.com/errata/RHSA-2026:7519
reference_id RHSA-2026:7519
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7519
29
reference_url https://usn.ubuntu.com/7467-1/
reference_id USN-7467-1
reference_type
scores
url https://usn.ubuntu.com/7467-1/
30
reference_url https://usn.ubuntu.com/7467-2/
reference_id USN-7467-2
reference_type
scores
url https://usn.ubuntu.com/7467-2/
31
reference_url https://usn.ubuntu.com/7896-1/
reference_id USN-7896-1
reference_type
scores
url https://usn.ubuntu.com/7896-1/
fixed_packages
0
url pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5
purl pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-62bb-e8vk-7uh4
1
vulnerability VCID-d1ar-1945-sygd
2
vulnerability VCID-knx8-5fpz-zbgn
3
vulnerability VCID-nj3a-zqw9-6bga
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.9.14%252Bdfsg-1.3~deb12u5
aliases CVE-2025-32414
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-drkd-yykc-ayge
12
url VCID-hafa-bcpu-8uaj
vulnerability_id VCID-hafa-bcpu-8uaj
summary libxml2: NULL Pointer Dereference in libxml2 xmlPatMatch
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27113.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27113.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-27113
reference_id
reference_type
scores
0
value 0.00094
scoring_system epss
scoring_elements 0.26313
published_at 2026-04-02T12:55:00Z
1
value 0.00094
scoring_system epss
scoring_elements 0.26087
published_at 2026-04-21T12:55:00Z
2
value 0.00094
scoring_system epss
scoring_elements 0.26146
published_at 2026-04-13T12:55:00Z
3
value 0.00094
scoring_system epss
scoring_elements 0.2615
published_at 2026-04-16T12:55:00Z
4
value 0.00094
scoring_system epss
scoring_elements 0.26126
published_at 2026-04-18T12:55:00Z
5
value 0.00094
scoring_system epss
scoring_elements 0.26354
published_at 2026-04-04T12:55:00Z
6
value 0.00094
scoring_system epss
scoring_elements 0.26127
published_at 2026-04-07T12:55:00Z
7
value 0.00094
scoring_system epss
scoring_elements 0.26194
published_at 2026-04-08T12:55:00Z
8
value 0.00094
scoring_system epss
scoring_elements 0.26242
published_at 2026-04-09T12:55:00Z
9
value 0.00094
scoring_system epss
scoring_elements 0.26249
published_at 2026-04-11T12:55:00Z
10
value 0.00094
scoring_system epss
scoring_elements 0.26204
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-27113
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27113
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27113
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098322
reference_id 1098322
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098322
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2346410
reference_id 2346410
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2346410
6
reference_url https://gitlab.gnome.org/GNOME/libxml2/-/issues/861
reference_id 861
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-19T15:33:43Z/
url https://gitlab.gnome.org/GNOME/libxml2/-/issues/861
7
reference_url https://usn.ubuntu.com/7302-1/
reference_id USN-7302-1
reference_type
scores
url https://usn.ubuntu.com/7302-1/
fixed_packages
0
url pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5
purl pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-62bb-e8vk-7uh4
1
vulnerability VCID-d1ar-1945-sygd
2
vulnerability VCID-knx8-5fpz-zbgn
3
vulnerability VCID-nj3a-zqw9-6bga
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.9.14%252Bdfsg-1.3~deb12u5
aliases CVE-2025-27113
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hafa-bcpu-8uaj
13
url VCID-nuh8-qd25-ykan
vulnerability_id VCID-nuh8-qd25-ykan
summary libxml2: Incorrect server side include parsing can lead to XSS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3709.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3709.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3709
reference_id
reference_type
scores
0
value 0.00139
scoring_system epss
scoring_elements 0.33794
published_at 2026-04-01T12:55:00Z
1
value 0.00139
scoring_system epss
scoring_elements 0.34132
published_at 2026-04-02T12:55:00Z
2
value 0.00139
scoring_system epss
scoring_elements 0.34164
published_at 2026-04-04T12:55:00Z
3
value 0.00139
scoring_system epss
scoring_elements 0.34024
published_at 2026-04-07T12:55:00Z
4
value 0.00139
scoring_system epss
scoring_elements 0.34067
published_at 2026-04-08T12:55:00Z
5
value 0.00227
scoring_system epss
scoring_elements 0.45489
published_at 2026-04-21T12:55:00Z
6
value 0.00227
scoring_system epss
scoring_elements 0.45499
published_at 2026-04-09T12:55:00Z
7
value 0.00227
scoring_system epss
scoring_elements 0.45519
published_at 2026-04-11T12:55:00Z
8
value 0.00227
scoring_system epss
scoring_elements 0.45539
published_at 2026-04-18T12:55:00Z
9
value 0.00227
scoring_system epss
scoring_elements 0.45494
published_at 2026-04-13T12:55:00Z
10
value 0.00227
scoring_system epss
scoring_elements 0.45542
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3709
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3709
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3709
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2112766
reference_id 2112766
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2112766
5
reference_url https://access.redhat.com/errata/RHSA-2022:7715
reference_id RHSA-2022:7715
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7715
6
reference_url https://access.redhat.com/errata/RHSA-2023:4767
reference_id RHSA-2023:4767
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4767
7
reference_url https://usn.ubuntu.com/5548-1/
reference_id USN-5548-1
reference_type
scores
url https://usn.ubuntu.com/5548-1/
fixed_packages
0
url pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5
purl pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-62bb-e8vk-7uh4
1
vulnerability VCID-d1ar-1945-sygd
2
vulnerability VCID-knx8-5fpz-zbgn
3
vulnerability VCID-nj3a-zqw9-6bga
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.9.14%252Bdfsg-1.3~deb12u5
aliases CVE-2016-3709
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nuh8-qd25-ykan
14
url VCID-pdv9-xrh8-d3fz
vulnerability_id VCID-pdv9-xrh8-d3fz
summary
Use After Free
This advisory has been marked as False Positive and removed.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45322.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45322.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-45322
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.21497
published_at 2026-04-21T12:55:00Z
1
value 0.00076
scoring_system epss
scoring_elements 0.22953
published_at 2026-04-02T12:55:00Z
2
value 0.00076
scoring_system epss
scoring_elements 0.229
published_at 2026-04-12T12:55:00Z
3
value 0.00076
scoring_system epss
scoring_elements 0.22843
published_at 2026-04-13T12:55:00Z
4
value 0.00076
scoring_system epss
scoring_elements 0.22857
published_at 2026-04-16T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.22851
published_at 2026-04-18T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.22997
published_at 2026-04-04T12:55:00Z
7
value 0.00076
scoring_system epss
scoring_elements 0.22789
published_at 2026-04-07T12:55:00Z
8
value 0.00076
scoring_system epss
scoring_elements 0.22864
published_at 2026-04-08T12:55:00Z
9
value 0.00076
scoring_system epss
scoring_elements 0.22916
published_at 2026-04-09T12:55:00Z
10
value 0.00076
scoring_system epss
scoring_elements 0.22937
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-45322
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45322
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.gnome.org/GNOME/libxml2/-/issues/344
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T18:12:15Z/
url https://gitlab.gnome.org/GNOME/libxml2/-/issues/344
5
reference_url https://gitlab.gnome.org/GNOME/libxml2/-/issues/583
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T18:12:15Z/
url https://gitlab.gnome.org/GNOME/libxml2/-/issues/583
6
reference_url http://www.openwall.com/lists/oss-security/2023/10/06/5
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T18:12:15Z/
url http://www.openwall.com/lists/oss-security/2023/10/06/5
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053629
reference_id 1053629
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053629
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2242945
reference_id 2242945
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2242945
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-45322
reference_id CVE-2023-45322
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-45322
10
reference_url https://security.gentoo.org/glsa/202402-11
reference_id GLSA-202402-11
reference_type
scores
url https://security.gentoo.org/glsa/202402-11
fixed_packages
0
url pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5
purl pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-62bb-e8vk-7uh4
1
vulnerability VCID-d1ar-1945-sygd
2
vulnerability VCID-knx8-5fpz-zbgn
3
vulnerability VCID-nj3a-zqw9-6bga
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.9.14%252Bdfsg-1.3~deb12u5
aliases CVE-2023-45322
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pdv9-xrh8-d3fz
15
url VCID-qh44-gavt-rbdw
vulnerability_id VCID-qh44-gavt-rbdw
summary libxml: use-after-free in xmlXIncludeAddNode
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49043.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49043.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49043
reference_id
reference_type
scores
0
value 0.00222
scoring_system epss
scoring_elements 0.448
published_at 2026-04-02T12:55:00Z
1
value 0.00222
scoring_system epss
scoring_elements 0.44785
published_at 2026-04-21T12:55:00Z
2
value 0.00222
scoring_system epss
scoring_elements 0.44832
published_at 2026-04-11T12:55:00Z
3
value 0.00222
scoring_system epss
scoring_elements 0.44802
published_at 2026-04-12T12:55:00Z
4
value 0.00222
scoring_system epss
scoring_elements 0.44803
published_at 2026-04-13T12:55:00Z
5
value 0.00222
scoring_system epss
scoring_elements 0.44857
published_at 2026-04-16T12:55:00Z
6
value 0.00222
scoring_system epss
scoring_elements 0.4485
published_at 2026-04-18T12:55:00Z
7
value 0.00222
scoring_system epss
scoring_elements 0.44821
published_at 2026-04-04T12:55:00Z
8
value 0.00222
scoring_system epss
scoring_elements 0.44761
published_at 2026-04-07T12:55:00Z
9
value 0.00222
scoring_system epss
scoring_elements 0.44813
published_at 2026-04-08T12:55:00Z
10
value 0.00222
scoring_system epss
scoring_elements 0.44816
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49043
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49043
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1094238
reference_id 1094238
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1094238
5
reference_url https://github.com/php/php-src/issues/17467
reference_id 17467
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-27T14:52:22Z/
url https://github.com/php/php-src/issues/17467
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2342118
reference_id 2342118
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2342118
7
reference_url https://gitlab.gnome.org/GNOME/libxml2/-/commit/5a19e21605398cef6a8b1452477a8705cb41562b
reference_id 5a19e21605398cef6a8b1452477a8705cb41562b
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-27T14:52:22Z/
url https://gitlab.gnome.org/GNOME/libxml2/-/commit/5a19e21605398cef6a8b1452477a8705cb41562b
8
reference_url https://access.redhat.com/errata/RHSA-2025:1350
reference_id RHSA-2025:1350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1350
9
reference_url https://access.redhat.com/errata/RHSA-2025:1487
reference_id RHSA-2025:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1487
10
reference_url https://access.redhat.com/errata/RHSA-2025:1516
reference_id RHSA-2025:1516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1516
11
reference_url https://access.redhat.com/errata/RHSA-2025:1517
reference_id RHSA-2025:1517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1517
12
reference_url https://access.redhat.com/errata/RHSA-2025:1925
reference_id RHSA-2025:1925
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1925
13
reference_url https://access.redhat.com/errata/RHSA-2025:2507
reference_id RHSA-2025:2507
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2507
14
reference_url https://access.redhat.com/errata/RHSA-2025:2678
reference_id RHSA-2025:2678
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2678
15
reference_url https://access.redhat.com/errata/RHSA-2025:3775
reference_id RHSA-2025:3775
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3775
16
reference_url https://access.redhat.com/errata/RHSA-2025:4409
reference_id RHSA-2025:4409
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4409
17
reference_url https://access.redhat.com/errata/RHSA-2025:4422
reference_id RHSA-2025:4422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4422
18
reference_url https://access.redhat.com/errata/RHSA-2025:4677
reference_id RHSA-2025:4677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4677
19
reference_url https://access.redhat.com/errata/RHSA-2025:7702
reference_id RHSA-2025:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7702
20
reference_url https://usn.ubuntu.com/7240-1/
reference_id USN-7240-1
reference_type
scores
url https://usn.ubuntu.com/7240-1/
21
reference_url https://usn.ubuntu.com/7302-1/
reference_id USN-7302-1
reference_type
scores
url https://usn.ubuntu.com/7302-1/
fixed_packages
0
url pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5
purl pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-62bb-e8vk-7uh4
1
vulnerability VCID-d1ar-1945-sygd
2
vulnerability VCID-knx8-5fpz-zbgn
3
vulnerability VCID-nj3a-zqw9-6bga
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.9.14%252Bdfsg-1.3~deb12u5
aliases CVE-2022-49043
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qh44-gavt-rbdw
16
url VCID-qp6y-dt1j-97df
vulnerability_id VCID-qp6y-dt1j-97df
summary libxml2: Out-of-bounds Read in xmlSchemaIDCFillNodeTables
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32415.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32415.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32415
reference_id
reference_type
scores
0
value 0.00071
scoring_system epss
scoring_elements 0.21953
published_at 2026-04-02T12:55:00Z
1
value 0.00071
scoring_system epss
scoring_elements 0.2179
published_at 2026-04-21T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.21817
published_at 2026-04-13T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.2182
published_at 2026-04-16T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.21826
published_at 2026-04-18T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.22006
published_at 2026-04-04T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.21771
published_at 2026-04-07T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21848
published_at 2026-04-08T12:55:00Z
8
value 0.00071
scoring_system epss
scoring_elements 0.21904
published_at 2026-04-09T12:55:00Z
9
value 0.00071
scoring_system epss
scoring_elements 0.21915
published_at 2026-04-11T12:55:00Z
10
value 0.00071
scoring_system epss
scoring_elements 0.21874
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32415
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32415
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32415
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103511
reference_id 1103511
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103511
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2360768
reference_id 2360768
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2360768
6
reference_url https://access.redhat.com/errata/RHSA-2025:13203
reference_id RHSA-2025:13203
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13203
7
reference_url https://access.redhat.com/errata/RHSA-2025:13428
reference_id RHSA-2025:13428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13428
8
reference_url https://access.redhat.com/errata/RHSA-2025:13429
reference_id RHSA-2025:13429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13429
9
reference_url https://access.redhat.com/errata/RHSA-2025:13622
reference_id RHSA-2025:13622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13622
10
reference_url https://access.redhat.com/errata/RHSA-2025:13677
reference_id RHSA-2025:13677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13677
11
reference_url https://access.redhat.com/errata/RHSA-2025:13681
reference_id RHSA-2025:13681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13681
12
reference_url https://access.redhat.com/errata/RHSA-2025:13683
reference_id RHSA-2025:13683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13683
13
reference_url https://access.redhat.com/errata/RHSA-2025:13684
reference_id RHSA-2025:13684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13684
14
reference_url https://access.redhat.com/errata/RHSA-2025:13688
reference_id RHSA-2025:13688
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13688
15
reference_url https://access.redhat.com/errata/RHSA-2025:13689
reference_id RHSA-2025:13689
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13689
16
reference_url https://access.redhat.com/errata/RHSA-2025:13788
reference_id RHSA-2025:13788
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13788
17
reference_url https://access.redhat.com/errata/RHSA-2025:13789
reference_id RHSA-2025:13789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13789
18
reference_url https://access.redhat.com/errata/RHSA-2025:13806
reference_id RHSA-2025:13806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13806
19
reference_url https://access.redhat.com/errata/RHSA-2025:14059
reference_id RHSA-2025:14059
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14059
20
reference_url https://access.redhat.com/errata/RHSA-2025:14186
reference_id RHSA-2025:14186
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14186
21
reference_url https://access.redhat.com/errata/RHSA-2025:14644
reference_id RHSA-2025:14644
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14644
22
reference_url https://access.redhat.com/errata/RHSA-2025:14818
reference_id RHSA-2025:14818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14818
23
reference_url https://access.redhat.com/errata/RHSA-2025:14819
reference_id RHSA-2025:14819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14819
24
reference_url https://access.redhat.com/errata/RHSA-2025:14853
reference_id RHSA-2025:14853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14853
25
reference_url https://access.redhat.com/errata/RHSA-2025:14858
reference_id RHSA-2025:14858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14858
26
reference_url https://access.redhat.com/errata/RHSA-2025:15308
reference_id RHSA-2025:15308
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15308
27
reference_url https://access.redhat.com/errata/RHSA-2025:15672
reference_id RHSA-2025:15672
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15672
28
reference_url https://access.redhat.com/errata/RHSA-2025:16159
reference_id RHSA-2025:16159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16159
29
reference_url https://access.redhat.com/errata/RHSA-2025:22529
reference_id RHSA-2025:22529
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22529
30
reference_url https://access.redhat.com/errata/RHSA-2026:7519
reference_id RHSA-2026:7519
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7519
31
reference_url https://usn.ubuntu.com/7467-1/
reference_id USN-7467-1
reference_type
scores
url https://usn.ubuntu.com/7467-1/
32
reference_url https://usn.ubuntu.com/7467-2/
reference_id USN-7467-2
reference_type
scores
url https://usn.ubuntu.com/7467-2/
33
reference_url https://usn.ubuntu.com/7896-1/
reference_id USN-7896-1
reference_type
scores
url https://usn.ubuntu.com/7896-1/
fixed_packages
0
url pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5
purl pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-62bb-e8vk-7uh4
1
vulnerability VCID-d1ar-1945-sygd
2
vulnerability VCID-knx8-5fpz-zbgn
3
vulnerability VCID-nj3a-zqw9-6bga
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.9.14%252Bdfsg-1.3~deb12u5
aliases CVE-2025-32415
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qp6y-dt1j-97df
Risk_score2.8
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.9.14%252Bdfsg-1.3~deb12u5