Lookup for vulnerable packages by Package URL.

GET /api/packages/1066717?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/1066717?format=api",
    "purl": "pkg:rpm/redhat/nodejs24@1:24.14.1-2?arch=el10_1",
    "type": "rpm",
    "namespace": "redhat",
    "name": "nodejs24",
    "version": "1:24.14.1-2",
    "qualifiers": {
        "arch": "el10_1"
    },
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63920?format=api",
            "vulnerability_id": "VCID-1vp3-fzdr-yqbm",
            "summary": "Node.js: Node.js: Information disclosure due to `fs.realpathSync.native()` bypassing filesystem read restrictions",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21715.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21715.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-21715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00177",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "5e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00201",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "5e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.002",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "5e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00202",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "5e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00204",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "5e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00205",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "5e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00208",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "5e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00216",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-21715"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21715"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453152",
                    "reference_id": "2453152",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453152"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7350",
                    "reference_id": "RHSA-2026:7350",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7350"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7670",
                    "reference_id": "RHSA-2026:7670",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7670"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7675",
                    "reference_id": "RHSA-2026:7675",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7675"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2026-21715"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1vp3-fzdr-yqbm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63923?format=api",
            "vulnerability_id": "VCID-2t7c-dju9-pff6",
            "summary": "Node.js: Node.js: Information disclosure via timing oracle in HMAC verification",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21713.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21713.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-21713",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0144",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03543",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05613",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05602",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05595",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05546",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0556",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05575",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05638",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05611",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07681",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-21713"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21713",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21713"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453160",
                    "reference_id": "2453160",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453160"
                },
                {
                    "reference_url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases",
                    "reference_id": "march-2026-security-releases",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-30T19:45:13Z/"
                        }
                    ],
                    "url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7350",
                    "reference_id": "RHSA-2026:7350",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7350"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7670",
                    "reference_id": "RHSA-2026:7670",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7670"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7675",
                    "reference_id": "RHSA-2026:7675",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7675"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2026-21713"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2t7c-dju9-pff6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63924?format=api",
            "vulnerability_id": "VCID-96yh-1wub-zucg",
            "summary": "Node.js: Node.js: Memory leak and Denial of Service via crafted HTTP/2 WINDOW_UPDATE frames",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21714.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21714.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-21714",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0161",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02382",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02672",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02664",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02682",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03718",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03389",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03392",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03414",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03372",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03344",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-21714"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21714",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21714"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453161",
                    "reference_id": "2453161",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453161"
                },
                {
                    "reference_url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases",
                    "reference_id": "march-2026-security-releases",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-31T16:14:45Z/"
                        }
                    ],
                    "url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7350",
                    "reference_id": "RHSA-2026:7350",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7350"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7670",
                    "reference_id": "RHSA-2026:7670",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7670"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7675",
                    "reference_id": "RHSA-2026:7675",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7675"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2026-21714"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-96yh-1wub-zucg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64947?format=api",
            "vulnerability_id": "VCID-bjza-25hu-vkad",
            "summary": "nodejs: Nodejs denial of service",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21637.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21637.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-21637",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1369",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13551",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1357",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13484",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1348",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13752",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13552",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13633",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13684",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13654",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13618",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-21637"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21637",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21637"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431340",
                    "reference_id": "2431340",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431340"
                },
                {
                    "reference_url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases",
                    "reference_id": "december-2025-security-releases",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-21T20:22:28Z/"
                        }
                    ],
                    "url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:1842",
                    "reference_id": "RHSA-2026:1842",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:1842"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:1843",
                    "reference_id": "RHSA-2026:1843",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:1843"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:2420",
                    "reference_id": "RHSA-2026:2420",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:2420"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:2421",
                    "reference_id": "RHSA-2026:2421",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:2421"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:2422",
                    "reference_id": "RHSA-2026:2422",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:2422"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:2767",
                    "reference_id": "RHSA-2026:2767",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:2767"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:2768",
                    "reference_id": "RHSA-2026:2768",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:2768"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:2781",
                    "reference_id": "RHSA-2026:2781",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:2781"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:2782",
                    "reference_id": "RHSA-2026:2782",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:2782"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:2783",
                    "reference_id": "RHSA-2026:2783",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:2783"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:2864",
                    "reference_id": "RHSA-2026:2864",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:2864"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:2899",
                    "reference_id": "RHSA-2026:2899",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:2899"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:6402",
                    "reference_id": "RHSA-2026:6402",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:6402"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:6431",
                    "reference_id": "RHSA-2026:6431",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:6431"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7350",
                    "reference_id": "RHSA-2026:7350",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7350"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7386",
                    "reference_id": "RHSA-2026:7386",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7386"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7387",
                    "reference_id": "RHSA-2026:7387",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7387"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7670",
                    "reference_id": "RHSA-2026:7670",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7670"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7675",
                    "reference_id": "RHSA-2026:7675",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7675"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2026-21637"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bjza-25hu-vkad"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63925?format=api",
            "vulnerability_id": "VCID-dgkh-jdah-wfh9",
            "summary": "nodejs: v8: Node.js: Denial of Service via V8 string hashing mechanism due to predictable hash collisions",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21717.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21717.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-21717",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04143",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05391",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07429",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07425",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07414",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07343",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07331",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07373",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07452",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07439",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10176",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-21717"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21717",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21717"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453162",
                    "reference_id": "2453162",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453162"
                },
                {
                    "reference_url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases",
                    "reference_id": "march-2026-security-releases",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-30T19:46:02Z/"
                        }
                    ],
                    "url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:6402",
                    "reference_id": "RHSA-2026:6402",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:6402"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:6431",
                    "reference_id": "RHSA-2026:6431",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:6431"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7350",
                    "reference_id": "RHSA-2026:7350",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7350"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7386",
                    "reference_id": "RHSA-2026:7386",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7386"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7387",
                    "reference_id": "RHSA-2026:7387",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7387"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7670",
                    "reference_id": "RHSA-2026:7670",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7670"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7675",
                    "reference_id": "RHSA-2026:7675",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7675"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2026-21717"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dgkh-jdah-wfh9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63919?format=api",
            "vulnerability_id": "VCID-dt7u-3usg-9uet",
            "summary": "Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21710.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21710.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-21710",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0252",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03788",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05801",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05797",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0579",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05755",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05763",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05762",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05826",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05805",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00028",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08124",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-21710"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21710",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21710"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453151",
                    "reference_id": "2453151",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453151"
                },
                {
                    "reference_url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases",
                    "reference_id": "march-2026-security-releases",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-31T13:55:20Z/"
                        }
                    ],
                    "url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7080",
                    "reference_id": "RHSA-2026:7080",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7080"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7123",
                    "reference_id": "RHSA-2026:7123",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7123"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7302",
                    "reference_id": "RHSA-2026:7302",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7302"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7310",
                    "reference_id": "RHSA-2026:7310",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7310"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7350",
                    "reference_id": "RHSA-2026:7350",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7350"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7670",
                    "reference_id": "RHSA-2026:7670",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7670"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7675",
                    "reference_id": "RHSA-2026:7675",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7675"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7896",
                    "reference_id": "RHSA-2026:7896",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7896"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7983",
                    "reference_id": "RHSA-2026:7983",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7983"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8339",
                    "reference_id": "RHSA-2026:8339",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8339"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2026-21710"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dt7u-3usg-9uet"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63932?format=api",
            "vulnerability_id": "VCID-fetp-hvhq-dube",
            "summary": "Node.js: Node.js: Denial of Service via malformed Internationalized Domain Name processing",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21712.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21712.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-21712",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01719",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02676",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02893",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02807",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02788",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02784",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02769",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02781",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02814",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02817",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02838",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-21712"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453037",
                    "reference_id": "2453037",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453037"
                },
                {
                    "reference_url": "https://hackerone.com/reports/3546390",
                    "reference_id": "3546390",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-30T15:52:17Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/3546390"
                },
                {
                    "reference_url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases",
                    "reference_id": "march-2026-security-releases",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-30T15:52:17Z/"
                        }
                    ],
                    "url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7350",
                    "reference_id": "RHSA-2026:7350",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7350"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7670",
                    "reference_id": "RHSA-2026:7670",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7670"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7675",
                    "reference_id": "RHSA-2026:7675",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7675"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2026-21712"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fetp-hvhq-dube"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64165?format=api",
            "vulnerability_id": "VCID-gv39-q6pw-yfh4",
            "summary": "nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27135.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27135.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-27135",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04001",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04032",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04057",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0403",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04016",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03988",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03971",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03983",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04018",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04038",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06714",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-27135"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27135",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27135"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1131369",
                    "reference_id": "1131369",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1131369"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448754",
                    "reference_id": "2448754",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448754"
                },
                {
                    "reference_url": "https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1",
                    "reference_id": "5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-18T18:36:41Z/"
                        }
                    ],
                    "url": "https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1"
                },
                {
                    "reference_url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6",
                    "reference_id": "GHSA-6933-cjhr-5qg6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-18T18:36:41Z/"
                        }
                    ],
                    "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:6190",
                    "reference_id": "RHSA-2026:6190",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:6190"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7080",
                    "reference_id": "RHSA-2026:7080",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7080"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7123",
                    "reference_id": "RHSA-2026:7123",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7123"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7302",
                    "reference_id": "RHSA-2026:7302",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7302"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7310",
                    "reference_id": "RHSA-2026:7310",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7310"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7350",
                    "reference_id": "RHSA-2026:7350",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7350"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7666",
                    "reference_id": "RHSA-2026:7666",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7666"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7667",
                    "reference_id": "RHSA-2026:7667",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7667"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7668",
                    "reference_id": "RHSA-2026:7668",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7668"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7670",
                    "reference_id": "RHSA-2026:7670",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7670"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7675",
                    "reference_id": "RHSA-2026:7675",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7675"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7896",
                    "reference_id": "RHSA-2026:7896",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7896"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7983",
                    "reference_id": "RHSA-2026:7983",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7983"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8339",
                    "reference_id": "RHSA-2026:8339",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8339"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8538",
                    "reference_id": "RHSA-2026:8538",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8538"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8539",
                    "reference_id": "RHSA-2026:8539",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8539"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8540",
                    "reference_id": "RHSA-2026:8540",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8540"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8541",
                    "reference_id": "RHSA-2026:8541",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8541"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8545",
                    "reference_id": "RHSA-2026:8545",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8545"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8546",
                    "reference_id": "RHSA-2026:8546",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8546"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8547",
                    "reference_id": "RHSA-2026:8547",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8547"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8548",
                    "reference_id": "RHSA-2026:8548",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8548"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8868",
                    "reference_id": "RHSA-2026:8868",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8868"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2026-27135"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gv39-q6pw-yfh4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/24973?format=api",
            "vulnerability_id": "VCID-hgd1-7u6j-p7dh",
            "summary": "Undici has Unhandled Exception in WebSocket Client Due to Invalid server_max_window_bits Validation\n### Impact\n\nThe undici WebSocket client is vulnerable to a denial-of-service attack due to improper validation of the `server_max_window_bits` parameter in the permessage-deflate extension. When a WebSocket client connects to a server, it automatically advertises support for permessage-deflate compression. A malicious server can respond with an out-of-range `server_max_window_bits` value (outside zlib's valid range of 8-15). When the server subsequently sends a compressed frame, the client attempts to create a zlib InflateRaw instance with the invalid windowBits value, causing a synchronous RangeError exception that is not caught, resulting in immediate process termination.\n\nThe vulnerability exists because:\n\n1. The `isValidClientWindowBits()` function only validates that the value contains ASCII digits, not that it falls within the valid range 8-15\n2. The `createInflateRaw()` call is not wrapped in a try-catch block\n3. The resulting exception propagates up through the call stack and crashes the Node.js process\n\n### Patches\n_Has the problem been patched? What versions should users upgrade to?_\n\n### Workarounds\n_Is there a way for users to fix or remediate the vulnerability without upgrading?_",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2229.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2229.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-2229",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40468",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40478",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40467",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40417",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40494",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40462",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40499",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42437",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42462",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42413",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42366",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-2229"
                },
                {
                    "reference_url": "https://cna.openjsf.org/security-advisories.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-13T13:06:30Z/"
                        }
                    ],
                    "url": "https://cna.openjsf.org/security-advisories.html"
                },
                {
                    "reference_url": "https://datatracker.ietf.org/doc/html/rfc7692",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-13T13:06:30Z/"
                        }
                    ],
                    "url": "https://datatracker.ietf.org/doc/html/rfc7692"
                },
                {
                    "reference_url": "https://github.com/nodejs/undici",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/nodejs/undici"
                },
                {
                    "reference_url": "https://github.com/nodejs/undici/security/advisories/GHSA-v9p9-hfj2-hcw8",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-13T13:06:30Z/"
                        }
                    ],
                    "url": "https://github.com/nodejs/undici/security/advisories/GHSA-v9p9-hfj2-hcw8"
                },
                {
                    "reference_url": "https://hackerone.com/reports/3487486",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-13T13:06:30Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/3487486"
                },
                {
                    "reference_url": "https://nodejs.org/api/zlib.html#class-zlibinflateraw",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-13T13:06:30Z/"
                        }
                    ],
                    "url": "https://nodejs.org/api/zlib.html#class-zlibinflateraw"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2229",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2229"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130884",
                    "reference_id": "1130884",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130884"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447143",
                    "reference_id": "2447143",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447143"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-v9p9-hfj2-hcw8",
                    "reference_id": "GHSA-v9p9-hfj2-hcw8",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-v9p9-hfj2-hcw8"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:5807",
                    "reference_id": "RHSA-2026:5807",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:5807"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7080",
                    "reference_id": "RHSA-2026:7080",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7080"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7123",
                    "reference_id": "RHSA-2026:7123",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7123"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7302",
                    "reference_id": "RHSA-2026:7302",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7302"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7310",
                    "reference_id": "RHSA-2026:7310",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7310"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7350",
                    "reference_id": "RHSA-2026:7350",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7350"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7670",
                    "reference_id": "RHSA-2026:7670",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7670"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7675",
                    "reference_id": "RHSA-2026:7675",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7675"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7983",
                    "reference_id": "RHSA-2026:7983",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7983"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2026-2229",
                "GHSA-v9p9-hfj2-hcw8"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hgd1-7u6j-p7dh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/20888?format=api",
            "vulnerability_id": "VCID-hzsn-68be-dkej",
            "summary": "minimatch has a ReDoS via repeated wildcards with non-matching literal in pattern\n### Summary\n`minimatch` is vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive `*` wildcards followed by a literal character that doesn't appear in the test string. Each `*` compiles to a separate `[^/]*?` regex group, and when the match fails, V8's regex engine backtracks exponentially across all possible splits.\n\nThe time complexity is O(4^N) where N is the number of `*` characters. With N=15, a single `minimatch()` call takes ~2 seconds. With N=34, it hangs effectively forever.\n\n\n### Details\n_Give all details on the vulnerability. Pointing to the incriminated source code is very helpful for the maintainer._\n\n### PoC\nWhen minimatch compiles a glob pattern, each `*` becomes `[^/]*?` in the generated regex. For a pattern like `***************X***`:\n\n```\n/^(?!\\.)[^/]*?[^/]*?[^/]*?[^/]*?[^/]*?[^/]*?[^/]*?[^/]*?[^/]*?[^/]*?[^/]*?[^/]*?[^/]*?[^/]*?[^/]*?X[^/]*?[^/]*?[^/]*?$/\n```\n\nWhen the test string doesn't contain `X`, the regex engine must try every possible way to distribute the characters across all the `[^/]*?` groups before concluding no match exists. With N groups and M characters, this is O(C(N+M, N)) — exponential.\n### Impact\nAny application that passes user-controlled strings to `minimatch()` as the pattern argument is vulnerable to DoS. This includes:\n- File search/filter UIs that accept glob patterns\n- `.gitignore`-style filtering with user-defined rules\n- Build tools that accept glob configuration\n- Any API that exposes glob matching to untrusted input\n\n----\n\nThanks to @ljharb for back-porting the fix to legacy versions of minimatch.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-26996.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-26996.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-26996",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04658",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06851",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06717",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06701",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0675",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06784",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06785",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06778",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06771",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06702",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06694",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-26996"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26996",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26996"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/isaacs/minimatch",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/isaacs/minimatch"
                },
                {
                    "reference_url": "https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-20T15:31:36Z/"
                        }
                    ],
                    "url": "https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5"
                },
                {
                    "reference_url": "https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-20T15:31:36Z/"
                        }
                    ],
                    "url": "https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26996",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26996"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1128579",
                    "reference_id": "1128579",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1128579"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2441268",
                    "reference_id": "2441268",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2441268"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-3ppc-4f35-3m26",
                    "reference_id": "GHSA-3ppc-4f35-3m26",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-3ppc-4f35-3m26"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:4942",
                    "reference_id": "RHSA-2026:4942",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:4942"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:5168",
                    "reference_id": "RHSA-2026:5168",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:5168"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:5665",
                    "reference_id": "RHSA-2026:5665",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:5665"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:6192",
                    "reference_id": "RHSA-2026:6192",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:6192"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:6497",
                    "reference_id": "RHSA-2026:6497",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:6497"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:6567",
                    "reference_id": "RHSA-2026:6567",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:6567"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:6568",
                    "reference_id": "RHSA-2026:6568",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:6568"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7080",
                    "reference_id": "RHSA-2026:7080",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7080"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7123",
                    "reference_id": "RHSA-2026:7123",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7123"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7302",
                    "reference_id": "RHSA-2026:7302",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7302"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7310",
                    "reference_id": "RHSA-2026:7310",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7310"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7350",
                    "reference_id": "RHSA-2026:7350",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7350"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7670",
                    "reference_id": "RHSA-2026:7670",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7670"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7675",
                    "reference_id": "RHSA-2026:7675",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7675"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7896",
                    "reference_id": "RHSA-2026:7896",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7896"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7983",
                    "reference_id": "RHSA-2026:7983",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7983"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8339",
                    "reference_id": "RHSA-2026:8339",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8339"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2026-26996",
                "GHSA-3ppc-4f35-3m26"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hzsn-68be-dkej"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/24956?format=api",
            "vulnerability_id": "VCID-n6ew-t7g1-33gn",
            "summary": "Undici has an HTTP Request/Response Smuggling issue\n### Impact\n\nUndici allows duplicate HTTP `Content-Length` headers when they are provided in an array with case-variant names (e.g., `Content-Length` and `content-length`). This produces malformed HTTP/1.1 requests with multiple conflicting `Content-Length` values on the wire.\n\n**Who is impacted:**\n  - Applications using `undici.request()`, `undici.Client`, or similar low-level APIs with headers passed as flat arrays\n  - Applications that accept user-controlled header names without case-normalization\n\n**Potential consequences:**\n  - **Denial of Service**: Strict HTTP parsers (proxies, servers) will reject requests with duplicate `Content-Length` headers (400 Bad Request)\n  - **HTTP Request Smuggling**: In deployments where an intermediary and backend interpret duplicate headers inconsistently (e.g., one uses the first value, the other uses the last), this can enable request smuggling attacks leading to ACL bypass, cache poisoning, or credential hijacking\n\n### Patches\n\n Patched in the undici version v7.24.0 and v6.24.0. Users should upgrade to this version or later.\n\n### Workarounds\n\n  If upgrading is not immediately possible:\n\n  1. **Validate header names**: Ensure no duplicate `Content-Length` headers (case-insensitive) are present before passing headers to undici\n  2. **Use object format**: Pass headers as a plain object (`{ 'content-length': '123' }`) rather than an array, which naturally deduplicates by key\n  3. **Sanitize user input**: If headers originate from user input, normalize header names to lowercase and reject duplicates",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1525.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1525.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-1525",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03756",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03735",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03754",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03742",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03795",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03771",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03768",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04422",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04569",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04431",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04453",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-1525"
                },
                {
                    "reference_url": "https://cna.openjsf.org/security-advisories.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-12T20:44:24Z/"
                        }
                    ],
                    "url": "https://cna.openjsf.org/security-advisories.html"
                },
                {
                    "reference_url": "https://cwe.mitre.org/data/definitions/444.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-12T20:44:24Z/"
                        }
                    ],
                    "url": "https://cwe.mitre.org/data/definitions/444.html"
                },
                {
                    "reference_url": "https://github.com/nodejs/undici",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/nodejs/undici"
                },
                {
                    "reference_url": "https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-12T20:44:24Z/"
                        }
                    ],
                    "url": "https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm"
                },
                {
                    "reference_url": "https://hackerone.com/reports/3556037",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-12T20:44:24Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/3556037"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1525",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1525"
                },
                {
                    "reference_url": "https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-12T20:44:24Z/"
                        }
                    ],
                    "url": "https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130879",
                    "reference_id": "1130879",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130879"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447144",
                    "reference_id": "2447144",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447144"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-2mjp-6q6p-2qxm",
                    "reference_id": "GHSA-2mjp-6q6p-2qxm",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-2mjp-6q6p-2qxm"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7080",
                    "reference_id": "RHSA-2026:7080",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7080"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7123",
                    "reference_id": "RHSA-2026:7123",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7123"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7302",
                    "reference_id": "RHSA-2026:7302",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7302"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7310",
                    "reference_id": "RHSA-2026:7310",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7310"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7350",
                    "reference_id": "RHSA-2026:7350",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7350"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7670",
                    "reference_id": "RHSA-2026:7670",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7670"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7675",
                    "reference_id": "RHSA-2026:7675",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7675"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7983",
                    "reference_id": "RHSA-2026:7983",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7983"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2026-1525",
                "GHSA-2mjp-6q6p-2qxm"
            ],
            "risk_score": 3.3,
            "exploitability": "0.5",
            "weighted_severity": "6.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n6ew-t7g1-33gn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/24667?format=api",
            "vulnerability_id": "VCID-ph2p-u33d-8yh3",
            "summary": "Undici has CRLF Injection in undici via `upgrade` option\n### Impact\n\nWhen an application passes user-controlled input to the `upgrade` option of `client.request()`, an attacker can inject CRLF sequences (`\\r\\n`) to:\n\n1. Inject arbitrary HTTP headers\n2. Terminate the HTTP request prematurely and smuggle raw data to non-HTTP services (Redis, Memcached, Elasticsearch)\n\nThe vulnerability exists because undici writes the `upgrade` value directly to the socket without validating for invalid header characters:\n\n```javascript\n// lib/dispatcher/client-h1.js:1121\nif (upgrade) {\n  header += `connection: upgrade\\r\\nupgrade: ${upgrade}\\r\\n`\n}\n```\n\n### Patches\n\n Patched in the undici version v7.24.0 and v6.24.0. Users should upgrade to this version or later.\n\n### Workarounds\n\nSanitize the `upgrade` option string before passing to undici:\n\n```javascript\nfunction sanitizeUpgrade(value) {\n  if (/[\\r\\n]/.test(value)) {\n    throw new Error('Invalid upgrade value')\n  }\n  return value\n}\n\nclient.request({\n  upgrade: sanitizeUpgrade(userInput)\n})\n```",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1527.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1527.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-1527",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01235",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01314",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01241",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01228",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00946",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00934",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00938",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00954",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0095",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-1527"
                },
                {
                    "reference_url": "https://cna.openjsf.org/security-advisories.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-13T18:05:24Z/"
                        }
                    ],
                    "url": "https://cna.openjsf.org/security-advisories.html"
                },
                {
                    "reference_url": "https://github.com/nodejs/undici",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/nodejs/undici"
                },
                {
                    "reference_url": "https://github.com/nodejs/undici/security/advisories/GHSA-4992-7rv2-5pvq",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-13T18:05:24Z/"
                        }
                    ],
                    "url": "https://github.com/nodejs/undici/security/advisories/GHSA-4992-7rv2-5pvq"
                },
                {
                    "reference_url": "https://hackerone.com/reports/3487198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-13T18:05:24Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/3487198"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1527",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1527"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130882",
                    "reference_id": "1130882",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130882"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447141",
                    "reference_id": "2447141",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447141"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-4992-7rv2-5pvq",
                    "reference_id": "GHSA-4992-7rv2-5pvq",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-4992-7rv2-5pvq"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7350",
                    "reference_id": "RHSA-2026:7350",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7350"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7670",
                    "reference_id": "RHSA-2026:7670",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7670"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7675",
                    "reference_id": "RHSA-2026:7675",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7675"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2026-1527",
                "GHSA-4992-7rv2-5pvq"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ph2p-u33d-8yh3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/21616?format=api",
            "vulnerability_id": "VCID-q4u6-6pbw-5bcq",
            "summary": "@isaacs/brace-expansion has Uncontrolled Resource Consumption\n### Summary\n\n`@isaacs/brace-expansion` is vulnerable to a Denial of Service (DoS) issue caused by unbounded brace range expansion. When an attacker provides a pattern containing repeated numeric brace ranges, the library attempts to eagerly generate every possible combination synchronously. Because the expansion grows exponentially, even a small input can consume excessive CPU and memory and may crash the Node.js process.\n\n### Details\n\nThe vulnerability occurs because `@isaacs/brace-expansion` expands brace expressions without any upper bound or complexity limit. Expansion is performed eagerly and synchronously, meaning the full result set is generated before returning control to the caller.\n\nFor example, the following input:\n\n```\n{0..99}{0..99}{0..99}{0..99}{0..99}\n```\n\nproduces:\n\n```\n100^5 = 10,000,000,000 combinations\n```\n\nThis exponential growth can quickly overwhelm the event loop and heap memory, resulting in process termination.\n\n### Proof of Concept\n\nThe following script reliably triggers the issue.\n\nCreate `poc.js`:\n\n```js\nconst { expand } = require('@isaacs/brace-expansion');\n\nconst pattern = '{0..99}{0..99}{0..99}{0..99}{0..99}';\n\nconsole.log('Starting expansion...');\nexpand(pattern);\n```\n\nRun it:\n\n```bash\nnode poc.js\n```\n\nThe process will freeze and typically crash with an error such as:\n\n```\nFATAL ERROR: JavaScript heap out of memory\n```\n\n### Impact\n\nThis is a denial of service vulnerability. Any application or downstream dependency that uses `@isaacs/brace-expansion` on untrusted input may be vulnerable to a single-request crash.\n\nAn attacker does not require authentication and can use a very small payload to:\n\n* Trigger exponential computation\n* Exhaust memory and CPU resources\n* Block the event loop\n* Crash Node.js services relying on this library",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-25547.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-25547.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-25547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05161",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05088",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05144",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05118",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05139",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05173",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0519",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05532",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05412",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05369",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05366",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-25547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25547"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/isaacs/brace-expansion",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/isaacs/brace-expansion"
                },
                {
                    "reference_url": "https://github.com/isaacs/brace-expansion/security/advisories/GHSA-7h2j-956f-4vf2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "9.2",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-05T14:24:50Z/"
                        }
                    ],
                    "url": "https://github.com/isaacs/brace-expansion/security/advisories/GHSA-7h2j-956f-4vf2"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25547"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127313",
                    "reference_id": "1127313",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127313"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2436942",
                    "reference_id": "2436942",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2436942"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-7h2j-956f-4vf2",
                    "reference_id": "GHSA-7h2j-956f-4vf2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-7h2j-956f-4vf2"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7080",
                    "reference_id": "RHSA-2026:7080",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7080"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7123",
                    "reference_id": "RHSA-2026:7123",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7123"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7302",
                    "reference_id": "RHSA-2026:7302",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7302"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7310",
                    "reference_id": "RHSA-2026:7310",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7310"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7350",
                    "reference_id": "RHSA-2026:7350",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7350"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7675",
                    "reference_id": "RHSA-2026:7675",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7675"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7983",
                    "reference_id": "RHSA-2026:7983",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7983"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2026-25547",
                "GHSA-7h2j-956f-4vf2"
            ],
            "risk_score": 4.2,
            "exploitability": "0.5",
            "weighted_severity": "8.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q4u6-6pbw-5bcq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/23250?format=api",
            "vulnerability_id": "VCID-sy2z-sqgk-d7hg",
            "summary": "Undici has Unbounded Memory Consumption in WebSocket permessage-deflate Decompression\n## Description\n\nThe undici WebSocket client is vulnerable to a denial-of-service attack via unbounded memory consumption during permessage-deflate decompression. When a WebSocket connection negotiates the permessage-deflate extension, the client decompresses incoming compressed frames without enforcing any limit on the decompressed data size. A malicious WebSocket server can send a small compressed frame (a \"decompression bomb\") that expands to an extremely large size in memory, causing the Node.js process to exhaust available memory and crash or become unresponsive.\n\nThe vulnerability exists in the `PerMessageDeflate.decompress()` method, which accumulates all decompressed chunks in memory and concatenates them into a single Buffer without checking whether the total size exceeds a safe threshold.\n\n## Impact\n\n- Remote denial of service against any Node.js application using undici's WebSocket client\n- A single compressed WebSocket frame of ~6 MB can decompress to ~1 GB or more\n- Memory exhaustion occurs in native/external memory, bypassing V8 heap limits\n- No application-level mitigation is possible as decompression occurs before message delivery\n\n### Patches\n\nUsers should upgrade to fixed versions.\n\n### Workarounds\n\nNo workaround are possible.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1526.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1526.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-1526",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04784",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0488",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04862",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04824",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04808",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04834",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04857",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05345",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05343",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05394",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05508",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-1526"
                },
                {
                    "reference_url": "https://cna.openjsf.org/security-advisories.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-13T18:04:06Z/"
                        }
                    ],
                    "url": "https://cna.openjsf.org/security-advisories.html"
                },
                {
                    "reference_url": "https://datatracker.ietf.org/doc/html/rfc7692",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-13T18:04:06Z/"
                        }
                    ],
                    "url": "https://datatracker.ietf.org/doc/html/rfc7692"
                },
                {
                    "reference_url": "https://github.com/nodejs/undici",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/nodejs/undici"
                },
                {
                    "reference_url": "https://github.com/nodejs/undici/security/advisories/GHSA-vrm6-8vpv-qv8q",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-13T18:04:06Z/"
                        }
                    ],
                    "url": "https://github.com/nodejs/undici/security/advisories/GHSA-vrm6-8vpv-qv8q"
                },
                {
                    "reference_url": "https://hackerone.com/reports/3481206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-13T18:04:06Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/3481206"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1526",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1526"
                },
                {
                    "reference_url": "https://owasp.org/www-community/attacks/Denial_of_Service",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://owasp.org/www-community/attacks/Denial_of_Service"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130880",
                    "reference_id": "1130880",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130880"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447142",
                    "reference_id": "2447142",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447142"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-vrm6-8vpv-qv8q",
                    "reference_id": "GHSA-vrm6-8vpv-qv8q",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-vrm6-8vpv-qv8q"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:5807",
                    "reference_id": "RHSA-2026:5807",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:5807"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7080",
                    "reference_id": "RHSA-2026:7080",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7080"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7123",
                    "reference_id": "RHSA-2026:7123",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7123"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7302",
                    "reference_id": "RHSA-2026:7302",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7302"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7310",
                    "reference_id": "RHSA-2026:7310",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7310"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7350",
                    "reference_id": "RHSA-2026:7350",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7350"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7670",
                    "reference_id": "RHSA-2026:7670",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7670"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7675",
                    "reference_id": "RHSA-2026:7675",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7675"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7983",
                    "reference_id": "RHSA-2026:7983",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7983"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2026-1526",
                "GHSA-vrm6-8vpv-qv8q"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sy2z-sqgk-d7hg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63921?format=api",
            "vulnerability_id": "VCID-twc8-ewm7-wkb1",
            "summary": "nodejs: Node.js: Permission bypass allows unauthorized modification of file permissions and ownership via incomplete security fix.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21716.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21716.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-21716",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00177",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "4e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00201",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "4e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00196",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "4e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00198",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "4e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00199",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "4e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00169",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-21716"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21716",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21716"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453157",
                    "reference_id": "2453157",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453157"
                },
                {
                    "reference_url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases",
                    "reference_id": "march-2026-security-releases",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-31T14:27:06Z/"
                        }
                    ],
                    "url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:6402",
                    "reference_id": "RHSA-2026:6402",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:6402"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:6431",
                    "reference_id": "RHSA-2026:6431",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:6431"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7350",
                    "reference_id": "RHSA-2026:7350",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7350"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7386",
                    "reference_id": "RHSA-2026:7386",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7386"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7387",
                    "reference_id": "RHSA-2026:7387",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7387"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7670",
                    "reference_id": "RHSA-2026:7670",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7670"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7675",
                    "reference_id": "RHSA-2026:7675",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7675"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2026-21716"
            ],
            "risk_score": 1.7,
            "exploitability": "0.5",
            "weighted_severity": "3.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-twc8-ewm7-wkb1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/22518?format=api",
            "vulnerability_id": "VCID-vdca-exd1-rfce",
            "summary": "Undici has Unbounded Memory Consumption in its DeduplicationHandler via Response Buffering that leads to DoS\n## Impact\nThis is an uncontrolled resource consumption vulnerability (CWE-400) that can lead to Denial of Service (DoS).\n\nIn vulnerable Undici versions, when `interceptors.deduplicate()` is enabled, response data for deduplicated requests could be accumulated in memory for downstream handlers. An attacker-controlled or untrusted upstream endpoint can exploit this with large/chunked responses and concurrent identical requests, causing high memory usage and potential OOM process termination.\n\nImpacted users are applications that use Undici’s deduplication interceptor against endpoints that may produce large or long-lived response bodies.\n\n## Patches\n\nThe issue has been patched by changing deduplication behavior to stream response chunks to downstream handlers as they arrive (instead of full-body accumulation), and by preventing late deduplication when body streaming has already started.\n\nUsers should upgrade to the first official Undici (and Node.js, where applicable) releases that include this patch.\n\n## Workarounds\nIf upgrading immediately is not possible:\n\n- Disable `interceptors.deduplicate()` for affected clients/routes.\n- Use `skipHeaderNames` with a marker header to force high-risk requests to bypass deduplication.\n- Avoid concurrent identical requests to untrusted endpoints that may return very large/chunked bodies.\n- Apply upstream/proxy response-size and timeout limits.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2581.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2581.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-2581",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04353",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04366",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04373",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04357",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04325",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04314",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04293",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05137",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05043",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04985",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0499",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-2581"
                },
                {
                    "reference_url": "https://cna.openjsf.org/security-advisories.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-13T18:04:49Z/"
                        }
                    ],
                    "url": "https://cna.openjsf.org/security-advisories.html"
                },
                {
                    "reference_url": "https://github.com/nodejs/undici",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/nodejs/undici"
                },
                {
                    "reference_url": "https://github.com/nodejs/undici/security/advisories/GHSA-phc3-fgpg-7m6h",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-13T18:04:49Z/"
                        }
                    ],
                    "url": "https://github.com/nodejs/undici/security/advisories/GHSA-phc3-fgpg-7m6h"
                },
                {
                    "reference_url": "https://hackerone.com/reports/3513473",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-13T18:04:49Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/3513473"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2581",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2581"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130885",
                    "reference_id": "1130885",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130885"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447140",
                    "reference_id": "2447140",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447140"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-phc3-fgpg-7m6h",
                    "reference_id": "GHSA-phc3-fgpg-7m6h",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-phc3-fgpg-7m6h"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7350",
                    "reference_id": "RHSA-2026:7350",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7350"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7670",
                    "reference_id": "RHSA-2026:7670",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7670"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7675",
                    "reference_id": "RHSA-2026:7675",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7675"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2026-2581",
                "GHSA-phc3-fgpg-7m6h"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vdca-exd1-rfce"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63922?format=api",
            "vulnerability_id": "VCID-xert-byqc-xbe2",
            "summary": "Node.js: Node.js: Unauthorized inter-process communication due to missing Unix Domain Socket permission checks",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21711.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21711.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-21711",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00124",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "3e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00125",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "4e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00146",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "4e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00149",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "4e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00148",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "4e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00147",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "5e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00245",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-21711"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453158",
                    "reference_id": "2453158",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453158"
                },
                {
                    "reference_url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases",
                    "reference_id": "march-2026-security-releases",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-01T15:02:57Z/"
                        }
                    ],
                    "url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7350",
                    "reference_id": "RHSA-2026:7350",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7350"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7670",
                    "reference_id": "RHSA-2026:7670",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7670"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7675",
                    "reference_id": "RHSA-2026:7675",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7675"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2026-21711"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xert-byqc-xbe2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/24694?format=api",
            "vulnerability_id": "VCID-z7ac-jr58-gkfm",
            "summary": "Undici: Malicious WebSocket 64-bit length overflows parser and crashes the client\n### Impact\nA server can reply with a WebSocket frame using the 64-bit length form and an extremely large length. undici's ByteParser overflows internal math, ends up in an invalid state, and throws a fatal TypeError that terminates the process. \n\n### Patches\n\n\n Patched in the undici version v7.24.0 and v6.24.0. Users should upgrade to this version or later.\n\n### Workarounds\n\nThere are no workarounds.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1528.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1528.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-1528",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32234",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32272",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32271",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32243",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32194",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3237",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32332",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34118",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34129",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34167",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34153",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-1528"
                },
                {
                    "reference_url": "https://cna.openjsf.org/security-advisories.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-13T13:03:59Z/"
                        }
                    ],
                    "url": "https://cna.openjsf.org/security-advisories.html"
                },
                {
                    "reference_url": "https://github.com/nodejs/undici",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/nodejs/undici"
                },
                {
                    "reference_url": "https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-13T13:03:59Z/"
                        }
                    ],
                    "url": "https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj"
                },
                {
                    "reference_url": "https://hackerone.com/reports/3537648",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-13T13:03:59Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/3537648"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1528",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1528"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130883",
                    "reference_id": "1130883",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130883"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447145",
                    "reference_id": "2447145",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447145"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-f269-vfmq-vjvj",
                    "reference_id": "GHSA-f269-vfmq-vjvj",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-f269-vfmq-vjvj"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:5807",
                    "reference_id": "RHSA-2026:5807",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:5807"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7080",
                    "reference_id": "RHSA-2026:7080",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7080"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7123",
                    "reference_id": "RHSA-2026:7123",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7123"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7302",
                    "reference_id": "RHSA-2026:7302",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7302"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7310",
                    "reference_id": "RHSA-2026:7310",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7310"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7350",
                    "reference_id": "RHSA-2026:7350",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7350"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7670",
                    "reference_id": "RHSA-2026:7670",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7670"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7675",
                    "reference_id": "RHSA-2026:7675",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7675"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7983",
                    "reference_id": "RHSA-2026:7983",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7983"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2026-1528",
                "GHSA-f269-vfmq-vjvj"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z7ac-jr58-gkfm"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "4.2",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/nodejs24@1:24.14.1-2%3Farch=el10_1"
}