Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/dotnet9-runtime@9.0.10-r0?arch=armv7&distroversion=edge&reponame=community
Typeapk
Namespacealpine
Namedotnet9-runtime
Version9.0.10-r0
Qualifiers
arch armv7
distroversion edge
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version9.0.13-r0
Latest_non_vulnerable_version9.0.15-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-cju3-5hjk-h3d3
vulnerability_id VCID-cju3-5hjk-h3d3
summary
Microsoft Security Advisory CVE-2025-55315: .NET Security Feature Bypass Vulnerability
Microsoft is releasing this security advisory to provide information about a vulnerability in ASP.NET Core 10.0 , ASP.NET Core 9.0 , ASP.NET Core 8.0, and ASP.NET Core 2.3. This advisory also provides guidance on what developers can do to update their applications to address this vulnerability.

Inconsistent interpretation of http requests ('http request/response smuggling') in ASP.NET Core allows an authorized attacker to bypass a security feature over a network.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55315.json
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55315.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-55315
reference_id
reference_type
scores
0
value 0.00205
scoring_system epss
scoring_elements 0.42672
published_at 2026-04-04T12:55:00Z
1
value 0.00205
scoring_system epss
scoring_elements 0.42645
published_at 2026-04-02T12:55:00Z
2
value 0.01104
scoring_system epss
scoring_elements 0.78068
published_at 2026-04-08T12:55:00Z
3
value 0.01104
scoring_system epss
scoring_elements 0.78042
published_at 2026-04-07T12:55:00Z
4
value 0.01284
scoring_system epss
scoring_elements 0.79642
published_at 2026-04-21T12:55:00Z
5
value 0.01284
scoring_system epss
scoring_elements 0.79612
published_at 2026-04-09T12:55:00Z
6
value 0.01284
scoring_system epss
scoring_elements 0.79633
published_at 2026-04-11T12:55:00Z
7
value 0.01284
scoring_system epss
scoring_elements 0.79617
published_at 2026-04-12T12:55:00Z
8
value 0.01284
scoring_system epss
scoring_elements 0.79609
published_at 2026-04-13T12:55:00Z
9
value 0.01284
scoring_system epss
scoring_elements 0.7964
published_at 2026-04-16T12:55:00Z
10
value 0.01284
scoring_system epss
scoring_elements 0.79639
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-55315
2
reference_url https://github.com/dotnet/announcements/issues/371
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/announcements/issues/371
3
reference_url https://github.com/dotnet/aspnetcore
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/aspnetcore
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2403085
reference_id 2403085
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2403085
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/52492.py
reference_id CVE-2025-55315
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/52492.py
6
reference_url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55315
reference_id CVE-2025-55315
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L/E:U/RL:O/RC:C
1
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-10-28T12:57:54Z/
url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55315
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-55315
reference_id CVE-2025-55315
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-55315
8
reference_url https://github.com/advisories/GHSA-5rrx-jjjq-q2r5
reference_id GHSA-5rrx-jjjq-q2r5
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-5rrx-jjjq-q2r5
9
reference_url https://github.com/dotnet/aspnetcore/security/advisories/GHSA-5rrx-jjjq-q2r5
reference_id GHSA-5rrx-jjjq-q2r5
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L
1
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/aspnetcore/security/advisories/GHSA-5rrx-jjjq-q2r5
10
reference_url https://access.redhat.com/errata/RHSA-2025:18148
reference_id RHSA-2025:18148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18148
11
reference_url https://access.redhat.com/errata/RHSA-2025:18149
reference_id RHSA-2025:18149
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18149
12
reference_url https://access.redhat.com/errata/RHSA-2025:18150
reference_id RHSA-2025:18150
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18150
13
reference_url https://access.redhat.com/errata/RHSA-2025:18151
reference_id RHSA-2025:18151
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18151
14
reference_url https://access.redhat.com/errata/RHSA-2025:18152
reference_id RHSA-2025:18152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18152
15
reference_url https://access.redhat.com/errata/RHSA-2025:18153
reference_id RHSA-2025:18153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18153
16
reference_url https://access.redhat.com/errata/RHSA-2025:18256
reference_id RHSA-2025:18256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18256
17
reference_url https://access.redhat.com/errata/RHSA-2025:23225
reference_id RHSA-2025:23225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23225
18
reference_url https://usn.ubuntu.com/7822-1/
reference_id USN-7822-1
reference_type
scores
url https://usn.ubuntu.com/7822-1/
fixed_packages
0
url pkg:apk/alpine/dotnet9-runtime@9.0.10-r0?arch=armv7&distroversion=edge&reponame=community
purl pkg:apk/alpine/dotnet9-runtime@9.0.10-r0?arch=armv7&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/dotnet9-runtime@9.0.10-r0%3Farch=armv7&distroversion=edge&reponame=community
aliases CVE-2025-55315, GHSA-5rrx-jjjq-q2r5
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cju3-5hjk-h3d3
1
url VCID-hrdk-wnbt-cyes
vulnerability_id VCID-hrdk-wnbt-cyes
summary
Microsoft Security Advisory CVE-2025-55247 | .NET Denial of Service Vulnerability
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 8.0.xxx, .NET 9.0.xxx and .NET 10.0.xxx. This advisory also provides guidance on what developers can do to update their environments to remove this vulnerability.

A vulnerability exists in .NET where predictable paths for MSBuild's temporary directories on Linux let another user create the directories ahead of MSBuild, leading to DoS of builds. This only affects .NET on Linux operating systems.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55247.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55247.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-55247
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03033
published_at 2026-04-21T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.02915
published_at 2026-04-18T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.02906
published_at 2026-04-16T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.02968
published_at 2026-04-04T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03002
published_at 2026-04-09T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.02977
published_at 2026-04-08T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.02975
published_at 2026-04-07T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.02931
published_at 2026-04-13T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.02941
published_at 2026-04-12T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.02964
published_at 2026-04-11T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.02953
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-55247
2
reference_url https://github.com/dotnet/msbuild
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/msbuild
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2403086
reference_id 2403086
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2403086
4
reference_url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55247
reference_id CVE-2025-55247
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-15T13:49:15Z/
url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55247
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-55247
reference_id CVE-2025-55247
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-55247
6
reference_url https://github.com/advisories/GHSA-w3q9-fxm7-j8fq
reference_id GHSA-w3q9-fxm7-j8fq
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-w3q9-fxm7-j8fq
7
reference_url https://github.com/dotnet/msbuild/security/advisories/GHSA-w3q9-fxm7-j8fq
reference_id GHSA-w3q9-fxm7-j8fq
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/msbuild/security/advisories/GHSA-w3q9-fxm7-j8fq
8
reference_url https://access.redhat.com/errata/RHSA-2025:18148
reference_id RHSA-2025:18148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18148
9
reference_url https://access.redhat.com/errata/RHSA-2025:18149
reference_id RHSA-2025:18149
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18149
10
reference_url https://access.redhat.com/errata/RHSA-2025:18150
reference_id RHSA-2025:18150
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18150
11
reference_url https://access.redhat.com/errata/RHSA-2025:18151
reference_id RHSA-2025:18151
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18151
12
reference_url https://access.redhat.com/errata/RHSA-2025:18152
reference_id RHSA-2025:18152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18152
13
reference_url https://access.redhat.com/errata/RHSA-2025:18153
reference_id RHSA-2025:18153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18153
14
reference_url https://access.redhat.com/errata/RHSA-2025:18256
reference_id RHSA-2025:18256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18256
15
reference_url https://access.redhat.com/errata/RHSA-2025:23225
reference_id RHSA-2025:23225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23225
16
reference_url https://usn.ubuntu.com/7822-1/
reference_id USN-7822-1
reference_type
scores
url https://usn.ubuntu.com/7822-1/
fixed_packages
0
url pkg:apk/alpine/dotnet9-runtime@9.0.10-r0?arch=armv7&distroversion=edge&reponame=community
purl pkg:apk/alpine/dotnet9-runtime@9.0.10-r0?arch=armv7&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/dotnet9-runtime@9.0.10-r0%3Farch=armv7&distroversion=edge&reponame=community
aliases CVE-2025-55247, GHSA-w3q9-fxm7-j8fq
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hrdk-wnbt-cyes
2
url VCID-k3fx-jcj4-jfc6
vulnerability_id VCID-k3fx-jcj4-jfc6
summary
Microsoft Security Advisory CVE-2025-55248: .NET Information Disclosure Vulnerability
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 8.0 and .NET 9.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.

A MITM (man in the middle) attacker may prevent use of TLS between client and SMTP server, forcing client to send data over unencrypted connection.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55248.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55248.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-55248
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07356
published_at 2026-04-21T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.07223
published_at 2026-04-02T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.07268
published_at 2026-04-04T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07246
published_at 2026-04-07T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.07301
published_at 2026-04-08T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.07327
published_at 2026-04-09T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.07326
published_at 2026-04-11T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.07313
published_at 2026-04-12T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.07304
published_at 2026-04-13T12:55:00Z
9
value 0.00026
scoring_system epss
scoring_elements 0.07234
published_at 2026-04-16T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08003
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-55248
2
reference_url https://github.com/dotnet/announcements/issues/372
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/announcements/issues/372
3
reference_url https://github.com/dotnet/runtime
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/runtime
4
reference_url https://github.com/dotnet/runtime/issues/120713
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/runtime/issues/120713
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2403083
reference_id 2403083
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2403083
6
reference_url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55248
reference_id CVE-2025-55248
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
1
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-14T19:18:38Z/
url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55248
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-55248
reference_id CVE-2025-55248
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2025-55248
8
reference_url https://github.com/advisories/GHSA-gwq6-fmvp-qp68
reference_id GHSA-gwq6-fmvp-qp68
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-gwq6-fmvp-qp68
9
reference_url https://github.com/dotnet/runtime/security/advisories/GHSA-gwq6-fmvp-qp68
reference_id GHSA-gwq6-fmvp-qp68
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/runtime/security/advisories/GHSA-gwq6-fmvp-qp68
10
reference_url https://access.redhat.com/errata/RHSA-2025:18148
reference_id RHSA-2025:18148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18148
11
reference_url https://access.redhat.com/errata/RHSA-2025:18149
reference_id RHSA-2025:18149
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18149
12
reference_url https://access.redhat.com/errata/RHSA-2025:18150
reference_id RHSA-2025:18150
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18150
13
reference_url https://access.redhat.com/errata/RHSA-2025:18151
reference_id RHSA-2025:18151
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18151
14
reference_url https://access.redhat.com/errata/RHSA-2025:18152
reference_id RHSA-2025:18152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18152
15
reference_url https://access.redhat.com/errata/RHSA-2025:18153
reference_id RHSA-2025:18153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18153
16
reference_url https://access.redhat.com/errata/RHSA-2025:18256
reference_id RHSA-2025:18256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18256
17
reference_url https://access.redhat.com/errata/RHSA-2025:23225
reference_id RHSA-2025:23225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23225
18
reference_url https://usn.ubuntu.com/7822-1/
reference_id USN-7822-1
reference_type
scores
url https://usn.ubuntu.com/7822-1/
fixed_packages
0
url pkg:apk/alpine/dotnet9-runtime@9.0.10-r0?arch=armv7&distroversion=edge&reponame=community
purl pkg:apk/alpine/dotnet9-runtime@9.0.10-r0?arch=armv7&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/dotnet9-runtime@9.0.10-r0%3Farch=armv7&distroversion=edge&reponame=community
aliases CVE-2025-55248, GHSA-gwq6-fmvp-qp68
risk_score 3.7
exploitability 0.5
weighted_severity 7.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k3fx-jcj4-jfc6
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/dotnet9-runtime@9.0.10-r0%3Farch=armv7&distroversion=edge&reponame=community