Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
Typedeb
Namespacedebian
Namegolang-1.15
Version1.15.15-1~deb11u4
Qualifiers
distro bullseye
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-2zj9-xmsh-xbcn
vulnerability_id VCID-2zj9-xmsh-xbcn
summary Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44717.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44717.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-44717
reference_id
reference_type
scores
0
value 0.0022
scoring_system epss
scoring_elements 0.44535
published_at 2026-04-01T12:55:00Z
1
value 0.0022
scoring_system epss
scoring_elements 0.44613
published_at 2026-04-12T12:55:00Z
2
value 0.0022
scoring_system epss
scoring_elements 0.44634
published_at 2026-04-04T12:55:00Z
3
value 0.0022
scoring_system epss
scoring_elements 0.44572
published_at 2026-04-07T12:55:00Z
4
value 0.0022
scoring_system epss
scoring_elements 0.44623
published_at 2026-04-08T12:55:00Z
5
value 0.0022
scoring_system epss
scoring_elements 0.44626
published_at 2026-04-09T12:55:00Z
6
value 0.0022
scoring_system epss
scoring_elements 0.44643
published_at 2026-04-11T12:55:00Z
7
value 0.0022
scoring_system epss
scoring_elements 0.44614
published_at 2026-04-13T12:55:00Z
8
value 0.0022
scoring_system epss
scoring_elements 0.44668
published_at 2026-04-16T12:55:00Z
9
value 0.0022
scoring_system epss
scoring_elements 0.44661
published_at 2026-04-18T12:55:00Z
10
value 0.0022
scoring_system epss
scoring_elements 0.44592
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-44717
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44717
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2030806
reference_id 2030806
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2030806
4
reference_url https://security.archlinux.org/AVG-2617
reference_id AVG-2617
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2617
5
reference_url https://security.gentoo.org/glsa/202208-02
reference_id GLSA-202208-02
reference_type
scores
url https://security.gentoo.org/glsa/202208-02
6
reference_url https://access.redhat.com/errata/RHSA-2021:5160
reference_id RHSA-2021:5160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5160
7
reference_url https://access.redhat.com/errata/RHSA-2021:5176
reference_id RHSA-2021:5176
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5176
8
reference_url https://access.redhat.com/errata/RHSA-2022:0055
reference_id RHSA-2022:0055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0055
9
reference_url https://access.redhat.com/errata/RHSA-2022:0056
reference_id RHSA-2022:0056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0056
10
reference_url https://access.redhat.com/errata/RHSA-2022:0557
reference_id RHSA-2022:0557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0557
11
reference_url https://access.redhat.com/errata/RHSA-2022:0927
reference_id RHSA-2022:0927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0927
12
reference_url https://access.redhat.com/errata/RHSA-2022:1051
reference_id RHSA-2022:1051
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1051
13
reference_url https://access.redhat.com/errata/RHSA-2022:1056
reference_id RHSA-2022:1056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1056
14
reference_url https://access.redhat.com/errata/RHSA-2022:1361
reference_id RHSA-2022:1361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1361
15
reference_url https://access.redhat.com/errata/RHSA-2022:1372
reference_id RHSA-2022:1372
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1372
16
reference_url https://access.redhat.com/errata/RHSA-2022:1734
reference_id RHSA-2022:1734
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1734
17
reference_url https://access.redhat.com/errata/RHSA-2023:0407
reference_id RHSA-2023:0407
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0407
18
reference_url https://access.redhat.com/errata/RHSA-2023:0408
reference_id RHSA-2023:0408
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0408
fixed_packages
0
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u2?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u2?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u2%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2021-44717
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2zj9-xmsh-xbcn
1
url VCID-35du-rm88-k7bw
vulnerability_id VCID-35du-rm88-k7bw
summary Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33195.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33195.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-33195
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09083
published_at 2026-04-01T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09159
published_at 2026-04-21T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.0902
published_at 2026-04-16T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09
published_at 2026-04-18T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09088
published_at 2026-04-02T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09141
published_at 2026-04-08T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09062
published_at 2026-04-07T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09173
published_at 2026-04-09T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.09172
published_at 2026-04-11T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.09139
published_at 2026-04-12T12:55:00Z
10
value 0.00032
scoring_system epss
scoring_elements 0.09126
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-33195
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33195
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1989564
reference_id 1989564
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1989564
5
reference_url https://security.archlinux.org/ASA-202106-42
reference_id ASA-202106-42
reference_type
scores
url https://security.archlinux.org/ASA-202106-42
6
reference_url https://security.archlinux.org/AVG-2006
reference_id AVG-2006
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2006
7
reference_url https://security.gentoo.org/glsa/202208-02
reference_id GLSA-202208-02
reference_type
scores
url https://security.gentoo.org/glsa/202208-02
8
reference_url https://access.redhat.com/errata/RHSA-2021:2983
reference_id RHSA-2021:2983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2983
9
reference_url https://access.redhat.com/errata/RHSA-2021:2984
reference_id RHSA-2021:2984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2984
10
reference_url https://access.redhat.com/errata/RHSA-2021:3009
reference_id RHSA-2021:3009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3009
11
reference_url https://access.redhat.com/errata/RHSA-2021:3146
reference_id RHSA-2021:3146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3146
12
reference_url https://access.redhat.com/errata/RHSA-2021:3229
reference_id RHSA-2021:3229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3229
13
reference_url https://access.redhat.com/errata/RHSA-2021:3248
reference_id RHSA-2021:3248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3248
14
reference_url https://access.redhat.com/errata/RHSA-2021:3361
reference_id RHSA-2021:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3361
15
reference_url https://access.redhat.com/errata/RHSA-2021:3431
reference_id RHSA-2021:3431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3431
16
reference_url https://access.redhat.com/errata/RHSA-2021:3487
reference_id RHSA-2021:3487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3487
17
reference_url https://access.redhat.com/errata/RHSA-2021:3555
reference_id RHSA-2021:3555
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3555
18
reference_url https://access.redhat.com/errata/RHSA-2021:3556
reference_id RHSA-2021:3556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3556
19
reference_url https://access.redhat.com/errata/RHSA-2021:3598
reference_id RHSA-2021:3598
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3598
20
reference_url https://access.redhat.com/errata/RHSA-2021:3759
reference_id RHSA-2021:3759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3759
21
reference_url https://access.redhat.com/errata/RHSA-2021:3820
reference_id RHSA-2021:3820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3820
22
reference_url https://access.redhat.com/errata/RHSA-2021:4104
reference_id RHSA-2021:4104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4104
23
reference_url https://access.redhat.com/errata/RHSA-2021:4156
reference_id RHSA-2021:4156
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4156
24
reference_url https://access.redhat.com/errata/RHSA-2021:4226
reference_id RHSA-2021:4226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4226
25
reference_url https://access.redhat.com/errata/RHSA-2021:5072
reference_id RHSA-2021:5072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5072
26
reference_url https://access.redhat.com/errata/RHSA-2021:5085
reference_id RHSA-2021:5085
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5085
27
reference_url https://access.redhat.com/errata/RHSA-2021:5086
reference_id RHSA-2021:5086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5086
28
reference_url https://access.redhat.com/errata/RHSA-2022:0191
reference_id RHSA-2022:0191
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0191
29
reference_url https://access.redhat.com/errata/RHSA-2022:0577
reference_id RHSA-2022:0577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0577
30
reference_url https://access.redhat.com/errata/RHSA-2022:1329
reference_id RHSA-2022:1329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1329
31
reference_url https://access.redhat.com/errata/RHSA-2022:1402
reference_id RHSA-2022:1402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1402
fixed_packages
0
url pkg:deb/debian/golang-1.15@1.15.9-5?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.9-5?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.9-5%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2021-33195
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-35du-rm88-k7bw
2
url VCID-3vjm-2r63-afbr
vulnerability_id VCID-3vjm-2r63-afbr
summary Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27919.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27919.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-27919
reference_id
reference_type
scores
0
value 0.00132
scoring_system epss
scoring_elements 0.32741
published_at 2026-04-01T12:55:00Z
1
value 0.00132
scoring_system epss
scoring_elements 0.32756
published_at 2026-04-18T12:55:00Z
2
value 0.00132
scoring_system epss
scoring_elements 0.32739
published_at 2026-04-13T12:55:00Z
3
value 0.00132
scoring_system epss
scoring_elements 0.3278
published_at 2026-04-16T12:55:00Z
4
value 0.00132
scoring_system epss
scoring_elements 0.32872
published_at 2026-04-02T12:55:00Z
5
value 0.00132
scoring_system epss
scoring_elements 0.32907
published_at 2026-04-04T12:55:00Z
6
value 0.00132
scoring_system epss
scoring_elements 0.32727
published_at 2026-04-21T12:55:00Z
7
value 0.00132
scoring_system epss
scoring_elements 0.32775
published_at 2026-04-08T12:55:00Z
8
value 0.00132
scoring_system epss
scoring_elements 0.32802
published_at 2026-04-09T12:55:00Z
9
value 0.00132
scoring_system epss
scoring_elements 0.32803
published_at 2026-04-11T12:55:00Z
10
value 0.00132
scoring_system epss
scoring_elements 0.32765
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-27919
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1937909
reference_id 1937909
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1937909
4
reference_url https://security.archlinux.org/AVG-1668
reference_id AVG-1668
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1668
5
reference_url https://security.gentoo.org/glsa/202208-02
reference_id GLSA-202208-02
reference_type
scores
url https://security.gentoo.org/glsa/202208-02
fixed_packages
0
url pkg:deb/debian/golang-1.15@0?distro=bullseye
purl pkg:deb/debian/golang-1.15@0?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2021-27919
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3vjm-2r63-afbr
3
url VCID-4pue-fbre-zfcf
vulnerability_id VCID-4pue-fbre-zfcf
summary Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23806.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23806.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23806
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.12203
published_at 2026-04-02T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.12248
published_at 2026-04-04T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.12048
published_at 2026-04-07T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.12129
published_at 2026-04-08T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.12181
published_at 2026-04-09T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.12189
published_at 2026-04-11T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.12152
published_at 2026-04-12T12:55:00Z
7
value 0.0004
scoring_system epss
scoring_elements 0.1212
published_at 2026-04-13T12:55:00Z
8
value 0.0004
scoring_system epss
scoring_elements 0.1199
published_at 2026-04-16T12:55:00Z
9
value 0.0004
scoring_system epss
scoring_elements 0.11986
published_at 2026-04-18T12:55:00Z
10
value 0.0004
scoring_system epss
scoring_elements 0.12105
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23806
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23806
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2053429
reference_id 2053429
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2053429
5
reference_url https://security.gentoo.org/glsa/202208-02
reference_id GLSA-202208-02
reference_type
scores
url https://security.gentoo.org/glsa/202208-02
6
reference_url https://access.redhat.com/errata/RHSA-2022:1819
reference_id RHSA-2022:1819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1819
7
reference_url https://access.redhat.com/errata/RHSA-2022:4860
reference_id RHSA-2022:4860
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4860
8
reference_url https://access.redhat.com/errata/RHSA-2022:4863
reference_id RHSA-2022:4863
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4863
9
reference_url https://access.redhat.com/errata/RHSA-2022:5004
reference_id RHSA-2022:5004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5004
10
reference_url https://access.redhat.com/errata/RHSA-2022:5006
reference_id RHSA-2022:5006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5006
11
reference_url https://access.redhat.com/errata/RHSA-2022:5068
reference_id RHSA-2022:5068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5068
12
reference_url https://access.redhat.com/errata/RHSA-2022:5729
reference_id RHSA-2022:5729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5729
13
reference_url https://access.redhat.com/errata/RHSA-2022:5875
reference_id RHSA-2022:5875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5875
14
reference_url https://access.redhat.com/errata/RHSA-2022:6094
reference_id RHSA-2022:6094
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6094
15
reference_url https://access.redhat.com/errata/RHSA-2022:6156
reference_id RHSA-2022:6156
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6156
16
reference_url https://access.redhat.com/errata/RHSA-2023:0408
reference_id RHSA-2023:0408
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0408
17
reference_url https://access.redhat.com/errata/RHSA-2023:1529
reference_id RHSA-2023:1529
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1529
fixed_packages
0
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u3?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u3?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u3%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2022-23806
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4pue-fbre-zfcf
4
url VCID-5q9b-a7c4-1yht
vulnerability_id VCID-5q9b-a7c4-1yht
summary golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61728.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61728.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-61728
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.05153
published_at 2026-04-21T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.05068
published_at 2026-04-07T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.05101
published_at 2026-04-08T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.05115
published_at 2026-04-09T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.0509
published_at 2026-04-11T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.05072
published_at 2026-04-12T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.05056
published_at 2026-04-13T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.05002
published_at 2026-04-16T12:55:00Z
8
value 0.00019
scoring_system epss
scoring_elements 0.05007
published_at 2026-04-18T12:55:00Z
9
value 0.00022
scoring_system epss
scoring_elements 0.05923
published_at 2026-04-02T12:55:00Z
10
value 0.00022
scoring_system epss
scoring_elements 0.05956
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-61728
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125916
reference_id 1125916
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125916
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125917
reference_id 1125917
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125917
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2434431
reference_id 2434431
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2434431
6
reference_url https://go.dev/cl/736713
reference_id 736713
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-29T18:29:58Z/
url https://go.dev/cl/736713
7
reference_url https://go.dev/issue/77102
reference_id 77102
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-29T18:29:58Z/
url https://go.dev/issue/77102
8
reference_url https://pkg.go.dev/vuln/GO-2026-4342
reference_id GO-2026-4342
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-29T18:29:58Z/
url https://pkg.go.dev/vuln/GO-2026-4342
9
reference_url https://access.redhat.com/errata/RHSA-2026:10175
reference_id RHSA-2026:10175
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10175
10
reference_url https://access.redhat.com/errata/RHSA-2026:10184
reference_id RHSA-2026:10184
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10184
11
reference_url https://access.redhat.com/errata/RHSA-2026:2706
reference_id RHSA-2026:2706
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2706
12
reference_url https://access.redhat.com/errata/RHSA-2026:2708
reference_id RHSA-2026:2708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2708
13
reference_url https://access.redhat.com/errata/RHSA-2026:2709
reference_id RHSA-2026:2709
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2709
14
reference_url https://access.redhat.com/errata/RHSA-2026:2914
reference_id RHSA-2026:2914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2914
15
reference_url https://access.redhat.com/errata/RHSA-2026:2920
reference_id RHSA-2026:2920
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2920
16
reference_url https://access.redhat.com/errata/RHSA-2026:3186
reference_id RHSA-2026:3186
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3186
17
reference_url https://access.redhat.com/errata/RHSA-2026:3188
reference_id RHSA-2026:3188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3188
18
reference_url https://access.redhat.com/errata/RHSA-2026:3192
reference_id RHSA-2026:3192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3192
19
reference_url https://access.redhat.com/errata/RHSA-2026:3193
reference_id RHSA-2026:3193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3193
20
reference_url https://access.redhat.com/errata/RHSA-2026:3336
reference_id RHSA-2026:3336
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3336
21
reference_url https://access.redhat.com/errata/RHSA-2026:3337
reference_id RHSA-2026:3337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3337
22
reference_url https://access.redhat.com/errata/RHSA-2026:3469
reference_id RHSA-2026:3469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3469
23
reference_url https://access.redhat.com/errata/RHSA-2026:3471
reference_id RHSA-2026:3471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3471
24
reference_url https://access.redhat.com/errata/RHSA-2026:3472
reference_id RHSA-2026:3472
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3472
25
reference_url https://access.redhat.com/errata/RHSA-2026:3473
reference_id RHSA-2026:3473
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3473
26
reference_url https://access.redhat.com/errata/RHSA-2026:3489
reference_id RHSA-2026:3489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3489
27
reference_url https://access.redhat.com/errata/RHSA-2026:3556
reference_id RHSA-2026:3556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3556
28
reference_url https://access.redhat.com/errata/RHSA-2026:3559
reference_id RHSA-2026:3559
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3559
29
reference_url https://access.redhat.com/errata/RHSA-2026:3752
reference_id RHSA-2026:3752
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3752
30
reference_url https://access.redhat.com/errata/RHSA-2026:3753
reference_id RHSA-2026:3753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3753
31
reference_url https://access.redhat.com/errata/RHSA-2026:3782
reference_id RHSA-2026:3782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3782
32
reference_url https://access.redhat.com/errata/RHSA-2026:3831
reference_id RHSA-2026:3831
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3831
33
reference_url https://access.redhat.com/errata/RHSA-2026:3833
reference_id RHSA-2026:3833
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3833
34
reference_url https://access.redhat.com/errata/RHSA-2026:3835
reference_id RHSA-2026:3835
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3835
35
reference_url https://access.redhat.com/errata/RHSA-2026:3836
reference_id RHSA-2026:3836
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3836
36
reference_url https://access.redhat.com/errata/RHSA-2026:3838
reference_id RHSA-2026:3838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3838
37
reference_url https://access.redhat.com/errata/RHSA-2026:3851
reference_id RHSA-2026:3851
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3851
38
reference_url https://access.redhat.com/errata/RHSA-2026:3854
reference_id RHSA-2026:3854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3854
39
reference_url https://access.redhat.com/errata/RHSA-2026:3855
reference_id RHSA-2026:3855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3855
40
reference_url https://access.redhat.com/errata/RHSA-2026:3880
reference_id RHSA-2026:3880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3880
41
reference_url https://access.redhat.com/errata/RHSA-2026:3884
reference_id RHSA-2026:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3884
42
reference_url https://access.redhat.com/errata/RHSA-2026:4170
reference_id RHSA-2026:4170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4170
43
reference_url https://access.redhat.com/errata/RHSA-2026:4434
reference_id RHSA-2026:4434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4434
44
reference_url https://access.redhat.com/errata/RHSA-2026:4466
reference_id RHSA-2026:4466
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4466
45
reference_url https://access.redhat.com/errata/RHSA-2026:4467
reference_id RHSA-2026:4467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4467
46
reference_url https://access.redhat.com/errata/RHSA-2026:4672
reference_id RHSA-2026:4672
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4672
47
reference_url https://access.redhat.com/errata/RHSA-2026:4942
reference_id RHSA-2026:4942
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4942
48
reference_url https://access.redhat.com/errata/RHSA-2026:5110
reference_id RHSA-2026:5110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5110
49
reference_url https://access.redhat.com/errata/RHSA-2026:5439
reference_id RHSA-2026:5439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5439
50
reference_url https://access.redhat.com/errata/RHSA-2026:5444
reference_id RHSA-2026:5444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5444
51
reference_url https://access.redhat.com/errata/RHSA-2026:5447
reference_id RHSA-2026:5447
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5447
52
reference_url https://access.redhat.com/errata/RHSA-2026:5452
reference_id RHSA-2026:5452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5452
53
reference_url https://access.redhat.com/errata/RHSA-2026:5549
reference_id RHSA-2026:5549
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5549
54
reference_url https://access.redhat.com/errata/RHSA-2026:5645
reference_id RHSA-2026:5645
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5645
55
reference_url https://access.redhat.com/errata/RHSA-2026:5665
reference_id RHSA-2026:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5665
56
reference_url https://access.redhat.com/errata/RHSA-2026:5851
reference_id RHSA-2026:5851
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5851
57
reference_url https://access.redhat.com/errata/RHSA-2026:5948
reference_id RHSA-2026:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5948
58
reference_url https://access.redhat.com/errata/RHSA-2026:5950
reference_id RHSA-2026:5950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5950
59
reference_url https://access.redhat.com/errata/RHSA-2026:5952
reference_id RHSA-2026:5952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5952
60
reference_url https://access.redhat.com/errata/RHSA-2026:6055
reference_id RHSA-2026:6055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6055
61
reference_url https://access.redhat.com/errata/RHSA-2026:6192
reference_id RHSA-2026:6192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6192
62
reference_url https://access.redhat.com/errata/RHSA-2026:6226
reference_id RHSA-2026:6226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6226
63
reference_url https://access.redhat.com/errata/RHSA-2026:6251
reference_id RHSA-2026:6251
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6251
64
reference_url https://access.redhat.com/errata/RHSA-2026:6428
reference_id RHSA-2026:6428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6428
65
reference_url https://access.redhat.com/errata/RHSA-2026:6429
reference_id RHSA-2026:6429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6429
66
reference_url https://access.redhat.com/errata/RHSA-2026:6497
reference_id RHSA-2026:6497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6497
67
reference_url https://access.redhat.com/errata/RHSA-2026:6554
reference_id RHSA-2026:6554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6554
68
reference_url https://access.redhat.com/errata/RHSA-2026:6564
reference_id RHSA-2026:6564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6564
69
reference_url https://access.redhat.com/errata/RHSA-2026:6567
reference_id RHSA-2026:6567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6567
70
reference_url https://access.redhat.com/errata/RHSA-2026:6568
reference_id RHSA-2026:6568
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6568
71
reference_url https://access.redhat.com/errata/RHSA-2026:7249
reference_id RHSA-2026:7249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7249
72
reference_url https://access.redhat.com/errata/RHSA-2026:7854
reference_id RHSA-2026:7854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7854
73
reference_url https://access.redhat.com/errata/RHSA-2026:8151
reference_id RHSA-2026:8151
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8151
74
reference_url https://access.redhat.com/errata/RHSA-2026:8229
reference_id RHSA-2026:8229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8229
75
reference_url https://access.redhat.com/errata/RHSA-2026:8448
reference_id RHSA-2026:8448
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8448
76
reference_url https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc
reference_id Vd2tYVM8eUc
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-29T18:29:58Z/
url https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc
fixed_packages
0
url pkg:deb/debian/golang-1.15@0?distro=bullseye
purl pkg:deb/debian/golang-1.15@0?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2025-61728
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5q9b-a7c4-1yht
5
url VCID-5wtx-278c-nycq
vulnerability_id VCID-5wtx-278c-nycq
summary Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33198.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33198.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-33198
reference_id
reference_type
scores
0
value 0.00031
scoring_system epss
scoring_elements 0.08775
published_at 2026-04-01T12:55:00Z
1
value 0.00031
scoring_system epss
scoring_elements 0.08702
published_at 2026-04-18T12:55:00Z
2
value 0.00031
scoring_system epss
scoring_elements 0.08839
published_at 2026-04-13T12:55:00Z
3
value 0.00031
scoring_system epss
scoring_elements 0.08727
published_at 2026-04-16T12:55:00Z
4
value 0.00031
scoring_system epss
scoring_elements 0.08801
published_at 2026-04-02T12:55:00Z
5
value 0.00031
scoring_system epss
scoring_elements 0.0885
published_at 2026-04-04T12:55:00Z
6
value 0.00031
scoring_system epss
scoring_elements 0.08782
published_at 2026-04-07T12:55:00Z
7
value 0.00031
scoring_system epss
scoring_elements 0.0886
published_at 2026-04-08T12:55:00Z
8
value 0.00031
scoring_system epss
scoring_elements 0.08886
published_at 2026-04-09T12:55:00Z
9
value 0.00031
scoring_system epss
scoring_elements 0.08885
published_at 2026-04-11T12:55:00Z
10
value 0.00031
scoring_system epss
scoring_elements 0.08853
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-33198
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33198
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1989575
reference_id 1989575
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1989575
5
reference_url https://security.archlinux.org/ASA-202106-42
reference_id ASA-202106-42
reference_type
scores
url https://security.archlinux.org/ASA-202106-42
6
reference_url https://security.archlinux.org/AVG-2006
reference_id AVG-2006
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2006
7
reference_url https://security.gentoo.org/glsa/202208-02
reference_id GLSA-202208-02
reference_type
scores
url https://security.gentoo.org/glsa/202208-02
8
reference_url https://access.redhat.com/errata/RHSA-2021:2983
reference_id RHSA-2021:2983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2983
9
reference_url https://access.redhat.com/errata/RHSA-2021:2984
reference_id RHSA-2021:2984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2984
10
reference_url https://access.redhat.com/errata/RHSA-2021:3009
reference_id RHSA-2021:3009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3009
11
reference_url https://access.redhat.com/errata/RHSA-2021:3146
reference_id RHSA-2021:3146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3146
12
reference_url https://access.redhat.com/errata/RHSA-2021:3229
reference_id RHSA-2021:3229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3229
13
reference_url https://access.redhat.com/errata/RHSA-2021:3248
reference_id RHSA-2021:3248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3248
14
reference_url https://access.redhat.com/errata/RHSA-2021:3361
reference_id RHSA-2021:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3361
15
reference_url https://access.redhat.com/errata/RHSA-2021:3487
reference_id RHSA-2021:3487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3487
16
reference_url https://access.redhat.com/errata/RHSA-2021:3555
reference_id RHSA-2021:3555
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3555
17
reference_url https://access.redhat.com/errata/RHSA-2021:3556
reference_id RHSA-2021:3556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3556
18
reference_url https://access.redhat.com/errata/RHSA-2021:3598
reference_id RHSA-2021:3598
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3598
19
reference_url https://access.redhat.com/errata/RHSA-2021:3759
reference_id RHSA-2021:3759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3759
20
reference_url https://access.redhat.com/errata/RHSA-2021:3820
reference_id RHSA-2021:3820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3820
21
reference_url https://access.redhat.com/errata/RHSA-2021:4104
reference_id RHSA-2021:4104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4104
22
reference_url https://access.redhat.com/errata/RHSA-2021:4156
reference_id RHSA-2021:4156
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4156
23
reference_url https://access.redhat.com/errata/RHSA-2021:5072
reference_id RHSA-2021:5072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5072
24
reference_url https://access.redhat.com/errata/RHSA-2021:5085
reference_id RHSA-2021:5085
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5085
25
reference_url https://access.redhat.com/errata/RHSA-2021:5086
reference_id RHSA-2021:5086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5086
26
reference_url https://access.redhat.com/errata/RHSA-2022:0191
reference_id RHSA-2022:0191
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0191
27
reference_url https://access.redhat.com/errata/RHSA-2022:0577
reference_id RHSA-2022:0577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0577
28
reference_url https://access.redhat.com/errata/RHSA-2022:1329
reference_id RHSA-2022:1329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1329
29
reference_url https://access.redhat.com/errata/RHSA-2022:1402
reference_id RHSA-2022:1402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1402
30
reference_url https://access.redhat.com/errata/RHSA-2022:7955
reference_id RHSA-2022:7955
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7955
31
reference_url https://access.redhat.com/errata/RHSA-2024:10289
reference_id RHSA-2024:10289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10289
32
reference_url https://access.redhat.com/errata/RHSA-2024:2586
reference_id RHSA-2024:2586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2586
33
reference_url https://access.redhat.com/errata/RHSA-2024:2988
reference_id RHSA-2024:2988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2988
fixed_packages
0
url pkg:deb/debian/golang-1.15@1.15.9-5?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.9-5?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.9-5%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2021-33198
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5wtx-278c-nycq
6
url VCID-6189-d1tw-bfcp
vulnerability_id VCID-6189-d1tw-bfcp
summary Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30630.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30630.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-30630
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11554
published_at 2026-04-02T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11471
published_at 2026-04-21T12:55:00Z
2
value 0.00038
scoring_system epss
scoring_elements 0.11609
published_at 2026-04-04T12:55:00Z
3
value 0.00038
scoring_system epss
scoring_elements 0.11398
published_at 2026-04-07T12:55:00Z
4
value 0.00038
scoring_system epss
scoring_elements 0.11482
published_at 2026-04-08T12:55:00Z
5
value 0.00038
scoring_system epss
scoring_elements 0.11541
published_at 2026-04-09T12:55:00Z
6
value 0.00038
scoring_system epss
scoring_elements 0.11551
published_at 2026-04-11T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.11517
published_at 2026-04-12T12:55:00Z
8
value 0.00038
scoring_system epss
scoring_elements 0.11486
published_at 2026-04-13T12:55:00Z
9
value 0.00038
scoring_system epss
scoring_elements 0.11347
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-30630
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2107371
reference_id 2107371
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2107371
4
reference_url https://go.dev/cl/417065
reference_id 417065
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-24T20:38:26Z/
url https://go.dev/cl/417065
5
reference_url https://go.dev/issue/53415
reference_id 53415
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-24T20:38:26Z/
url https://go.dev/issue/53415
6
reference_url https://go.googlesource.com/go/+/fa2d41d0ca736f3ad6b200b2a4e134364e9acc59
reference_id fa2d41d0ca736f3ad6b200b2a4e134364e9acc59
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-24T20:38:26Z/
url https://go.googlesource.com/go/+/fa2d41d0ca736f3ad6b200b2a4e134364e9acc59
7
reference_url https://security.gentoo.org/glsa/202208-02
reference_id GLSA-202208-02
reference_type
scores
url https://security.gentoo.org/glsa/202208-02
8
reference_url https://pkg.go.dev/vuln/GO-2022-0527
reference_id GO-2022-0527
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-24T20:38:26Z/
url https://pkg.go.dev/vuln/GO-2022-0527
9
reference_url https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE
reference_id nqrv9fbR0zE
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-24T20:38:26Z/
url https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE
10
reference_url https://access.redhat.com/errata/RHSA-2022:5775
reference_id RHSA-2022:5775
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5775
11
reference_url https://access.redhat.com/errata/RHSA-2022:5799
reference_id RHSA-2022:5799
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5799
12
reference_url https://access.redhat.com/errata/RHSA-2022:5866
reference_id RHSA-2022:5866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5866
13
reference_url https://access.redhat.com/errata/RHSA-2022:6040
reference_id RHSA-2022:6040
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6040
14
reference_url https://access.redhat.com/errata/RHSA-2022:6042
reference_id RHSA-2022:6042
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6042
15
reference_url https://access.redhat.com/errata/RHSA-2022:6113
reference_id RHSA-2022:6113
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6113
16
reference_url https://access.redhat.com/errata/RHSA-2022:6152
reference_id RHSA-2022:6152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6152
17
reference_url https://access.redhat.com/errata/RHSA-2022:6188
reference_id RHSA-2022:6188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6188
18
reference_url https://access.redhat.com/errata/RHSA-2022:6283
reference_id RHSA-2022:6283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6283
19
reference_url https://access.redhat.com/errata/RHSA-2022:6430
reference_id RHSA-2022:6430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6430
20
reference_url https://access.redhat.com/errata/RHSA-2022:7129
reference_id RHSA-2022:7129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7129
21
reference_url https://access.redhat.com/errata/RHSA-2022:7519
reference_id RHSA-2022:7519
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7519
22
reference_url https://access.redhat.com/errata/RHSA-2022:7529
reference_id RHSA-2022:7529
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7529
23
reference_url https://access.redhat.com/errata/RHSA-2022:7648
reference_id RHSA-2022:7648
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7648
24
reference_url https://access.redhat.com/errata/RHSA-2022:8057
reference_id RHSA-2022:8057
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8057
25
reference_url https://access.redhat.com/errata/RHSA-2022:8098
reference_id RHSA-2022:8098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8098
26
reference_url https://access.redhat.com/errata/RHSA-2022:8250
reference_id RHSA-2022:8250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8250
27
reference_url https://access.redhat.com/errata/RHSA-2022:9047
reference_id RHSA-2022:9047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9047
28
reference_url https://access.redhat.com/errata/RHSA-2023:0407
reference_id RHSA-2023:0407
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0407
29
reference_url https://access.redhat.com/errata/RHSA-2023:0408
reference_id RHSA-2023:0408
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0408
30
reference_url https://access.redhat.com/errata/RHSA-2023:1042
reference_id RHSA-2023:1042
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1042
31
reference_url https://access.redhat.com/errata/RHSA-2023:1275
reference_id RHSA-2023:1275
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1275
32
reference_url https://access.redhat.com/errata/RHSA-2023:1529
reference_id RHSA-2023:1529
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1529
33
reference_url https://access.redhat.com/errata/RHSA-2023:2357
reference_id RHSA-2023:2357
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2357
34
reference_url https://access.redhat.com/errata/RHSA-2023:2758
reference_id RHSA-2023:2758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2758
35
reference_url https://access.redhat.com/errata/RHSA-2023:2802
reference_id RHSA-2023:2802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2802
36
reference_url https://access.redhat.com/errata/RHSA-2023:3642
reference_id RHSA-2023:3642
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3642
37
reference_url https://access.redhat.com/errata/RHSA-2024:2180
reference_id RHSA-2024:2180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2180
38
reference_url https://usn.ubuntu.com/6038-1/
reference_id USN-6038-1
reference_type
scores
url https://usn.ubuntu.com/6038-1/
39
reference_url https://usn.ubuntu.com/6038-2/
reference_id USN-6038-2
reference_type
scores
url https://usn.ubuntu.com/6038-2/
fixed_packages
0
url pkg:deb/debian/golang-1.15@0?distro=bullseye
purl pkg:deb/debian/golang-1.15@0?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2022-30630
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6189-d1tw-bfcp
7
url VCID-6a6z-bq7m-c3gf
vulnerability_id VCID-6a6z-bq7m-c3gf
summary crypto/x509: Panic in name constraint checking for malformed certificates in crypto/x509
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27138.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27138.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-27138
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05245
published_at 2026-04-04T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05215
published_at 2026-04-02T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05894
published_at 2026-04-21T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05749
published_at 2026-04-18T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05788
published_at 2026-04-08T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05813
published_at 2026-04-09T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05792
published_at 2026-04-11T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05784
published_at 2026-04-12T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05778
published_at 2026-04-13T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05741
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-27138
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2445344
reference_id 2445344
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2445344
4
reference_url https://go.dev/cl/752183
reference_id 752183
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-10T13:34:15Z/
url https://go.dev/cl/752183
5
reference_url https://go.dev/issue/77953
reference_id 77953
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-10T13:34:15Z/
url https://go.dev/issue/77953
6
reference_url https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk
reference_id EdhZqrQ98hk
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-10T13:34:15Z/
url https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk
7
reference_url https://pkg.go.dev/vuln/GO-2026-4600
reference_id GO-2026-4600
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-10T13:34:15Z/
url https://pkg.go.dev/vuln/GO-2026-4600
fixed_packages
0
url pkg:deb/debian/golang-1.15@0?distro=bullseye
purl pkg:deb/debian/golang-1.15@0?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2026-27138
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6a6z-bq7m-c3gf
8
url VCID-6rkv-zkwa-mqhf
vulnerability_id VCID-6rkv-zkwa-mqhf
summary os: os: Information disclosure via path traversal using specially crafted filenames
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-22873.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-22873.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-22873
reference_id
reference_type
scores
0
value 3e-05
scoring_system epss
scoring_elements 0.00136
published_at 2026-04-21T12:55:00Z
1
value 3e-05
scoring_system epss
scoring_elements 0.00101
published_at 2026-04-08T12:55:00Z
2
value 3e-05
scoring_system epss
scoring_elements 0.00102
published_at 2026-04-12T12:55:00Z
3
value 3e-05
scoring_system epss
scoring_elements 0.00133
published_at 2026-04-18T12:55:00Z
4
value 3e-05
scoring_system epss
scoring_elements 0.00132
published_at 2026-04-16T12:55:00Z
5
value 4e-05
scoring_system epss
scoring_elements 0.00148
published_at 2026-04-04T12:55:00Z
6
value 4e-05
scoring_system epss
scoring_elements 0.00178
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-22873
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1104816
reference_id 1104816
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1104816
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2436992
reference_id 2436992
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2436992
5
reference_url https://groups.google.com/g/golang-announce/c/UZoIkUT367A/m/5WDxKizJAQAJ
reference_id 5WDxKizJAQAJ
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-05T15:03:11Z/
url https://groups.google.com/g/golang-announce/c/UZoIkUT367A/m/5WDxKizJAQAJ
6
reference_url https://go.dev/cl/670036
reference_id 670036
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-05T15:03:11Z/
url https://go.dev/cl/670036
7
reference_url https://go.dev/issue/73555
reference_id 73555
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-05T15:03:11Z/
url https://go.dev/issue/73555
8
reference_url https://security.archlinux.org/ASA-202505-12
reference_id ASA-202505-12
reference_type
scores
url https://security.archlinux.org/ASA-202505-12
9
reference_url https://security.archlinux.org/AVG-2878
reference_id AVG-2878
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2878
10
reference_url https://pkg.go.dev/vuln/GO-2026-4403
reference_id GO-2026-4403
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-05T15:03:11Z/
url https://pkg.go.dev/vuln/GO-2026-4403
fixed_packages
0
url pkg:deb/debian/golang-1.15@0?distro=bullseye
purl pkg:deb/debian/golang-1.15@0?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2025-22873
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6rkv-zkwa-mqhf
9
url VCID-7ahs-f1qh-g7an
vulnerability_id VCID-7ahs-f1qh-g7an
summary Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3114.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3114.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3114
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11299
published_at 2026-04-01T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11368
published_at 2026-04-08T12:55:00Z
2
value 0.00038
scoring_system epss
scoring_elements 0.11439
published_at 2026-04-02T12:55:00Z
3
value 0.00038
scoring_system epss
scoring_elements 0.11498
published_at 2026-04-04T12:55:00Z
4
value 0.00038
scoring_system epss
scoring_elements 0.11286
published_at 2026-04-07T12:55:00Z
5
value 0.00038
scoring_system epss
scoring_elements 0.11426
published_at 2026-04-09T12:55:00Z
6
value 0.00038
scoring_system epss
scoring_elements 0.11432
published_at 2026-04-11T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.114
published_at 2026-04-12T12:55:00Z
8
value 0.0012
scoring_system epss
scoring_elements 0.30991
published_at 2026-04-18T12:55:00Z
9
value 0.0012
scoring_system epss
scoring_elements 0.30957
published_at 2026-04-21T12:55:00Z
10
value 0.0012
scoring_system epss
scoring_elements 0.30978
published_at 2026-04-13T12:55:00Z
11
value 0.0012
scoring_system epss
scoring_elements 0.31008
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3114
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15586
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7919
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3114
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1918750
reference_id 1918750
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1918750
8
reference_url https://security.archlinux.org/ASA-202101-27
reference_id ASA-202101-27
reference_type
scores
url https://security.archlinux.org/ASA-202101-27
9
reference_url https://security.archlinux.org/AVG-1481
reference_id AVG-1481
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1481
10
reference_url https://security.gentoo.org/glsa/202208-02
reference_id GLSA-202208-02
reference_type
scores
url https://security.gentoo.org/glsa/202208-02
11
reference_url https://access.redhat.com/errata/RHSA-2021:0957
reference_id RHSA-2021:0957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0957
12
reference_url https://access.redhat.com/errata/RHSA-2021:0958
reference_id RHSA-2021:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0958
13
reference_url https://access.redhat.com/errata/RHSA-2021:1006
reference_id RHSA-2021:1006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1006
14
reference_url https://access.redhat.com/errata/RHSA-2021:1338
reference_id RHSA-2021:1338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1338
15
reference_url https://access.redhat.com/errata/RHSA-2021:1339
reference_id RHSA-2021:1339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1339
16
reference_url https://access.redhat.com/errata/RHSA-2021:1366
reference_id RHSA-2021:1366
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1366
17
reference_url https://access.redhat.com/errata/RHSA-2021:1551
reference_id RHSA-2021:1551
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1551
18
reference_url https://access.redhat.com/errata/RHSA-2021:1746
reference_id RHSA-2021:1746
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1746
19
reference_url https://access.redhat.com/errata/RHSA-2021:2021
reference_id RHSA-2021:2021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2021
20
reference_url https://access.redhat.com/errata/RHSA-2021:2041
reference_id RHSA-2021:2041
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2041
21
reference_url https://access.redhat.com/errata/RHSA-2021:2093
reference_id RHSA-2021:2093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2093
22
reference_url https://access.redhat.com/errata/RHSA-2021:2095
reference_id RHSA-2021:2095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2095
23
reference_url https://access.redhat.com/errata/RHSA-2021:2437
reference_id RHSA-2021:2437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2437
24
reference_url https://access.redhat.com/errata/RHSA-2021:2438
reference_id RHSA-2021:2438
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2438
25
reference_url https://access.redhat.com/errata/RHSA-2021:2532
reference_id RHSA-2021:2532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2532
26
reference_url https://access.redhat.com/errata/RHSA-2021:2543
reference_id RHSA-2021:2543
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2543
27
reference_url https://access.redhat.com/errata/RHSA-2021:2920
reference_id RHSA-2021:2920
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2920
28
reference_url https://access.redhat.com/errata/RHSA-2021:3119
reference_id RHSA-2021:3119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3119
29
reference_url https://access.redhat.com/errata/RHSA-2021:3748
reference_id RHSA-2021:3748
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3748
30
reference_url https://access.redhat.com/errata/RHSA-2021:4103
reference_id RHSA-2021:4103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4103
31
reference_url https://access.redhat.com/errata/RHSA-2021:4226
reference_id RHSA-2021:4226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4226
32
reference_url https://access.redhat.com/errata/RHSA-2022:0308
reference_id RHSA-2022:0308
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0308
fixed_packages
0
url pkg:deb/debian/golang-1.15@1.15.7-1?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.7-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.7-1%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2021-3114
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7ahs-f1qh-g7an
10
url VCID-7e1n-pvrt-g3fy
vulnerability_id VCID-7e1n-pvrt-g3fy
summary Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24921.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24921.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-24921
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04592
published_at 2026-04-02T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04614
published_at 2026-04-04T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04626
published_at 2026-04-07T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04661
published_at 2026-04-08T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04673
published_at 2026-04-09T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04667
published_at 2026-04-11T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04649
published_at 2026-04-12T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04632
published_at 2026-04-13T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.046
published_at 2026-04-16T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.0461
published_at 2026-04-18T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.0475
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-24921
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24921
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2064857
reference_id 2064857
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2064857
5
reference_url https://security.gentoo.org/glsa/202208-02
reference_id GLSA-202208-02
reference_type
scores
url https://security.gentoo.org/glsa/202208-02
6
reference_url https://access.redhat.com/errata/RHSA-2022:5068
reference_id RHSA-2022:5068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5068
7
reference_url https://access.redhat.com/errata/RHSA-2022:5337
reference_id RHSA-2022:5337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5337
8
reference_url https://access.redhat.com/errata/RHSA-2022:5415
reference_id RHSA-2022:5415
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5415
9
reference_url https://access.redhat.com/errata/RHSA-2022:5729
reference_id RHSA-2022:5729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5729
10
reference_url https://access.redhat.com/errata/RHSA-2022:5730
reference_id RHSA-2022:5730
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5730
11
reference_url https://access.redhat.com/errata/RHSA-2022:5799
reference_id RHSA-2022:5799
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5799
12
reference_url https://access.redhat.com/errata/RHSA-2022:6040
reference_id RHSA-2022:6040
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6040
13
reference_url https://access.redhat.com/errata/RHSA-2022:6042
reference_id RHSA-2022:6042
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6042
14
reference_url https://access.redhat.com/errata/RHSA-2022:6156
reference_id RHSA-2022:6156
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6156
15
reference_url https://access.redhat.com/errata/RHSA-2022:6277
reference_id RHSA-2022:6277
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6277
16
reference_url https://access.redhat.com/errata/RHSA-2022:6714
reference_id RHSA-2022:6714
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6714
17
reference_url https://access.redhat.com/errata/RHSA-2023:0407
reference_id RHSA-2023:0407
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0407
fixed_packages
0
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2022-24921
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7e1n-pvrt-g3fy
11
url VCID-835d-4cep-d3ff
vulnerability_id VCID-835d-4cep-d3ff
summary Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23772.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23772.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23772
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10135
published_at 2026-04-02T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.102
published_at 2026-04-04T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10097
published_at 2026-04-07T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10172
published_at 2026-04-08T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.10233
published_at 2026-04-09T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10269
published_at 2026-04-11T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10228
published_at 2026-04-12T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.10209
published_at 2026-04-13T12:55:00Z
8
value 0.00035
scoring_system epss
scoring_elements 0.10081
published_at 2026-04-16T12:55:00Z
9
value 0.00035
scoring_system epss
scoring_elements 0.10058
published_at 2026-04-18T12:55:00Z
10
value 0.00035
scoring_system epss
scoring_elements 0.1019
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23772
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23772
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2053532
reference_id 2053532
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2053532
5
reference_url https://security.gentoo.org/glsa/202208-02
reference_id GLSA-202208-02
reference_type
scores
url https://security.gentoo.org/glsa/202208-02
6
reference_url https://access.redhat.com/errata/RHSA-2022:1819
reference_id RHSA-2022:1819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1819
7
reference_url https://access.redhat.com/errata/RHSA-2022:4860
reference_id RHSA-2022:4860
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4860
8
reference_url https://access.redhat.com/errata/RHSA-2022:4863
reference_id RHSA-2022:4863
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4863
9
reference_url https://access.redhat.com/errata/RHSA-2022:5004
reference_id RHSA-2022:5004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5004
10
reference_url https://access.redhat.com/errata/RHSA-2022:5068
reference_id RHSA-2022:5068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5068
11
reference_url https://access.redhat.com/errata/RHSA-2022:5730
reference_id RHSA-2022:5730
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5730
12
reference_url https://access.redhat.com/errata/RHSA-2022:6155
reference_id RHSA-2022:6155
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6155
13
reference_url https://access.redhat.com/errata/RHSA-2022:6156
reference_id RHSA-2022:6156
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6156
14
reference_url https://access.redhat.com/errata/RHSA-2022:6526
reference_id RHSA-2022:6526
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6526
15
reference_url https://access.redhat.com/errata/RHSA-2023:0408
reference_id RHSA-2023:0408
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0408
16
reference_url https://access.redhat.com/errata/RHSA-2023:1529
reference_id RHSA-2023:1529
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1529
17
reference_url https://access.redhat.com/errata/RHSA-2023:3914
reference_id RHSA-2023:3914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3914
18
reference_url https://access.redhat.com/errata/RHSA-2024:5754
reference_id RHSA-2024:5754
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5754
19
reference_url https://access.redhat.com/errata/RHSA-2024:6412
reference_id RHSA-2024:6412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6412
fixed_packages
0
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u3?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u3?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u3%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2022-23772
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-835d-4cep-d3ff
12
url VCID-8c9g-rytj-z3g7
vulnerability_id VCID-8c9g-rytj-z3g7
summary Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3115.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3115.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3115
reference_id
reference_type
scores
0
value 0.0013
scoring_system epss
scoring_elements 0.32476
published_at 2026-04-01T12:55:00Z
1
value 0.0013
scoring_system epss
scoring_elements 0.3247
published_at 2026-04-21T12:55:00Z
2
value 0.0013
scoring_system epss
scoring_elements 0.32491
published_at 2026-04-13T12:55:00Z
3
value 0.0013
scoring_system epss
scoring_elements 0.32503
published_at 2026-04-18T12:55:00Z
4
value 0.0013
scoring_system epss
scoring_elements 0.3262
published_at 2026-04-02T12:55:00Z
5
value 0.0013
scoring_system epss
scoring_elements 0.32656
published_at 2026-04-04T12:55:00Z
6
value 0.0013
scoring_system epss
scoring_elements 0.32477
published_at 2026-04-07T12:55:00Z
7
value 0.0013
scoring_system epss
scoring_elements 0.32525
published_at 2026-04-16T12:55:00Z
8
value 0.0013
scoring_system epss
scoring_elements 0.32552
published_at 2026-04-09T12:55:00Z
9
value 0.0013
scoring_system epss
scoring_elements 0.32555
published_at 2026-04-11T12:55:00Z
10
value 0.0013
scoring_system epss
scoring_elements 0.32518
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3115
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3115
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1918761
reference_id 1918761
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1918761
5
reference_url https://security.archlinux.org/ASA-202101-27
reference_id ASA-202101-27
reference_type
scores
url https://security.archlinux.org/ASA-202101-27
6
reference_url https://security.archlinux.org/AVG-1481
reference_id AVG-1481
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1481
7
reference_url https://security.gentoo.org/glsa/202208-02
reference_id GLSA-202208-02
reference_type
scores
url https://security.gentoo.org/glsa/202208-02
8
reference_url https://access.redhat.com/errata/RHSA-2021:1338
reference_id RHSA-2021:1338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1338
9
reference_url https://access.redhat.com/errata/RHSA-2021:1339
reference_id RHSA-2021:1339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1339
10
reference_url https://access.redhat.com/errata/RHSA-2021:1746
reference_id RHSA-2021:1746
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1746
11
reference_url https://access.redhat.com/errata/RHSA-2021:2021
reference_id RHSA-2021:2021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2021
12
reference_url https://access.redhat.com/errata/RHSA-2021:2093
reference_id RHSA-2021:2093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2093
13
reference_url https://access.redhat.com/errata/RHSA-2021:2095
reference_id RHSA-2021:2095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2095
fixed_packages
0
url pkg:deb/debian/golang-1.15@1.15.7-1?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.7-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.7-1%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2021-3115
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8c9g-rytj-z3g7
13
url VCID-aya4-n4ch-3ydm
vulnerability_id VCID-aya4-n4ch-3ydm
summary golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39293.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39293.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-39293
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.11667
published_at 2026-04-01T12:55:00Z
1
value 0.00039
scoring_system epss
scoring_elements 0.11693
published_at 2026-04-21T12:55:00Z
2
value 0.00039
scoring_system epss
scoring_elements 0.11568
published_at 2026-04-16T12:55:00Z
3
value 0.00039
scoring_system epss
scoring_elements 0.1157
published_at 2026-04-18T12:55:00Z
4
value 0.00039
scoring_system epss
scoring_elements 0.1179
published_at 2026-04-02T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.11834
published_at 2026-04-04T12:55:00Z
6
value 0.00039
scoring_system epss
scoring_elements 0.11618
published_at 2026-04-07T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.11703
published_at 2026-04-08T12:55:00Z
8
value 0.00039
scoring_system epss
scoring_elements 0.11758
published_at 2026-04-09T12:55:00Z
9
value 0.00039
scoring_system epss
scoring_elements 0.11769
published_at 2026-04-11T12:55:00Z
10
value 0.00039
scoring_system epss
scoring_elements 0.11731
published_at 2026-04-12T12:55:00Z
11
value 0.00039
scoring_system epss
scoring_elements 0.11706
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-39293
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39293
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2006044
reference_id 2006044
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2006044
5
reference_url https://security.archlinux.org/AVG-2370
reference_id AVG-2370
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2370
6
reference_url https://access.redhat.com/errata/RHSA-2021:4902
reference_id RHSA-2021:4902
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4902
7
reference_url https://access.redhat.com/errata/RHSA-2022:0432
reference_id RHSA-2022:0432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0432
8
reference_url https://access.redhat.com/errata/RHSA-2022:0434
reference_id RHSA-2022:0434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0434
9
reference_url https://access.redhat.com/errata/RHSA-2022:0655
reference_id RHSA-2022:0655
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0655
10
reference_url https://access.redhat.com/errata/RHSA-2022:1819
reference_id RHSA-2022:1819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1819
11
reference_url https://access.redhat.com/errata/RHSA-2022:4814
reference_id RHSA-2022:4814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4814
fixed_packages
0
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u1?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2021-39293
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aya4-n4ch-3ydm
14
url VCID-ayxa-s9j4-k7hd
vulnerability_id VCID-ayxa-s9j4-k7hd
summary Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-34558.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-34558.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-34558
reference_id
reference_type
scores
0
value 0.00917
scoring_system epss
scoring_elements 0.75942
published_at 2026-04-21T12:55:00Z
1
value 0.00917
scoring_system epss
scoring_elements 0.75925
published_at 2026-04-12T12:55:00Z
2
value 0.00917
scoring_system epss
scoring_elements 0.75918
published_at 2026-04-13T12:55:00Z
3
value 0.00917
scoring_system epss
scoring_elements 0.75955
published_at 2026-04-16T12:55:00Z
4
value 0.00917
scoring_system epss
scoring_elements 0.75957
published_at 2026-04-18T12:55:00Z
5
value 0.00917
scoring_system epss
scoring_elements 0.75899
published_at 2026-04-04T12:55:00Z
6
value 0.00917
scoring_system epss
scoring_elements 0.75878
published_at 2026-04-07T12:55:00Z
7
value 0.00917
scoring_system epss
scoring_elements 0.75911
published_at 2026-04-08T12:55:00Z
8
value 0.00917
scoring_system epss
scoring_elements 0.75924
published_at 2026-04-09T12:55:00Z
9
value 0.00917
scoring_system epss
scoring_elements 0.75947
published_at 2026-04-11T12:55:00Z
10
value 0.01475
scoring_system epss
scoring_elements 0.80907
published_at 2026-04-02T12:55:00Z
11
value 0.01475
scoring_system epss
scoring_elements 0.80898
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-34558
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34558
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1983596
reference_id 1983596
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1983596
5
reference_url https://security.archlinux.org/ASA-202107-42
reference_id ASA-202107-42
reference_type
scores
url https://security.archlinux.org/ASA-202107-42
6
reference_url https://security.archlinux.org/AVG-2147
reference_id AVG-2147
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2147
7
reference_url https://security.gentoo.org/glsa/202208-02
reference_id GLSA-202208-02
reference_type
scores
url https://security.gentoo.org/glsa/202208-02
8
reference_url https://access.redhat.com/errata/RHSA-2021:2983
reference_id RHSA-2021:2983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2983
9
reference_url https://access.redhat.com/errata/RHSA-2021:2984
reference_id RHSA-2021:2984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2984
10
reference_url https://access.redhat.com/errata/RHSA-2021:3009
reference_id RHSA-2021:3009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3009
11
reference_url https://access.redhat.com/errata/RHSA-2021:3015
reference_id RHSA-2021:3015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3015
12
reference_url https://access.redhat.com/errata/RHSA-2021:3076
reference_id RHSA-2021:3076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3076
13
reference_url https://access.redhat.com/errata/RHSA-2021:3146
reference_id RHSA-2021:3146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3146
14
reference_url https://access.redhat.com/errata/RHSA-2021:3229
reference_id RHSA-2021:3229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3229
15
reference_url https://access.redhat.com/errata/RHSA-2021:3248
reference_id RHSA-2021:3248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3248
16
reference_url https://access.redhat.com/errata/RHSA-2021:3361
reference_id RHSA-2021:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3361
17
reference_url https://access.redhat.com/errata/RHSA-2021:3555
reference_id RHSA-2021:3555
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3555
18
reference_url https://access.redhat.com/errata/RHSA-2021:3556
reference_id RHSA-2021:3556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3556
19
reference_url https://access.redhat.com/errata/RHSA-2021:3598
reference_id RHSA-2021:3598
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3598
20
reference_url https://access.redhat.com/errata/RHSA-2021:3733
reference_id RHSA-2021:3733
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3733
21
reference_url https://access.redhat.com/errata/RHSA-2021:3759
reference_id RHSA-2021:3759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3759
22
reference_url https://access.redhat.com/errata/RHSA-2021:3820
reference_id RHSA-2021:3820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3820
23
reference_url https://access.redhat.com/errata/RHSA-2021:4104
reference_id RHSA-2021:4104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4104
24
reference_url https://access.redhat.com/errata/RHSA-2021:4226
reference_id RHSA-2021:4226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4226
25
reference_url https://access.redhat.com/errata/RHSA-2021:4582
reference_id RHSA-2021:4582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4582
26
reference_url https://access.redhat.com/errata/RHSA-2021:4722
reference_id RHSA-2021:4722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4722
27
reference_url https://access.redhat.com/errata/RHSA-2021:5085
reference_id RHSA-2021:5085
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5085
28
reference_url https://access.redhat.com/errata/RHSA-2021:5086
reference_id RHSA-2021:5086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5086
29
reference_url https://access.redhat.com/errata/RHSA-2022:0191
reference_id RHSA-2022:0191
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0191
30
reference_url https://access.redhat.com/errata/RHSA-2022:0237
reference_id RHSA-2022:0237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0237
31
reference_url https://access.redhat.com/errata/RHSA-2022:0260
reference_id RHSA-2022:0260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0260
32
reference_url https://access.redhat.com/errata/RHSA-2022:0577
reference_id RHSA-2022:0577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0577
33
reference_url https://access.redhat.com/errata/RHSA-2022:0988
reference_id RHSA-2022:0988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0988
34
reference_url https://access.redhat.com/errata/RHSA-2022:0998
reference_id RHSA-2022:0998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0998
35
reference_url https://access.redhat.com/errata/RHSA-2022:1329
reference_id RHSA-2022:1329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1329
36
reference_url https://access.redhat.com/errata/RHSA-2022:1372
reference_id RHSA-2022:1372
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1372
37
reference_url https://access.redhat.com/errata/RHSA-2022:7954
reference_id RHSA-2022:7954
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7954
38
reference_url https://access.redhat.com/errata/RHSA-2024:2988
reference_id RHSA-2024:2988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2988
fixed_packages
0
url pkg:deb/debian/golang-1.15@1.15.9-6?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.9-6?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.9-6%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2021-34558
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ayxa-s9j4-k7hd
15
url VCID-bhax-mgs9-t3ga
vulnerability_id VCID-bhax-mgs9-t3ga
summary Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27918.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27918.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-27918
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.06549
published_at 2026-04-01T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.06613
published_at 2026-04-02T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06657
published_at 2026-04-04T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.06638
published_at 2026-04-07T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.06687
published_at 2026-04-08T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.06721
published_at 2026-04-09T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.0672
published_at 2026-04-11T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.06714
published_at 2026-04-12T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.06707
published_at 2026-04-13T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.06641
published_at 2026-04-16T12:55:00Z
10
value 0.00025
scoring_system epss
scoring_elements 0.06633
published_at 2026-04-18T12:55:00Z
11
value 0.00025
scoring_system epss
scoring_elements 0.06789
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-27918
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27918
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1937901
reference_id 1937901
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1937901
4
reference_url https://security.archlinux.org/AVG-1668
reference_id AVG-1668
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1668
5
reference_url https://security.gentoo.org/glsa/202208-02
reference_id GLSA-202208-02
reference_type
scores
url https://security.gentoo.org/glsa/202208-02
6
reference_url https://access.redhat.com/errata/RHSA-2021:2704
reference_id RHSA-2021:2704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2704
7
reference_url https://access.redhat.com/errata/RHSA-2021:2705
reference_id RHSA-2021:2705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2705
8
reference_url https://access.redhat.com/errata/RHSA-2021:3076
reference_id RHSA-2021:3076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3076
9
reference_url https://access.redhat.com/errata/RHSA-2021:3555
reference_id RHSA-2021:3555
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3555
10
reference_url https://access.redhat.com/errata/RHSA-2021:3556
reference_id RHSA-2021:3556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3556
fixed_packages
0
url pkg:deb/debian/golang-1.15@1.15.9-1?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.9-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.9-1%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2021-27918
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bhax-mgs9-t3ga
16
url VCID-ce67-xmrt-yfd1
vulnerability_id VCID-ce67-xmrt-yfd1
summary Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28367.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28367.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-28367
reference_id
reference_type
scores
0
value 0.00272
scoring_system epss
scoring_elements 0.50592
published_at 2026-04-01T12:55:00Z
1
value 0.00272
scoring_system epss
scoring_elements 0.50709
published_at 2026-04-21T12:55:00Z
2
value 0.00272
scoring_system epss
scoring_elements 0.50723
published_at 2026-04-16T12:55:00Z
3
value 0.00272
scoring_system epss
scoring_elements 0.50729
published_at 2026-04-18T12:55:00Z
4
value 0.00272
scoring_system epss
scoring_elements 0.50645
published_at 2026-04-02T12:55:00Z
5
value 0.00272
scoring_system epss
scoring_elements 0.50671
published_at 2026-04-04T12:55:00Z
6
value 0.00272
scoring_system epss
scoring_elements 0.50626
published_at 2026-04-07T12:55:00Z
7
value 0.00272
scoring_system epss
scoring_elements 0.50682
published_at 2026-04-13T12:55:00Z
8
value 0.00272
scoring_system epss
scoring_elements 0.50678
published_at 2026-04-09T12:55:00Z
9
value 0.00272
scoring_system epss
scoring_elements 0.5072
published_at 2026-04-11T12:55:00Z
10
value 0.00272
scoring_system epss
scoring_elements 0.50697
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-28367
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28367
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1897646
reference_id 1897646
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1897646
5
reference_url https://security.archlinux.org/ASA-202011-16
reference_id ASA-202011-16
reference_type
scores
url https://security.archlinux.org/ASA-202011-16
6
reference_url https://security.archlinux.org/AVG-1278
reference_id AVG-1278
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1278
7
reference_url https://security.gentoo.org/glsa/202208-02
reference_id GLSA-202208-02
reference_type
scores
url https://security.gentoo.org/glsa/202208-02
8
reference_url https://access.redhat.com/errata/RHSA-2020:5333
reference_id RHSA-2020:5333
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5333
9
reference_url https://access.redhat.com/errata/RHSA-2020:5493
reference_id RHSA-2020:5493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5493
10
reference_url https://access.redhat.com/errata/RHSA-2021:0145
reference_id RHSA-2021:0145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0145
11
reference_url https://access.redhat.com/errata/RHSA-2021:0146
reference_id RHSA-2021:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0146
fixed_packages
0
url pkg:deb/debian/golang-1.15@1.15.5-1?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.5-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.5-1%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2020-28367
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ce67-xmrt-yfd1
17
url VCID-cr7c-xuh8-guhy
vulnerability_id VCID-cr7c-xuh8-guhy
summary Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-31525.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-31525.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-31525
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.0591
published_at 2026-04-21T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.05765
published_at 2026-04-18T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.05758
published_at 2026-04-16T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.05793
published_at 2026-04-13T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.05799
published_at 2026-04-12T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.05808
published_at 2026-04-11T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.05829
published_at 2026-04-09T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.05804
published_at 2026-04-08T12:55:00Z
8
value 0.00022
scoring_system epss
scoring_elements 0.05766
published_at 2026-04-07T12:55:00Z
9
value 0.00022
scoring_system epss
scoring_elements 0.0577
published_at 2026-04-04T12:55:00Z
10
value 0.00022
scoring_system epss
scoring_elements 0.0573
published_at 2026-04-02T12:55:00Z
11
value 0.00022
scoring_system epss
scoring_elements 0.05695
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-31525
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31525
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31525
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/golang/go
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/golang/go
5
reference_url https://github.com/golang/go/issues/45710
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/golang/go/issues/45710
6
reference_url https://go.dev/cl/313069
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://go.dev/cl/313069
7
reference_url https://go.dev/issue/45710
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://go.dev/issue/45710
8
reference_url https://go.googlesource.com/net/+/89ef3d95e781148a0951956029c92a211477f7f9
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://go.googlesource.com/net/+/89ef3d95e781148a0951956029c92a211477f7f9
9
reference_url https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ISRZZ6NY5R2TBYE72KZFOCO25TEUQTBF
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ISRZZ6NY5R2TBYE72KZFOCO25TEUQTBF
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-31525
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-31525
12
reference_url https://pkg.go.dev/vuln/GO-2022-0236
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://pkg.go.dev/vuln/GO-2022-0236
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1958341
reference_id 1958341
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1958341
14
reference_url https://security.archlinux.org/AVG-1927
reference_id AVG-1927
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1927
15
reference_url https://security.gentoo.org/glsa/202208-02
reference_id GLSA-202208-02
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/202208-02
16
reference_url https://access.redhat.com/errata/RHSA-2021:2543
reference_id RHSA-2021:2543
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2543
17
reference_url https://access.redhat.com/errata/RHSA-2021:2704
reference_id RHSA-2021:2704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2704
18
reference_url https://access.redhat.com/errata/RHSA-2021:2705
reference_id RHSA-2021:2705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2705
19
reference_url https://access.redhat.com/errata/RHSA-2021:2983
reference_id RHSA-2021:2983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2983
20
reference_url https://access.redhat.com/errata/RHSA-2021:2984
reference_id RHSA-2021:2984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2984
21
reference_url https://access.redhat.com/errata/RHSA-2021:3076
reference_id RHSA-2021:3076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3076
22
reference_url https://access.redhat.com/errata/RHSA-2021:3248
reference_id RHSA-2021:3248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3248
23
reference_url https://access.redhat.com/errata/RHSA-2021:3487
reference_id RHSA-2021:3487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3487
24
reference_url https://access.redhat.com/errata/RHSA-2021:3555
reference_id RHSA-2021:3555
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3555
25
reference_url https://access.redhat.com/errata/RHSA-2021:3556
reference_id RHSA-2021:3556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3556
26
reference_url https://access.redhat.com/errata/RHSA-2021:3733
reference_id RHSA-2021:3733
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3733
27
reference_url https://access.redhat.com/errata/RHSA-2021:3748
reference_id RHSA-2021:3748
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3748
28
reference_url https://access.redhat.com/errata/RHSA-2021:3759
reference_id RHSA-2021:3759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3759
29
reference_url https://access.redhat.com/errata/RHSA-2021:4103
reference_id RHSA-2021:4103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4103
30
reference_url https://access.redhat.com/errata/RHSA-2021:4104
reference_id RHSA-2021:4104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4104
31
reference_url https://access.redhat.com/errata/RHSA-2021:5072
reference_id RHSA-2021:5072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5072
32
reference_url https://access.redhat.com/errata/RHSA-2022:0191
reference_id RHSA-2022:0191
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0191
33
reference_url https://access.redhat.com/errata/RHSA-2022:0308
reference_id RHSA-2022:0308
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0308
34
reference_url https://access.redhat.com/errata/RHSA-2022:0577
reference_id RHSA-2022:0577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0577
fixed_packages
0
url pkg:deb/debian/golang-1.15@1.15.9-2?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.9-2?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.9-2%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2021-31525, GHSA-h86h-8ppg-mxmh
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cr7c-xuh8-guhy
18
url VCID-dwge-3up7-yyaq
vulnerability_id VCID-dwge-3up7-yyaq
summary
Withdrawn Advisory: Infinite loop in xz
### Withdrawn Advisory
This advisory has been withdrawn because alerts cannot be issued for the Go standard library at this time.

### Original Description
Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16845.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16845.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-16845
reference_id
reference_type
scores
0
value 0.00147
scoring_system epss
scoring_elements 0.3517
published_at 2026-04-21T12:55:00Z
1
value 0.00147
scoring_system epss
scoring_elements 0.35194
published_at 2026-04-13T12:55:00Z
2
value 0.00147
scoring_system epss
scoring_elements 0.35218
published_at 2026-04-18T12:55:00Z
3
value 0.00147
scoring_system epss
scoring_elements 0.35253
published_at 2026-04-11T12:55:00Z
4
value 0.00147
scoring_system epss
scoring_elements 0.35249
published_at 2026-04-09T12:55:00Z
5
value 0.00147
scoring_system epss
scoring_elements 0.35224
published_at 2026-04-08T12:55:00Z
6
value 0.00147
scoring_system epss
scoring_elements 0.35179
published_at 2026-04-07T12:55:00Z
7
value 0.00147
scoring_system epss
scoring_elements 0.35298
published_at 2026-04-04T12:55:00Z
8
value 0.00147
scoring_system epss
scoring_elements 0.3527
published_at 2026-04-02T12:55:00Z
9
value 0.00147
scoring_system epss
scoring_elements 0.3507
published_at 2026-04-01T12:55:00Z
10
value 0.00147
scoring_system epss
scoring_elements 0.35232
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-16845
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15586
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7919
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3114
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b
12
reference_url https://github.com/ulikunitz/xz/issues/35
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/ulikunitz/xz/issues/35
13
reference_url https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo
14
reference_url https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q
15
reference_url https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html
16
reference_url https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-16845
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-16845
22
reference_url https://security.netapp.com/advisory/ntap-20200924-0002
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20200924-0002
23
reference_url https://www.debian.org/security/2021/dsa-4848
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2021/dsa-4848
24
reference_url https://www.oracle.com/security-alerts/cpuApr2021.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuApr2021.html
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1867099
reference_id 1867099
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1867099
26
reference_url https://access.redhat.com/errata/RHSA-2020:3665
reference_id RHSA-2020:3665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3665
27
reference_url https://access.redhat.com/errata/RHSA-2020:4201
reference_id RHSA-2020:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4201
28
reference_url https://access.redhat.com/errata/RHSA-2020:4214
reference_id RHSA-2020:4214
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4214
29
reference_url https://access.redhat.com/errata/RHSA-2020:4297
reference_id RHSA-2020:4297
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4297
30
reference_url https://access.redhat.com/errata/RHSA-2020:5118
reference_id RHSA-2020:5118
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5118
31
reference_url https://access.redhat.com/errata/RHSA-2020:5119
reference_id RHSA-2020:5119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5119
32
reference_url https://access.redhat.com/errata/RHSA-2020:5159
reference_id RHSA-2020:5159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5159
33
reference_url https://access.redhat.com/errata/RHSA-2020:5605
reference_id RHSA-2020:5605
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5605
34
reference_url https://access.redhat.com/errata/RHSA-2020:5606
reference_id RHSA-2020:5606
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5606
35
reference_url https://access.redhat.com/errata/RHSA-2020:5649
reference_id RHSA-2020:5649
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5649
36
reference_url https://access.redhat.com/errata/RHSA-2021:0072
reference_id RHSA-2021:0072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0072
37
reference_url https://access.redhat.com/errata/RHSA-2021:0172
reference_id RHSA-2021:0172
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0172
38
reference_url https://access.redhat.com/errata/RHSA-2021:0713
reference_id RHSA-2021:0713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0713
39
reference_url https://access.redhat.com/errata/RHSA-2021:0956
reference_id RHSA-2021:0956
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0956
40
reference_url https://access.redhat.com/errata/RHSA-2021:1016
reference_id RHSA-2021:1016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1016
41
reference_url https://access.redhat.com/errata/RHSA-2021:1366
reference_id RHSA-2021:1366
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1366
42
reference_url https://access.redhat.com/errata/RHSA-2021:1515
reference_id RHSA-2021:1515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1515
43
reference_url https://access.redhat.com/errata/RHSA-2021:2122
reference_id RHSA-2021:2122
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2122
44
reference_url https://access.redhat.com/errata/RHSA-2021:4103
reference_id RHSA-2021:4103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4103
45
reference_url https://usn.ubuntu.com/5725-1/
reference_id USN-5725-1
reference_type
scores
url https://usn.ubuntu.com/5725-1/
46
reference_url https://usn.ubuntu.com/5725-2/
reference_id USN-5725-2
reference_type
scores
url https://usn.ubuntu.com/5725-2/
fixed_packages
0
url pkg:deb/debian/golang-1.15@1.15~rc2-1?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15~rc2-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15~rc2-1%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2020-16845, GHSA-q6gq-997w-f55g
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dwge-3up7-yyaq
19
url VCID-gtys-5r5h-p7ht
vulnerability_id VCID-gtys-5r5h-p7ht
summary
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-33810.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-33810.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-33810
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01216
published_at 2026-04-16T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01389
published_at 2026-04-21T12:55:00Z
2
value 5e-05
scoring_system epss
scoring_elements 0.00212
published_at 2026-04-11T12:55:00Z
3
value 5e-05
scoring_system epss
scoring_elements 0.00211
published_at 2026-04-13T12:55:00Z
4
value 5e-05
scoring_system epss
scoring_elements 0.00276
published_at 2026-04-08T12:55:00Z
5
value 5e-05
scoring_system epss
scoring_elements 0.00274
published_at 2026-04-09T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.00967
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-33810
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU
reference_id 0uYbvbPZRWU
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-13T17:48:57Z/
url https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2456335
reference_id 2456335
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2456335
5
reference_url https://go.dev/cl/763763
reference_id 763763
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-13T17:48:57Z/
url https://go.dev/cl/763763
6
reference_url https://go.dev/issue/78332
reference_id 78332
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-13T17:48:57Z/
url https://go.dev/issue/78332
7
reference_url https://pkg.go.dev/vuln/GO-2026-4866
reference_id GO-2026-4866
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-13T17:48:57Z/
url https://pkg.go.dev/vuln/GO-2026-4866
8
reference_url https://access.redhat.com/errata/RHSA-2026:10155
reference_id RHSA-2026:10155
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10155
9
reference_url https://access.redhat.com/errata/RHSA-2026:10158
reference_id RHSA-2026:10158
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10158
10
reference_url https://access.redhat.com/errata/RHSA-2026:9385
reference_id RHSA-2026:9385
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9385
fixed_packages
0
url pkg:deb/debian/golang-1.15@0?distro=bullseye
purl pkg:deb/debian/golang-1.15@0?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2026-33810
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gtys-5r5h-p7ht
20
url VCID-h2xu-3fm4-hkap
vulnerability_id VCID-h2xu-3fm4-hkap
summary On Darwin, building a Go module which contains CGO can trigger arbitrary code execution when using the Apple version of ld, due to usage of the -lto_library flag in a "#cgo LDFLAGS" directive.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-24787
reference_id
reference_type
scores
0
value 0.02711
scoring_system epss
scoring_elements 0.85854
published_at 2026-04-02T12:55:00Z
1
value 0.02711
scoring_system epss
scoring_elements 0.85924
published_at 2026-04-21T12:55:00Z
2
value 0.02711
scoring_system epss
scoring_elements 0.85933
published_at 2026-04-18T12:55:00Z
3
value 0.02711
scoring_system epss
scoring_elements 0.85928
published_at 2026-04-16T12:55:00Z
4
value 0.02711
scoring_system epss
scoring_elements 0.8591
published_at 2026-04-13T12:55:00Z
5
value 0.02711
scoring_system epss
scoring_elements 0.85916
published_at 2026-04-12T12:55:00Z
6
value 0.02711
scoring_system epss
scoring_elements 0.85918
published_at 2026-04-11T12:55:00Z
7
value 0.02711
scoring_system epss
scoring_elements 0.85904
published_at 2026-04-09T12:55:00Z
8
value 0.02711
scoring_system epss
scoring_elements 0.85894
published_at 2026-04-08T12:55:00Z
9
value 0.02711
scoring_system epss
scoring_elements 0.85875
published_at 2026-04-07T12:55:00Z
10
value 0.02711
scoring_system epss
scoring_elements 0.85871
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-24787
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url http://www.openwall.com/lists/oss-security/2024/05/08/3
reference_id 3
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-05T14:49:29Z/
url http://www.openwall.com/lists/oss-security/2024/05/08/3
3
reference_url https://go.dev/cl/583815
reference_id 583815
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-05T14:49:29Z/
url https://go.dev/cl/583815
4
reference_url https://go.dev/issue/67119
reference_id 67119
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-05T14:49:29Z/
url https://go.dev/issue/67119
5
reference_url https://pkg.go.dev/vuln/GO-2024-2825
reference_id GO-2024-2825
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-05T14:49:29Z/
url https://pkg.go.dev/vuln/GO-2024-2825
6
reference_url https://security.netapp.com/advisory/ntap-20240531-0006/
reference_id ntap-20240531-0006
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-05T14:49:29Z/
url https://security.netapp.com/advisory/ntap-20240531-0006/
7
reference_url https://groups.google.com/g/golang-announce/c/wkkO4P9stm0
reference_id wkkO4P9stm0
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-05T14:49:29Z/
url https://groups.google.com/g/golang-announce/c/wkkO4P9stm0
fixed_packages
0
url pkg:deb/debian/golang-1.15@0?distro=bullseye
purl pkg:deb/debian/golang-1.15@0?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2024-24787
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h2xu-3fm4-hkap
21
url VCID-h3bw-m2us-cbgz
vulnerability_id VCID-h3bw-m2us-cbgz
summary Multiple vulnerabilities have been discovered in Go, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32190.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32190.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32190
reference_id
reference_type
scores
0
value 0.00085
scoring_system epss
scoring_elements 0.24613
published_at 2026-04-21T12:55:00Z
1
value 0.00173
scoring_system epss
scoring_elements 0.38696
published_at 2026-04-02T12:55:00Z
2
value 0.00173
scoring_system epss
scoring_elements 0.38718
published_at 2026-04-04T12:55:00Z
3
value 0.00173
scoring_system epss
scoring_elements 0.38647
published_at 2026-04-07T12:55:00Z
4
value 0.00173
scoring_system epss
scoring_elements 0.38698
published_at 2026-04-08T12:55:00Z
5
value 0.00173
scoring_system epss
scoring_elements 0.38708
published_at 2026-04-09T12:55:00Z
6
value 0.00173
scoring_system epss
scoring_elements 0.38719
published_at 2026-04-11T12:55:00Z
7
value 0.00173
scoring_system epss
scoring_elements 0.38681
published_at 2026-04-12T12:55:00Z
8
value 0.00173
scoring_system epss
scoring_elements 0.38655
published_at 2026-04-13T12:55:00Z
9
value 0.00173
scoring_system epss
scoring_elements 0.38702
published_at 2026-04-16T12:55:00Z
10
value 0.00173
scoring_system epss
scoring_elements 0.3868
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32190
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2124668
reference_id 2124668
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2124668
4
reference_url https://security.gentoo.org/glsa/202209-26
reference_id GLSA-202209-26
reference_type
scores
url https://security.gentoo.org/glsa/202209-26
5
reference_url https://access.redhat.com/errata/RHSA-2022:7398
reference_id RHSA-2022:7398
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7398
6
reference_url https://access.redhat.com/errata/RHSA-2022:7399
reference_id RHSA-2022:7399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7399
7
reference_url https://access.redhat.com/errata/RHSA-2022:8634
reference_id RHSA-2022:8634
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8634
8
reference_url https://access.redhat.com/errata/RHSA-2023:0264
reference_id RHSA-2023:0264
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0264
9
reference_url https://access.redhat.com/errata/RHSA-2023:0584
reference_id RHSA-2023:0584
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0584
10
reference_url https://access.redhat.com/errata/RHSA-2023:0693
reference_id RHSA-2023:0693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0693
11
reference_url https://access.redhat.com/errata/RHSA-2023:3204
reference_id RHSA-2023:3204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3204
12
reference_url https://access.redhat.com/errata/RHSA-2023:3205
reference_id RHSA-2023:3205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3205
13
reference_url https://access.redhat.com/errata/RHSA-2023:3613
reference_id RHSA-2023:3613
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3613
14
reference_url https://access.redhat.com/errata/RHSA-2023:3642
reference_id RHSA-2023:3642
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3642
15
reference_url https://access.redhat.com/errata/RHSA-2023:3742
reference_id RHSA-2023:3742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3742
16
reference_url https://access.redhat.com/errata/RHSA-2024:0485
reference_id RHSA-2024:0485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0485
fixed_packages
0
url pkg:deb/debian/golang-1.15@0?distro=bullseye
purl pkg:deb/debian/golang-1.15@0?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2022-32190
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h3bw-m2us-cbgz
22
url VCID-j7b3-yz47-pbdp
vulnerability_id VCID-j7b3-yz47-pbdp
summary Infinite loop in Read in crypto/rand before Go 1.17.11 and Go 1.18.3 on Windows allows attacker to cause an indefinite hang by passing a buffer larger than 1 << 32 - 1 bytes.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-30634
reference_id
reference_type
scores
0
value 0.00079
scoring_system epss
scoring_elements 0.2343
published_at 2026-04-21T12:55:00Z
1
value 0.00079
scoring_system epss
scoring_elements 0.23586
published_at 2026-04-02T12:55:00Z
2
value 0.00079
scoring_system epss
scoring_elements 0.23623
published_at 2026-04-04T12:55:00Z
3
value 0.00079
scoring_system epss
scoring_elements 0.23401
published_at 2026-04-07T12:55:00Z
4
value 0.00079
scoring_system epss
scoring_elements 0.23473
published_at 2026-04-08T12:55:00Z
5
value 0.00079
scoring_system epss
scoring_elements 0.23522
published_at 2026-04-09T12:55:00Z
6
value 0.00079
scoring_system epss
scoring_elements 0.23539
published_at 2026-04-11T12:55:00Z
7
value 0.00079
scoring_system epss
scoring_elements 0.23498
published_at 2026-04-12T12:55:00Z
8
value 0.00079
scoring_system epss
scoring_elements 0.23444
published_at 2026-04-13T12:55:00Z
9
value 0.00079
scoring_system epss
scoring_elements 0.2346
published_at 2026-04-16T12:55:00Z
10
value 0.00079
scoring_system epss
scoring_elements 0.23452
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-30634
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/golang-1.15@0?distro=bullseye
purl pkg:deb/debian/golang-1.15@0?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2022-30634
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j7b3-yz47-pbdp
23
url VCID-jsz8-cdt5-27f6
vulnerability_id VCID-jsz8-cdt5-27f6
summary crypto/x509: Usage of ExtKeyUsageAny disables policy validation in crypto/x509
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-22874.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-22874.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-22874
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.06899
published_at 2026-04-02T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.06949
published_at 2026-04-04T12:55:00Z
2
value 0.00076
scoring_system epss
scoring_elements 0.22701
published_at 2026-04-21T12:55:00Z
3
value 0.00076
scoring_system epss
scoring_elements 0.22676
published_at 2026-04-07T12:55:00Z
4
value 0.00076
scoring_system epss
scoring_elements 0.22752
published_at 2026-04-08T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.22803
published_at 2026-04-09T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.22825
published_at 2026-04-11T12:55:00Z
7
value 0.00076
scoring_system epss
scoring_elements 0.22787
published_at 2026-04-12T12:55:00Z
8
value 0.00076
scoring_system epss
scoring_elements 0.22731
published_at 2026-04-13T12:55:00Z
9
value 0.00076
scoring_system epss
scoring_elements 0.22747
published_at 2026-04-16T12:55:00Z
10
value 0.00076
scoring_system epss
scoring_elements 0.22742
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-22874
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107364
reference_id 1107364
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107364
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2372320
reference_id 2372320
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2372320
5
reference_url https://go.dev/cl/670375
reference_id 670375
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-11T17:45:40Z/
url https://go.dev/cl/670375
6
reference_url https://go.dev/issue/73612
reference_id 73612
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-11T17:45:40Z/
url https://go.dev/issue/73612
7
reference_url https://security.archlinux.org/ASA-202506-4
reference_id ASA-202506-4
reference_type
scores
url https://security.archlinux.org/ASA-202506-4
8
reference_url https://security.archlinux.org/AVG-2896
reference_id AVG-2896
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2896
9
reference_url https://pkg.go.dev/vuln/GO-2025-3749
reference_id GO-2025-3749
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-11T17:45:40Z/
url https://pkg.go.dev/vuln/GO-2025-3749
10
reference_url https://access.redhat.com/errata/RHSA-2025:10676
reference_id RHSA-2025:10676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10676
11
reference_url https://access.redhat.com/errata/RHSA-2025:10677
reference_id RHSA-2025:10677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10677
12
reference_url https://access.redhat.com/errata/RHSA-2025:13931
reference_id RHSA-2025:13931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13931
13
reference_url https://access.redhat.com/errata/RHSA-2025:13932
reference_id RHSA-2025:13932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13932
14
reference_url https://access.redhat.com/errata/RHSA-2025:14470
reference_id RHSA-2025:14470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14470
15
reference_url https://access.redhat.com/errata/RHSA-2025:14472
reference_id RHSA-2025:14472
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14472
16
reference_url https://access.redhat.com/errata/RHSA-2025:14473
reference_id RHSA-2025:14473
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14473
17
reference_url https://access.redhat.com/errata/RHSA-2025:14476
reference_id RHSA-2025:14476
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14476
18
reference_url https://access.redhat.com/errata/RHSA-2025:14479
reference_id RHSA-2025:14479
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14479
19
reference_url https://access.redhat.com/errata/RHSA-2025:14481
reference_id RHSA-2025:14481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14481
20
reference_url https://access.redhat.com/errata/RHSA-2025:14484
reference_id RHSA-2025:14484
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14484
21
reference_url https://access.redhat.com/errata/RHSA-2025:17043
reference_id RHSA-2025:17043
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17043
22
reference_url https://access.redhat.com/errata/RHSA-2025:17730
reference_id RHSA-2025:17730
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17730
23
reference_url https://access.redhat.com/errata/RHSA-2025:17731
reference_id RHSA-2025:17731
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17731
24
reference_url https://access.redhat.com/errata/RHSA-2025:19003
reference_id RHSA-2025:19003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19003
25
reference_url https://access.redhat.com/errata/RHSA-2025:19890
reference_id RHSA-2025:19890
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19890
26
reference_url https://groups.google.com/g/golang-announce/c/ufZ8WpEsA3A
reference_id ufZ8WpEsA3A
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-11T17:45:40Z/
url https://groups.google.com/g/golang-announce/c/ufZ8WpEsA3A
fixed_packages
0
url pkg:deb/debian/golang-1.15@0?distro=bullseye
purl pkg:deb/debian/golang-1.15@0?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2025-22874
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jsz8-cdt5-27f6
24
url VCID-kd6v-aemf-3khm
vulnerability_id VCID-kd6v-aemf-3khm
summary Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33196.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33196.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-33196
reference_id
reference_type
scores
0
value 0.00054
scoring_system epss
scoring_elements 0.16901
published_at 2026-04-21T12:55:00Z
1
value 0.00056
scoring_system epss
scoring_elements 0.17517
published_at 2026-04-01T12:55:00Z
2
value 0.00056
scoring_system epss
scoring_elements 0.17458
published_at 2026-04-16T12:55:00Z
3
value 0.00056
scoring_system epss
scoring_elements 0.17467
published_at 2026-04-18T12:55:00Z
4
value 0.00056
scoring_system epss
scoring_elements 0.1768
published_at 2026-04-02T12:55:00Z
5
value 0.00056
scoring_system epss
scoring_elements 0.17725
published_at 2026-04-04T12:55:00Z
6
value 0.00056
scoring_system epss
scoring_elements 0.17445
published_at 2026-04-07T12:55:00Z
7
value 0.00056
scoring_system epss
scoring_elements 0.17536
published_at 2026-04-08T12:55:00Z
8
value 0.00056
scoring_system epss
scoring_elements 0.17595
published_at 2026-04-09T12:55:00Z
9
value 0.00056
scoring_system epss
scoring_elements 0.17613
published_at 2026-04-11T12:55:00Z
10
value 0.00056
scoring_system epss
scoring_elements 0.17566
published_at 2026-04-12T12:55:00Z
11
value 0.00056
scoring_system epss
scoring_elements 0.17514
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-33196
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33196
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1965503
reference_id 1965503
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1965503
5
reference_url https://security.archlinux.org/ASA-202106-42
reference_id ASA-202106-42
reference_type
scores
url https://security.archlinux.org/ASA-202106-42
6
reference_url https://security.archlinux.org/AVG-2006
reference_id AVG-2006
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2006
7
reference_url https://security.gentoo.org/glsa/202208-02
reference_id GLSA-202208-02
reference_type
scores
url https://security.gentoo.org/glsa/202208-02
8
reference_url https://access.redhat.com/errata/RHSA-2021:2634
reference_id RHSA-2021:2634
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2634
9
reference_url https://access.redhat.com/errata/RHSA-2021:2704
reference_id RHSA-2021:2704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2704
10
reference_url https://access.redhat.com/errata/RHSA-2021:2705
reference_id RHSA-2021:2705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2705
11
reference_url https://access.redhat.com/errata/RHSA-2021:2983
reference_id RHSA-2021:2983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2983
12
reference_url https://access.redhat.com/errata/RHSA-2021:2984
reference_id RHSA-2021:2984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2984
13
reference_url https://access.redhat.com/errata/RHSA-2021:3076
reference_id RHSA-2021:3076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3076
14
reference_url https://access.redhat.com/errata/RHSA-2021:3229
reference_id RHSA-2021:3229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3229
15
reference_url https://access.redhat.com/errata/RHSA-2021:3361
reference_id RHSA-2021:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3361
16
reference_url https://access.redhat.com/errata/RHSA-2021:3555
reference_id RHSA-2021:3555
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3555
17
reference_url https://access.redhat.com/errata/RHSA-2021:3556
reference_id RHSA-2021:3556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3556
18
reference_url https://access.redhat.com/errata/RHSA-2021:3758
reference_id RHSA-2021:3758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3758
fixed_packages
0
url pkg:deb/debian/golang-1.15@1.15.9-4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.9-4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.9-4%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2021-33196
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kd6v-aemf-3khm
25
url VCID-kjf2-r6zt-zqg9
vulnerability_id VCID-kjf2-r6zt-zqg9
summary net/http: CrossOriginProtection bypass in net/http
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47910.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47910.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-47910
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01189
published_at 2026-04-02T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01204
published_at 2026-04-07T12:55:00Z
2
value 0.00011
scoring_system epss
scoring_elements 0.01195
published_at 2026-04-04T12:55:00Z
3
value 0.00011
scoring_system epss
scoring_elements 0.01186
published_at 2026-04-16T12:55:00Z
4
value 0.00011
scoring_system epss
scoring_elements 0.01197
published_at 2026-04-13T12:55:00Z
5
value 0.00011
scoring_system epss
scoring_elements 0.01194
published_at 2026-04-12T12:55:00Z
6
value 0.00011
scoring_system epss
scoring_elements 0.012
published_at 2026-04-11T12:55:00Z
7
value 0.00011
scoring_system epss
scoring_elements 0.01214
published_at 2026-04-09T12:55:00Z
8
value 0.00011
scoring_system epss
scoring_elements 0.01211
published_at 2026-04-08T12:55:00Z
9
value 0.00012
scoring_system epss
scoring_elements 0.01641
published_at 2026-04-18T12:55:00Z
10
value 0.00013
scoring_system epss
scoring_elements 0.02183
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-47910
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1116341
reference_id 1116341
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1116341
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2397528
reference_id 2397528
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2397528
5
reference_url https://go.dev/cl/699275
reference_id 699275
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-24T13:29:38Z/
url https://go.dev/cl/699275
6
reference_url https://go.dev/issue/75054
reference_id 75054
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-24T13:29:38Z/
url https://go.dev/issue/75054
7
reference_url https://groups.google.com/g/golang-announce/c/PtW9VW21NPs/m/DJhMQ-m5AQAJ
reference_id DJhMQ-m5AQAJ
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-24T13:29:38Z/
url https://groups.google.com/g/golang-announce/c/PtW9VW21NPs/m/DJhMQ-m5AQAJ
8
reference_url https://pkg.go.dev/vuln/GO-2025-3955
reference_id GO-2025-3955
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-24T13:29:38Z/
url https://pkg.go.dev/vuln/GO-2025-3955
fixed_packages
0
url pkg:deb/debian/golang-1.15@0?distro=bullseye
purl pkg:deb/debian/golang-1.15@0?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2025-47910
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kjf2-r6zt-zqg9
26
url VCID-kysh-ukcw-tbcj
vulnerability_id VCID-kysh-ukcw-tbcj
summary Incorrect conversion of certain invalid paths to valid, absolute paths in Clean in path/filepath before Go 1.17.11 and Go 1.18.3 on Windows allows potential directory traversal attack.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-29804
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15352
published_at 2026-04-21T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.15512
published_at 2026-04-02T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15582
published_at 2026-04-04T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15382
published_at 2026-04-07T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.1547
published_at 2026-04-08T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.1552
published_at 2026-04-09T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15485
published_at 2026-04-11T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15446
published_at 2026-04-12T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15381
published_at 2026-04-13T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.153
published_at 2026-04-16T12:55:00Z
10
value 0.0005
scoring_system epss
scoring_elements 0.15305
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-29804
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/golang-1.15@0?distro=bullseye
purl pkg:deb/debian/golang-1.15@0?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2022-29804
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kysh-ukcw-tbcj
27
url VCID-ncjz-1n22-vuax
vulnerability_id VCID-ncjz-1n22-vuax
summary golang: math/big: panic during recursive division of very large numbers
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28362.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28362.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-28362
reference_id
reference_type
scores
0
value 0.00163
scoring_system epss
scoring_elements 0.37136
published_at 2026-04-01T12:55:00Z
1
value 0.00163
scoring_system epss
scoring_elements 0.37145
published_at 2026-04-21T12:55:00Z
2
value 0.00163
scoring_system epss
scoring_elements 0.37218
published_at 2026-04-16T12:55:00Z
3
value 0.00163
scoring_system epss
scoring_elements 0.37201
published_at 2026-04-18T12:55:00Z
4
value 0.00163
scoring_system epss
scoring_elements 0.37302
published_at 2026-04-02T12:55:00Z
5
value 0.00163
scoring_system epss
scoring_elements 0.37329
published_at 2026-04-04T12:55:00Z
6
value 0.00163
scoring_system epss
scoring_elements 0.37156
published_at 2026-04-07T12:55:00Z
7
value 0.00163
scoring_system epss
scoring_elements 0.37207
published_at 2026-04-08T12:55:00Z
8
value 0.00163
scoring_system epss
scoring_elements 0.37222
published_at 2026-04-09T12:55:00Z
9
value 0.00163
scoring_system epss
scoring_elements 0.37232
published_at 2026-04-11T12:55:00Z
10
value 0.00163
scoring_system epss
scoring_elements 0.37198
published_at 2026-04-12T12:55:00Z
11
value 0.00163
scoring_system epss
scoring_elements 0.37172
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-28362
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28362
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1897635
reference_id 1897635
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1897635
5
reference_url https://security.archlinux.org/ASA-202011-16
reference_id ASA-202011-16
reference_type
scores
url https://security.archlinux.org/ASA-202011-16
6
reference_url https://security.archlinux.org/AVG-1278
reference_id AVG-1278
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1278
7
reference_url https://access.redhat.com/errata/RHSA-2020:5333
reference_id RHSA-2020:5333
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5333
8
reference_url https://access.redhat.com/errata/RHSA-2020:5493
reference_id RHSA-2020:5493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5493
9
reference_url https://access.redhat.com/errata/RHSA-2020:5633
reference_id RHSA-2020:5633
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5633
10
reference_url https://access.redhat.com/errata/RHSA-2021:0037
reference_id RHSA-2021:0037
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0037
11
reference_url https://access.redhat.com/errata/RHSA-2021:0038
reference_id RHSA-2021:0038
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0038
12
reference_url https://access.redhat.com/errata/RHSA-2021:0039
reference_id RHSA-2021:0039
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0039
13
reference_url https://access.redhat.com/errata/RHSA-2021:0145
reference_id RHSA-2021:0145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0145
14
reference_url https://access.redhat.com/errata/RHSA-2021:0146
reference_id RHSA-2021:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0146
15
reference_url https://access.redhat.com/errata/RHSA-2021:0172
reference_id RHSA-2021:0172
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0172
16
reference_url https://access.redhat.com/errata/RHSA-2021:0436
reference_id RHSA-2021:0436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0436
17
reference_url https://access.redhat.com/errata/RHSA-2021:0568
reference_id RHSA-2021:0568
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0568
18
reference_url https://access.redhat.com/errata/RHSA-2021:0706
reference_id RHSA-2021:0706
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0706
19
reference_url https://access.redhat.com/errata/RHSA-2021:0799
reference_id RHSA-2021:0799
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0799
20
reference_url https://access.redhat.com/errata/RHSA-2021:0956
reference_id RHSA-2021:0956
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0956
21
reference_url https://access.redhat.com/errata/RHSA-2021:1366
reference_id RHSA-2021:1366
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1366
22
reference_url https://access.redhat.com/errata/RHSA-2021:1551
reference_id RHSA-2021:1551
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1551
23
reference_url https://access.redhat.com/errata/RHSA-2021:2041
reference_id RHSA-2021:2041
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2041
24
reference_url https://access.redhat.com/errata/RHSA-2021:2042
reference_id RHSA-2021:2042
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2042
25
reference_url https://access.redhat.com/errata/RHSA-2021:2532
reference_id RHSA-2021:2532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2532
26
reference_url https://access.redhat.com/errata/RHSA-2021:2543
reference_id RHSA-2021:2543
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2543
fixed_packages
0
url pkg:deb/debian/golang-1.15@1.15.5-1?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.5-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.5-1%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2020-28362
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ncjz-1n22-vuax
28
url VCID-njxh-yaq5-gbf8
vulnerability_id VCID-njxh-yaq5-gbf8
summary In Go before 1.13.13 and 1.14.x before 1.14.5, Certificate.Verify may lack a check on the VerifyOptions.KeyUsages EKU requirements (if VerifyOptions.Roots equals nil and the installation is on Windows). Thus, X.509 certificate verification is incomplete.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14039
reference_id
reference_type
scores
0
value 0.00431
scoring_system epss
scoring_elements 0.62512
published_at 2026-04-01T12:55:00Z
1
value 0.00431
scoring_system epss
scoring_elements 0.6257
published_at 2026-04-02T12:55:00Z
2
value 0.00431
scoring_system epss
scoring_elements 0.62603
published_at 2026-04-04T12:55:00Z
3
value 0.00431
scoring_system epss
scoring_elements 0.62569
published_at 2026-04-07T12:55:00Z
4
value 0.00431
scoring_system epss
scoring_elements 0.62619
published_at 2026-04-08T12:55:00Z
5
value 0.00431
scoring_system epss
scoring_elements 0.62635
published_at 2026-04-09T12:55:00Z
6
value 0.00431
scoring_system epss
scoring_elements 0.62653
published_at 2026-04-11T12:55:00Z
7
value 0.00431
scoring_system epss
scoring_elements 0.62642
published_at 2026-04-12T12:55:00Z
8
value 0.00431
scoring_system epss
scoring_elements 0.62618
published_at 2026-04-13T12:55:00Z
9
value 0.00431
scoring_system epss
scoring_elements 0.6266
published_at 2026-04-16T12:55:00Z
10
value 0.00431
scoring_system epss
scoring_elements 0.62667
published_at 2026-04-18T12:55:00Z
11
value 0.00431
scoring_system epss
scoring_elements 0.62649
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14039
fixed_packages
0
url pkg:deb/debian/golang-1.15@0?distro=bullseye
purl pkg:deb/debian/golang-1.15@0?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2020-14039
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-njxh-yaq5-gbf8
29
url VCID-nwsd-53hk-ffhr
vulnerability_id VCID-nwsd-53hk-ffhr
summary crypto/x509: ParsePKCS1PrivateKey panic with partial keys in crypto/x509
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-22865.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-22865.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-22865
reference_id
reference_type
scores
0
value 0.00074
scoring_system epss
scoring_elements 0.22507
published_at 2026-04-02T12:55:00Z
1
value 0.00074
scoring_system epss
scoring_elements 0.22364
published_at 2026-04-21T12:55:00Z
2
value 0.00074
scoring_system epss
scoring_elements 0.2255
published_at 2026-04-04T12:55:00Z
3
value 0.00074
scoring_system epss
scoring_elements 0.22339
published_at 2026-04-07T12:55:00Z
4
value 0.00074
scoring_system epss
scoring_elements 0.22421
published_at 2026-04-08T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.22475
published_at 2026-04-09T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22495
published_at 2026-04-11T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.22453
published_at 2026-04-12T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22398
published_at 2026-04-13T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.22416
published_at 2026-04-16T12:55:00Z
10
value 0.00074
scoring_system epss
scoring_elements 0.22414
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-22865
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2342464
reference_id 2342464
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2342464
4
reference_url https://go.dev/cl/643098
reference_id 643098
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-28T14:58:11Z/
url https://go.dev/cl/643098
5
reference_url https://go.dev/issue/71216
reference_id 71216
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-28T14:58:11Z/
url https://go.dev/issue/71216
6
reference_url https://groups.google.com/g/golang-dev/c/CAWXhan3Jww/m/bk9LAa-lCgAJ
reference_id bk9LAa-lCgAJ
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-28T14:58:11Z/
url https://groups.google.com/g/golang-dev/c/CAWXhan3Jww/m/bk9LAa-lCgAJ
7
reference_url https://pkg.go.dev/vuln/GO-2025-3421
reference_id GO-2025-3421
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-28T14:58:11Z/
url https://pkg.go.dev/vuln/GO-2025-3421
8
reference_url https://access.redhat.com/errata/RHSA-2025:11749
reference_id RHSA-2025:11749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:11749
9
reference_url https://access.redhat.com/errata/RHSA-2025:11889
reference_id RHSA-2025:11889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:11889
fixed_packages
0
url pkg:deb/debian/golang-1.15@0?distro=bullseye
purl pkg:deb/debian/golang-1.15@0?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2025-22865
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nwsd-53hk-ffhr
30
url VCID-pcez-y67t-8yg3
vulnerability_id VCID-pcez-y67t-8yg3
summary net/url: Incorrect parsing of IPv6 host literals in net/url
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-25679.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-25679.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-25679
reference_id
reference_type
scores
0
value 0.00031
scoring_system epss
scoring_elements 0.08768
published_at 2026-04-02T12:55:00Z
1
value 0.00031
scoring_system epss
scoring_elements 0.08816
published_at 2026-04-04T12:55:00Z
2
value 0.00033
scoring_system epss
scoring_elements 0.09754
published_at 2026-04-13T12:55:00Z
3
value 0.00033
scoring_system epss
scoring_elements 0.09771
published_at 2026-04-12T12:55:00Z
4
value 0.00033
scoring_system epss
scoring_elements 0.09802
published_at 2026-04-11T12:55:00Z
5
value 0.00033
scoring_system epss
scoring_elements 0.09793
published_at 2026-04-09T12:55:00Z
6
value 0.00033
scoring_system epss
scoring_elements 0.09743
published_at 2026-04-08T12:55:00Z
7
value 0.00033
scoring_system epss
scoring_elements 0.09672
published_at 2026-04-07T12:55:00Z
8
value 0.00033
scoring_system epss
scoring_elements 0.09612
published_at 2026-04-18T12:55:00Z
9
value 0.00033
scoring_system epss
scoring_elements 0.0964
published_at 2026-04-16T12:55:00Z
10
value 0.00051
scoring_system epss
scoring_elements 0.15881
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-25679
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2445356
reference_id 2445356
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2445356
4
reference_url https://go.dev/cl/752180
reference_id 752180
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-10T13:36:26Z/
url https://go.dev/cl/752180
5
reference_url https://go.dev/issue/77578
reference_id 77578
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-10T13:36:26Z/
url https://go.dev/issue/77578
6
reference_url https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk
reference_id EdhZqrQ98hk
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-10T13:36:26Z/
url https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk
7
reference_url https://pkg.go.dev/vuln/GO-2026-4601
reference_id GO-2026-4601
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-10T13:36:26Z/
url https://pkg.go.dev/vuln/GO-2026-4601
8
reference_url https://access.redhat.com/errata/RHSA-2026:10065
reference_id RHSA-2026:10065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10065
9
reference_url https://access.redhat.com/errata/RHSA-2026:10125
reference_id RHSA-2026:10125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10125
10
reference_url https://access.redhat.com/errata/RHSA-2026:10133
reference_id RHSA-2026:10133
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10133
11
reference_url https://access.redhat.com/errata/RHSA-2026:10140
reference_id RHSA-2026:10140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10140
12
reference_url https://access.redhat.com/errata/RHSA-2026:10141
reference_id RHSA-2026:10141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10141
13
reference_url https://access.redhat.com/errata/RHSA-2026:10158
reference_id RHSA-2026:10158
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10158
14
reference_url https://access.redhat.com/errata/RHSA-2026:10169
reference_id RHSA-2026:10169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10169
15
reference_url https://access.redhat.com/errata/RHSA-2026:10175
reference_id RHSA-2026:10175
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10175
16
reference_url https://access.redhat.com/errata/RHSA-2026:10184
reference_id RHSA-2026:10184
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10184
17
reference_url https://access.redhat.com/errata/RHSA-2026:10225
reference_id RHSA-2026:10225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10225
18
reference_url https://access.redhat.com/errata/RHSA-2026:10250
reference_id RHSA-2026:10250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10250
19
reference_url https://access.redhat.com/errata/RHSA-2026:5110
reference_id RHSA-2026:5110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5110
20
reference_url https://access.redhat.com/errata/RHSA-2026:5549
reference_id RHSA-2026:5549
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5549
21
reference_url https://access.redhat.com/errata/RHSA-2026:5941
reference_id RHSA-2026:5941
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5941
22
reference_url https://access.redhat.com/errata/RHSA-2026:5942
reference_id RHSA-2026:5942
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5942
23
reference_url https://access.redhat.com/errata/RHSA-2026:5943
reference_id RHSA-2026:5943
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5943
24
reference_url https://access.redhat.com/errata/RHSA-2026:5944
reference_id RHSA-2026:5944
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5944
25
reference_url https://access.redhat.com/errata/RHSA-2026:6341
reference_id RHSA-2026:6341
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6341
26
reference_url https://access.redhat.com/errata/RHSA-2026:6344
reference_id RHSA-2026:6344
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6344
27
reference_url https://access.redhat.com/errata/RHSA-2026:6382
reference_id RHSA-2026:6382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6382
28
reference_url https://access.redhat.com/errata/RHSA-2026:6383
reference_id RHSA-2026:6383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6383
29
reference_url https://access.redhat.com/errata/RHSA-2026:6388
reference_id RHSA-2026:6388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6388
30
reference_url https://access.redhat.com/errata/RHSA-2026:6564
reference_id RHSA-2026:6564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6564
31
reference_url https://access.redhat.com/errata/RHSA-2026:6720
reference_id RHSA-2026:6720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6720
32
reference_url https://access.redhat.com/errata/RHSA-2026:6802
reference_id RHSA-2026:6802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6802
33
reference_url https://access.redhat.com/errata/RHSA-2026:6949
reference_id RHSA-2026:6949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6949
34
reference_url https://access.redhat.com/errata/RHSA-2026:7005
reference_id RHSA-2026:7005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7005
35
reference_url https://access.redhat.com/errata/RHSA-2026:7009
reference_id RHSA-2026:7009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7009
36
reference_url https://access.redhat.com/errata/RHSA-2026:7011
reference_id RHSA-2026:7011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7011
37
reference_url https://access.redhat.com/errata/RHSA-2026:7259
reference_id RHSA-2026:7259
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7259
38
reference_url https://access.redhat.com/errata/RHSA-2026:7315
reference_id RHSA-2026:7315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7315
39
reference_url https://access.redhat.com/errata/RHSA-2026:7328
reference_id RHSA-2026:7328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7328
40
reference_url https://access.redhat.com/errata/RHSA-2026:7665
reference_id RHSA-2026:7665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7665
41
reference_url https://access.redhat.com/errata/RHSA-2026:7669
reference_id RHSA-2026:7669
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7669
42
reference_url https://access.redhat.com/errata/RHSA-2026:7674
reference_id RHSA-2026:7674
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7674
43
reference_url https://access.redhat.com/errata/RHSA-2026:7833
reference_id RHSA-2026:7833
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7833
44
reference_url https://access.redhat.com/errata/RHSA-2026:7834
reference_id RHSA-2026:7834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7834
45
reference_url https://access.redhat.com/errata/RHSA-2026:7876
reference_id RHSA-2026:7876
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7876
46
reference_url https://access.redhat.com/errata/RHSA-2026:7877
reference_id RHSA-2026:7877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7877
47
reference_url https://access.redhat.com/errata/RHSA-2026:7878
reference_id RHSA-2026:7878
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7878
48
reference_url https://access.redhat.com/errata/RHSA-2026:7879
reference_id RHSA-2026:7879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7879
49
reference_url https://access.redhat.com/errata/RHSA-2026:7883
reference_id RHSA-2026:7883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7883
50
reference_url https://access.redhat.com/errata/RHSA-2026:7992
reference_id RHSA-2026:7992
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7992
51
reference_url https://access.redhat.com/errata/RHSA-2026:8151
reference_id RHSA-2026:8151
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8151
52
reference_url https://access.redhat.com/errata/RHSA-2026:8167
reference_id RHSA-2026:8167
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8167
53
reference_url https://access.redhat.com/errata/RHSA-2026:8314
reference_id RHSA-2026:8314
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8314
54
reference_url https://access.redhat.com/errata/RHSA-2026:8322
reference_id RHSA-2026:8322
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8322
55
reference_url https://access.redhat.com/errata/RHSA-2026:8324
reference_id RHSA-2026:8324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8324
56
reference_url https://access.redhat.com/errata/RHSA-2026:8337
reference_id RHSA-2026:8337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8337
57
reference_url https://access.redhat.com/errata/RHSA-2026:8338
reference_id RHSA-2026:8338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8338
58
reference_url https://access.redhat.com/errata/RHSA-2026:8433
reference_id RHSA-2026:8433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8433
59
reference_url https://access.redhat.com/errata/RHSA-2026:8434
reference_id RHSA-2026:8434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8434
60
reference_url https://access.redhat.com/errata/RHSA-2026:8456
reference_id RHSA-2026:8456
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8456
61
reference_url https://access.redhat.com/errata/RHSA-2026:8483
reference_id RHSA-2026:8483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8483
62
reference_url https://access.redhat.com/errata/RHSA-2026:8484
reference_id RHSA-2026:8484
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8484
63
reference_url https://access.redhat.com/errata/RHSA-2026:8490
reference_id RHSA-2026:8490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8490
64
reference_url https://access.redhat.com/errata/RHSA-2026:8491
reference_id RHSA-2026:8491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8491
65
reference_url https://access.redhat.com/errata/RHSA-2026:8493
reference_id RHSA-2026:8493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8493
66
reference_url https://access.redhat.com/errata/RHSA-2026:8840
reference_id RHSA-2026:8840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8840
67
reference_url https://access.redhat.com/errata/RHSA-2026:8841
reference_id RHSA-2026:8841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8841
68
reference_url https://access.redhat.com/errata/RHSA-2026:8842
reference_id RHSA-2026:8842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8842
69
reference_url https://access.redhat.com/errata/RHSA-2026:8845
reference_id RHSA-2026:8845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8845
70
reference_url https://access.redhat.com/errata/RHSA-2026:8847
reference_id RHSA-2026:8847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8847
71
reference_url https://access.redhat.com/errata/RHSA-2026:8848
reference_id RHSA-2026:8848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8848
72
reference_url https://access.redhat.com/errata/RHSA-2026:8849
reference_id RHSA-2026:8849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8849
73
reference_url https://access.redhat.com/errata/RHSA-2026:8851
reference_id RHSA-2026:8851
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8851
74
reference_url https://access.redhat.com/errata/RHSA-2026:8852
reference_id RHSA-2026:8852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8852
75
reference_url https://access.redhat.com/errata/RHSA-2026:8853
reference_id RHSA-2026:8853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8853
76
reference_url https://access.redhat.com/errata/RHSA-2026:8855
reference_id RHSA-2026:8855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8855
77
reference_url https://access.redhat.com/errata/RHSA-2026:8856
reference_id RHSA-2026:8856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8856
78
reference_url https://access.redhat.com/errata/RHSA-2026:8860
reference_id RHSA-2026:8860
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8860
79
reference_url https://access.redhat.com/errata/RHSA-2026:8877
reference_id RHSA-2026:8877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8877
80
reference_url https://access.redhat.com/errata/RHSA-2026:8878
reference_id RHSA-2026:8878
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8878
81
reference_url https://access.redhat.com/errata/RHSA-2026:8879
reference_id RHSA-2026:8879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8879
82
reference_url https://access.redhat.com/errata/RHSA-2026:8881
reference_id RHSA-2026:8881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8881
83
reference_url https://access.redhat.com/errata/RHSA-2026:8882
reference_id RHSA-2026:8882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8882
84
reference_url https://access.redhat.com/errata/RHSA-2026:8930
reference_id RHSA-2026:8930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8930
85
reference_url https://access.redhat.com/errata/RHSA-2026:8931
reference_id RHSA-2026:8931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8931
86
reference_url https://access.redhat.com/errata/RHSA-2026:8949
reference_id RHSA-2026:8949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8949
87
reference_url https://access.redhat.com/errata/RHSA-2026:9043
reference_id RHSA-2026:9043
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9043
88
reference_url https://access.redhat.com/errata/RHSA-2026:9044
reference_id RHSA-2026:9044
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9044
89
reference_url https://access.redhat.com/errata/RHSA-2026:9052
reference_id RHSA-2026:9052
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9052
90
reference_url https://access.redhat.com/errata/RHSA-2026:9090
reference_id RHSA-2026:9090
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9090
91
reference_url https://access.redhat.com/errata/RHSA-2026:9093
reference_id RHSA-2026:9093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9093
92
reference_url https://access.redhat.com/errata/RHSA-2026:9094
reference_id RHSA-2026:9094
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9094
93
reference_url https://access.redhat.com/errata/RHSA-2026:9097
reference_id RHSA-2026:9097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9097
94
reference_url https://access.redhat.com/errata/RHSA-2026:9098
reference_id RHSA-2026:9098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9098
95
reference_url https://access.redhat.com/errata/RHSA-2026:9108
reference_id RHSA-2026:9108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9108
96
reference_url https://access.redhat.com/errata/RHSA-2026:9109
reference_id RHSA-2026:9109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9109
97
reference_url https://access.redhat.com/errata/RHSA-2026:9385
reference_id RHSA-2026:9385
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9385
98
reference_url https://access.redhat.com/errata/RHSA-2026:9434
reference_id RHSA-2026:9434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9434
99
reference_url https://access.redhat.com/errata/RHSA-2026:9435
reference_id RHSA-2026:9435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9435
100
reference_url https://access.redhat.com/errata/RHSA-2026:9436
reference_id RHSA-2026:9436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9436
101
reference_url https://access.redhat.com/errata/RHSA-2026:9439
reference_id RHSA-2026:9439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9439
102
reference_url https://access.redhat.com/errata/RHSA-2026:9440
reference_id RHSA-2026:9440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9440
103
reference_url https://access.redhat.com/errata/RHSA-2026:9448
reference_id RHSA-2026:9448
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9448
104
reference_url https://access.redhat.com/errata/RHSA-2026:9453
reference_id RHSA-2026:9453
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9453
105
reference_url https://access.redhat.com/errata/RHSA-2026:9461
reference_id RHSA-2026:9461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9461
106
reference_url https://access.redhat.com/errata/RHSA-2026:9695
reference_id RHSA-2026:9695
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9695
107
reference_url https://access.redhat.com/errata/RHSA-2026:9742
reference_id RHSA-2026:9742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9742
108
reference_url https://access.redhat.com/errata/RHSA-2026:9872
reference_id RHSA-2026:9872
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9872
fixed_packages
0
url pkg:deb/debian/golang-1.15@0?distro=bullseye
purl pkg:deb/debian/golang-1.15@0?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2026-25679
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pcez-y67t-8yg3
31
url VCID-qemj-x1bx-h7gp
vulnerability_id VCID-qemj-x1bx-h7gp
summary Multiple vulnerabilities have been discovered in Go, the worst of which could lead to information leakage or a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24788.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24788.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-24788
reference_id
reference_type
scores
0
value 0.00149
scoring_system epss
scoring_elements 0.35375
published_at 2026-04-21T12:55:00Z
1
value 0.00149
scoring_system epss
scoring_elements 0.3548
published_at 2026-04-02T12:55:00Z
2
value 0.00149
scoring_system epss
scoring_elements 0.35504
published_at 2026-04-04T12:55:00Z
3
value 0.00149
scoring_system epss
scoring_elements 0.35387
published_at 2026-04-07T12:55:00Z
4
value 0.00149
scoring_system epss
scoring_elements 0.35433
published_at 2026-04-08T12:55:00Z
5
value 0.00149
scoring_system epss
scoring_elements 0.35458
published_at 2026-04-09T12:55:00Z
6
value 0.00149
scoring_system epss
scoring_elements 0.35467
published_at 2026-04-11T12:55:00Z
7
value 0.00149
scoring_system epss
scoring_elements 0.35424
published_at 2026-04-12T12:55:00Z
8
value 0.00149
scoring_system epss
scoring_elements 0.354
published_at 2026-04-13T12:55:00Z
9
value 0.00149
scoring_system epss
scoring_elements 0.3544
published_at 2026-04-16T12:55:00Z
10
value 0.00149
scoring_system epss
scoring_elements 0.35428
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-24788
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2279814
reference_id 2279814
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2279814
4
reference_url http://www.openwall.com/lists/oss-security/2024/05/08/3
reference_id 3
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T19:38:26Z/
url http://www.openwall.com/lists/oss-security/2024/05/08/3
5
reference_url https://go.dev/cl/578375
reference_id 578375
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T19:38:26Z/
url https://go.dev/cl/578375
6
reference_url https://go.dev/issue/66754
reference_id 66754
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T19:38:26Z/
url https://go.dev/issue/66754
7
reference_url https://security.gentoo.org/glsa/202408-07
reference_id GLSA-202408-07
reference_type
scores
url https://security.gentoo.org/glsa/202408-07
8
reference_url https://pkg.go.dev/vuln/GO-2024-2824
reference_id GO-2024-2824
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T19:38:26Z/
url https://pkg.go.dev/vuln/GO-2024-2824
9
reference_url https://security.netapp.com/advisory/ntap-20240605-0002/
reference_id ntap-20240605-0002
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T19:38:26Z/
url https://security.netapp.com/advisory/ntap-20240605-0002/
10
reference_url https://security.netapp.com/advisory/ntap-20240614-0001/
reference_id ntap-20240614-0001
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T19:38:26Z/
url https://security.netapp.com/advisory/ntap-20240614-0001/
11
reference_url https://access.redhat.com/errata/RHSA-2024:4616
reference_id RHSA-2024:4616
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4616
12
reference_url https://access.redhat.com/errata/RHSA-2024:4697
reference_id RHSA-2024:4697
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4697
13
reference_url https://access.redhat.com/errata/RHSA-2024:4872
reference_id RHSA-2024:4872
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4872
14
reference_url https://access.redhat.com/errata/RHSA-2024:4982
reference_id RHSA-2024:4982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4982
15
reference_url https://access.redhat.com/errata/RHSA-2024:5013
reference_id RHSA-2024:5013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5013
16
reference_url https://access.redhat.com/errata/RHSA-2024:5291
reference_id RHSA-2024:5291
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5291
17
reference_url https://access.redhat.com/errata/RHSA-2024:5547
reference_id RHSA-2024:5547
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5547
18
reference_url https://access.redhat.com/errata/RHSA-2024:6221
reference_id RHSA-2024:6221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6221
19
reference_url https://access.redhat.com/errata/RHSA-2024:6341
reference_id RHSA-2024:6341
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6341
20
reference_url https://access.redhat.com/errata/RHSA-2024:6969
reference_id RHSA-2024:6969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6969
21
reference_url https://access.redhat.com/errata/RHSA-2024:7548
reference_id RHSA-2024:7548
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7548
22
reference_url https://access.redhat.com/errata/RHSA-2024:9089
reference_id RHSA-2024:9089
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9089
23
reference_url https://access.redhat.com/errata/RHSA-2024:9115
reference_id RHSA-2024:9115
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9115
24
reference_url https://access.redhat.com/errata/RHSA-2024:9135
reference_id RHSA-2024:9135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9135
25
reference_url https://access.redhat.com/errata/RHSA-2024:9200
reference_id RHSA-2024:9200
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9200
26
reference_url https://access.redhat.com/errata/RHSA-2024:9277
reference_id RHSA-2024:9277
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9277
27
reference_url https://access.redhat.com/errata/RHSA-2024:9485
reference_id RHSA-2024:9485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9485
28
reference_url https://access.redhat.com/errata/RHSA-2025:9776
reference_id RHSA-2025:9776
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:9776
29
reference_url https://usn.ubuntu.com/6886-1/
reference_id USN-6886-1
reference_type
scores
url https://usn.ubuntu.com/6886-1/
30
reference_url https://groups.google.com/g/golang-announce/c/wkkO4P9stm0
reference_id wkkO4P9stm0
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T19:38:26Z/
url https://groups.google.com/g/golang-announce/c/wkkO4P9stm0
fixed_packages
0
url pkg:deb/debian/golang-1.15@0?distro=bullseye
purl pkg:deb/debian/golang-1.15@0?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2024-24788
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qemj-x1bx-h7gp
32
url VCID-qn4v-xah4-fya7
vulnerability_id VCID-qn4v-xah4-fya7
summary Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36221.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36221.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-36221
reference_id
reference_type
scores
0
value 0.00231
scoring_system epss
scoring_elements 0.45869
published_at 2026-04-01T12:55:00Z
1
value 0.00231
scoring_system epss
scoring_elements 0.45916
published_at 2026-04-02T12:55:00Z
2
value 0.00231
scoring_system epss
scoring_elements 0.45937
published_at 2026-04-04T12:55:00Z
3
value 0.00231
scoring_system epss
scoring_elements 0.45885
published_at 2026-04-07T12:55:00Z
4
value 0.00231
scoring_system epss
scoring_elements 0.45941
published_at 2026-04-08T12:55:00Z
5
value 0.00231
scoring_system epss
scoring_elements 0.45938
published_at 2026-04-09T12:55:00Z
6
value 0.00231
scoring_system epss
scoring_elements 0.45961
published_at 2026-04-11T12:55:00Z
7
value 0.00231
scoring_system epss
scoring_elements 0.45932
published_at 2026-04-21T12:55:00Z
8
value 0.00231
scoring_system epss
scoring_elements 0.45939
published_at 2026-04-13T12:55:00Z
9
value 0.00231
scoring_system epss
scoring_elements 0.45991
published_at 2026-04-16T12:55:00Z
10
value 0.00231
scoring_system epss
scoring_elements 0.45987
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-36221
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36221
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36221
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1995656
reference_id 1995656
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1995656
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991961
reference_id 991961
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991961
5
reference_url https://security.archlinux.org/AVG-2259
reference_id AVG-2259
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2259
6
reference_url https://security.gentoo.org/glsa/202208-02
reference_id GLSA-202208-02
reference_type
scores
url https://security.gentoo.org/glsa/202208-02
7
reference_url https://access.redhat.com/errata/RHSA-2021:4156
reference_id RHSA-2021:4156
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4156
8
reference_url https://access.redhat.com/errata/RHSA-2021:4765
reference_id RHSA-2021:4765
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4765
9
reference_url https://access.redhat.com/errata/RHSA-2021:4766
reference_id RHSA-2021:4766
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4766
10
reference_url https://access.redhat.com/errata/RHSA-2022:0557
reference_id RHSA-2022:0557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0557
11
reference_url https://access.redhat.com/errata/RHSA-2022:0561
reference_id RHSA-2022:0561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0561
12
reference_url https://access.redhat.com/errata/RHSA-2022:0577
reference_id RHSA-2022:0577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0577
13
reference_url https://access.redhat.com/errata/RHSA-2022:0855
reference_id RHSA-2022:0855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0855
14
reference_url https://access.redhat.com/errata/RHSA-2022:1276
reference_id RHSA-2022:1276
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1276
15
reference_url https://access.redhat.com/errata/RHSA-2022:1361
reference_id RHSA-2022:1361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1361
16
reference_url https://access.redhat.com/errata/RHSA-2022:1372
reference_id RHSA-2022:1372
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1372
17
reference_url https://access.redhat.com/errata/RHSA-2022:1396
reference_id RHSA-2022:1396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1396
18
reference_url https://access.redhat.com/errata/RHSA-2022:7457
reference_id RHSA-2022:7457
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7457
fixed_packages
0
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u1?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2021-36221
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qn4v-xah4-fya7
33
url VCID-rmev-jnbb-2yat
vulnerability_id VCID-rmev-jnbb-2yat
summary Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38297.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38297.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-38297
reference_id
reference_type
scores
0
value 0.10629
scoring_system epss
scoring_elements 0.93327
published_at 2026-04-21T12:55:00Z
1
value 0.10629
scoring_system epss
scoring_elements 0.9332
published_at 2026-04-18T12:55:00Z
2
value 0.13775
scoring_system epss
scoring_elements 0.94239
published_at 2026-04-01T12:55:00Z
3
value 0.13775
scoring_system epss
scoring_elements 0.94248
published_at 2026-04-02T12:55:00Z
4
value 0.13775
scoring_system epss
scoring_elements 0.9426
published_at 2026-04-04T12:55:00Z
5
value 0.13775
scoring_system epss
scoring_elements 0.94261
published_at 2026-04-07T12:55:00Z
6
value 0.13775
scoring_system epss
scoring_elements 0.9427
published_at 2026-04-08T12:55:00Z
7
value 0.13775
scoring_system epss
scoring_elements 0.94274
published_at 2026-04-09T12:55:00Z
8
value 0.13775
scoring_system epss
scoring_elements 0.94278
published_at 2026-04-11T12:55:00Z
9
value 0.13775
scoring_system epss
scoring_elements 0.94279
published_at 2026-04-13T12:55:00Z
10
value 0.13775
scoring_system epss
scoring_elements 0.94294
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-38297
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38297
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2012887
reference_id 2012887
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2012887
5
reference_url https://security.archlinux.org/AVG-2454
reference_id AVG-2454
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2454
6
reference_url https://security.gentoo.org/glsa/202208-02
reference_id GLSA-202208-02
reference_type
scores
url https://security.gentoo.org/glsa/202208-02
7
reference_url https://access.redhat.com/errata/RHSA-2022:0432
reference_id RHSA-2022:0432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0432
8
reference_url https://access.redhat.com/errata/RHSA-2022:0434
reference_id RHSA-2022:0434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0434
9
reference_url https://access.redhat.com/errata/RHSA-2022:1819
reference_id RHSA-2022:1819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1819
fixed_packages
0
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u2?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u2?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u2%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2021-38297
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rmev-jnbb-2yat
34
url VCID-skce-3sxx-h3cy
vulnerability_id VCID-skce-3sxx-h3cy
summary golang: default Content-Type setting in net/http/cgi and net/http/fcgi could cause XSS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24553.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24553.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-24553
reference_id
reference_type
scores
0
value 0.0015
scoring_system epss
scoring_elements 0.35518
published_at 2026-04-21T12:55:00Z
1
value 0.0015
scoring_system epss
scoring_elements 0.35579
published_at 2026-04-16T12:55:00Z
2
value 0.0015
scoring_system epss
scoring_elements 0.35569
published_at 2026-04-18T12:55:00Z
3
value 0.00204
scoring_system epss
scoring_elements 0.42561
published_at 2026-04-02T12:55:00Z
4
value 0.00204
scoring_system epss
scoring_elements 0.42589
published_at 2026-04-04T12:55:00Z
5
value 0.00204
scoring_system epss
scoring_elements 0.42527
published_at 2026-04-07T12:55:00Z
6
value 0.00204
scoring_system epss
scoring_elements 0.42579
published_at 2026-04-08T12:55:00Z
7
value 0.00204
scoring_system epss
scoring_elements 0.42588
published_at 2026-04-09T12:55:00Z
8
value 0.00204
scoring_system epss
scoring_elements 0.4261
published_at 2026-04-11T12:55:00Z
9
value 0.00204
scoring_system epss
scoring_elements 0.42573
published_at 2026-04-12T12:55:00Z
10
value 0.00204
scoring_system epss
scoring_elements 0.42545
published_at 2026-04-13T12:55:00Z
11
value 0.00204
scoring_system epss
scoring_elements 0.4249
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-24553
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24553
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1874857
reference_id 1874857
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1874857
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969661
reference_id 969661
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969661
6
reference_url https://security.archlinux.org/ASA-202009-3
reference_id ASA-202009-3
reference_type
scores
url https://security.archlinux.org/ASA-202009-3
7
reference_url https://security.archlinux.org/AVG-1215
reference_id AVG-1215
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1215
8
reference_url https://access.redhat.com/errata/RHSA-2020:5493
reference_id RHSA-2020:5493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5493
9
reference_url https://access.redhat.com/errata/RHSA-2021:0145
reference_id RHSA-2021:0145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0145
10
reference_url https://access.redhat.com/errata/RHSA-2021:0146
reference_id RHSA-2021:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0146
11
reference_url https://usn.ubuntu.com/4758-1/
reference_id USN-4758-1
reference_type
scores
url https://usn.ubuntu.com/4758-1/
fixed_packages
0
url pkg:deb/debian/golang-1.15@1.15.2-1?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.2-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.2-1%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2020-24553
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-skce-3sxx-h3cy
35
url VCID-thkn-q21m-kyfr
vulnerability_id VCID-thkn-q21m-kyfr
summary Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41771.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41771.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-41771
reference_id
reference_type
scores
0
value 0.00868
scoring_system epss
scoring_elements 0.75111
published_at 2026-04-01T12:55:00Z
1
value 0.00868
scoring_system epss
scoring_elements 0.75188
published_at 2026-04-21T12:55:00Z
2
value 0.00868
scoring_system epss
scoring_elements 0.75192
published_at 2026-04-16T12:55:00Z
3
value 0.00868
scoring_system epss
scoring_elements 0.75199
published_at 2026-04-18T12:55:00Z
4
value 0.00868
scoring_system epss
scoring_elements 0.75114
published_at 2026-04-02T12:55:00Z
5
value 0.00868
scoring_system epss
scoring_elements 0.75144
published_at 2026-04-04T12:55:00Z
6
value 0.00868
scoring_system epss
scoring_elements 0.75121
published_at 2026-04-07T12:55:00Z
7
value 0.00868
scoring_system epss
scoring_elements 0.75155
published_at 2026-04-13T12:55:00Z
8
value 0.00868
scoring_system epss
scoring_elements 0.75167
published_at 2026-04-12T12:55:00Z
9
value 0.00868
scoring_system epss
scoring_elements 0.75189
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-41771
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41771
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2020725
reference_id 2020725
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2020725
5
reference_url https://security.archlinux.org/AVG-2527
reference_id AVG-2527
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2527
6
reference_url https://security.gentoo.org/glsa/202208-02
reference_id GLSA-202208-02
reference_type
scores
url https://security.gentoo.org/glsa/202208-02
7
reference_url https://access.redhat.com/errata/RHSA-2022:1734
reference_id RHSA-2022:1734
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1734
8
reference_url https://access.redhat.com/errata/RHSA-2022:1745
reference_id RHSA-2022:1745
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1745
9
reference_url https://access.redhat.com/errata/RHSA-2022:1747
reference_id RHSA-2022:1747
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1747
10
reference_url https://access.redhat.com/errata/RHSA-2022:1819
reference_id RHSA-2022:1819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1819
fixed_packages
0
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u2?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u2?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u2%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2021-41771
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-thkn-q21m-kyfr
36
url VCID-urf8-3h24-2fgu
vulnerability_id VCID-urf8-3h24-2fgu
summary golang: os/exec: Code injection in Cmd.Start
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30580.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30580.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-30580
reference_id
reference_type
scores
0
value 0.0006
scoring_system epss
scoring_elements 0.1895
published_at 2026-04-02T12:55:00Z
1
value 0.0006
scoring_system epss
scoring_elements 0.18742
published_at 2026-04-21T12:55:00Z
2
value 0.0006
scoring_system epss
scoring_elements 0.19003
published_at 2026-04-04T12:55:00Z
3
value 0.0006
scoring_system epss
scoring_elements 0.18726
published_at 2026-04-18T12:55:00Z
4
value 0.0006
scoring_system epss
scoring_elements 0.18806
published_at 2026-04-08T12:55:00Z
5
value 0.0006
scoring_system epss
scoring_elements 0.18858
published_at 2026-04-09T12:55:00Z
6
value 0.0006
scoring_system epss
scoring_elements 0.18862
published_at 2026-04-11T12:55:00Z
7
value 0.0006
scoring_system epss
scoring_elements 0.18814
published_at 2026-04-12T12:55:00Z
8
value 0.0006
scoring_system epss
scoring_elements 0.18762
published_at 2026-04-13T12:55:00Z
9
value 0.0006
scoring_system epss
scoring_elements 0.18713
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-30580
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2118605
reference_id 2118605
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2118605
4
reference_url https://go.dev/cl/403759
reference_id 403759
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-24T20:37:17Z/
url https://go.dev/cl/403759
5
reference_url https://go.dev/issue/52574
reference_id 52574
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-24T20:37:17Z/
url https://go.dev/issue/52574
6
reference_url https://go.googlesource.com/go/+/960ffa98ce73ef2c2060c84c7ac28d37a83f345e
reference_id 960ffa98ce73ef2c2060c84c7ac28d37a83f345e
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-24T20:37:17Z/
url https://go.googlesource.com/go/+/960ffa98ce73ef2c2060c84c7ac28d37a83f345e
7
reference_url https://pkg.go.dev/vuln/GO-2022-0532
reference_id GO-2022-0532
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-24T20:37:17Z/
url https://pkg.go.dev/vuln/GO-2022-0532
8
reference_url https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ
reference_id IWz5T6x7AAAJ
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-24T20:37:17Z/
url https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ
fixed_packages
0
url pkg:deb/debian/golang-1.15@0?distro=bullseye
purl pkg:deb/debian/golang-1.15@0?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2022-30580
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-urf8-3h24-2fgu
37
url VCID-vw9d-f7d1-gkhh
vulnerability_id VCID-vw9d-f7d1-gkhh
summary Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28366.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28366.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-28366
reference_id
reference_type
scores
0
value 0.00167
scoring_system epss
scoring_elements 0.37702
published_at 2026-04-01T12:55:00Z
1
value 0.00167
scoring_system epss
scoring_elements 0.37768
published_at 2026-04-21T12:55:00Z
2
value 0.00167
scoring_system epss
scoring_elements 0.37803
published_at 2026-04-13T12:55:00Z
3
value 0.00167
scoring_system epss
scoring_elements 0.3783
published_at 2026-04-18T12:55:00Z
4
value 0.00167
scoring_system epss
scoring_elements 0.37883
published_at 2026-04-02T12:55:00Z
5
value 0.00167
scoring_system epss
scoring_elements 0.37908
published_at 2026-04-04T12:55:00Z
6
value 0.00167
scoring_system epss
scoring_elements 0.37787
published_at 2026-04-07T12:55:00Z
7
value 0.00167
scoring_system epss
scoring_elements 0.37837
published_at 2026-04-08T12:55:00Z
8
value 0.00167
scoring_system epss
scoring_elements 0.3785
published_at 2026-04-16T12:55:00Z
9
value 0.00167
scoring_system epss
scoring_elements 0.37865
published_at 2026-04-11T12:55:00Z
10
value 0.00167
scoring_system epss
scoring_elements 0.37828
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-28366
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28366
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1897643
reference_id 1897643
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1897643
5
reference_url https://security.archlinux.org/ASA-202011-16
reference_id ASA-202011-16
reference_type
scores
url https://security.archlinux.org/ASA-202011-16
6
reference_url https://security.archlinux.org/AVG-1278
reference_id AVG-1278
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1278
7
reference_url https://security.gentoo.org/glsa/202208-02
reference_id GLSA-202208-02
reference_type
scores
url https://security.gentoo.org/glsa/202208-02
8
reference_url https://access.redhat.com/errata/RHSA-2020:5333
reference_id RHSA-2020:5333
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5333
9
reference_url https://access.redhat.com/errata/RHSA-2020:5493
reference_id RHSA-2020:5493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5493
10
reference_url https://access.redhat.com/errata/RHSA-2021:0145
reference_id RHSA-2021:0145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0145
11
reference_url https://access.redhat.com/errata/RHSA-2021:0146
reference_id RHSA-2021:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0146
fixed_packages
0
url pkg:deb/debian/golang-1.15@1.15.5-1?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.5-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.5-1%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2020-28366
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vw9d-f7d1-gkhh
38
url VCID-w53f-uad6-gqdn
vulnerability_id VCID-w53f-uad6-gqdn
summary Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44716.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44716.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-44716
reference_id
reference_type
scores
0
value 0.00088
scoring_system epss
scoring_elements 0.25052
published_at 2026-04-18T12:55:00Z
1
value 0.00088
scoring_system epss
scoring_elements 0.25024
published_at 2026-04-21T12:55:00Z
2
value 0.00095
scoring_system epss
scoring_elements 0.26592
published_at 2026-04-04T12:55:00Z
3
value 0.00095
scoring_system epss
scoring_elements 0.26404
published_at 2026-04-16T12:55:00Z
4
value 0.00095
scoring_system epss
scoring_elements 0.26396
published_at 2026-04-13T12:55:00Z
5
value 0.00095
scoring_system epss
scoring_elements 0.26454
published_at 2026-04-12T12:55:00Z
6
value 0.00095
scoring_system epss
scoring_elements 0.265
published_at 2026-04-11T12:55:00Z
7
value 0.00095
scoring_system epss
scoring_elements 0.26444
published_at 2026-04-08T12:55:00Z
8
value 0.00095
scoring_system epss
scoring_elements 0.26494
published_at 2026-04-09T12:55:00Z
9
value 0.00095
scoring_system epss
scoring_elements 0.26375
published_at 2026-04-07T12:55:00Z
10
value 0.00095
scoring_system epss
scoring_elements 0.26547
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-44716
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44716
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44716
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://go.dev/cl/369794
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://go.dev/cl/369794
5
reference_url https://go.dev/issue/50058
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://go.dev/issue/50058
6
reference_url https://groups.google.com/g/golang-announce/c/hcmEScgc00k
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://groups.google.com/g/golang-announce/c/hcmEScgc00k
7
reference_url https://lists.debian.org/debian-lts-announce/2022/01/msg00016.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2022/01/msg00016.html
8
reference_url https://lists.debian.org/debian-lts-announce/2022/01/msg00017.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2022/01/msg00017.html
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-44716
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-44716
10
reference_url https://pkg.go.dev/vuln/GO-2022-0288
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://pkg.go.dev/vuln/GO-2022-0288
11
reference_url https://security.netapp.com/advisory/ntap-20220121-0002
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20220121-0002
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2030801
reference_id 2030801
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2030801
13
reference_url https://security.archlinux.org/AVG-2617
reference_id AVG-2617
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2617
14
reference_url https://security.gentoo.org/glsa/202208-02
reference_id GLSA-202208-02
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/202208-02
15
reference_url https://access.redhat.com/errata/RHSA-2021:5160
reference_id RHSA-2021:5160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5160
16
reference_url https://access.redhat.com/errata/RHSA-2021:5176
reference_id RHSA-2021:5176
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5176
17
reference_url https://access.redhat.com/errata/RHSA-2022:0001
reference_id RHSA-2022:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0001
18
reference_url https://access.redhat.com/errata/RHSA-2022:0002
reference_id RHSA-2022:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0002
19
reference_url https://access.redhat.com/errata/RHSA-2022:0055
reference_id RHSA-2022:0055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0055
20
reference_url https://access.redhat.com/errata/RHSA-2022:0056
reference_id RHSA-2022:0056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0056
21
reference_url https://access.redhat.com/errata/RHSA-2022:0163
reference_id RHSA-2022:0163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0163
22
reference_url https://access.redhat.com/errata/RHSA-2022:0237
reference_id RHSA-2022:0237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0237
23
reference_url https://access.redhat.com/errata/RHSA-2022:0260
reference_id RHSA-2022:0260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0260
24
reference_url https://access.redhat.com/errata/RHSA-2022:0557
reference_id RHSA-2022:0557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0557
25
reference_url https://access.redhat.com/errata/RHSA-2022:0585
reference_id RHSA-2022:0585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0585
26
reference_url https://access.redhat.com/errata/RHSA-2022:0587
reference_id RHSA-2022:0587
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0587
27
reference_url https://access.redhat.com/errata/RHSA-2022:0842
reference_id RHSA-2022:0842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0842
28
reference_url https://access.redhat.com/errata/RHSA-2022:0855
reference_id RHSA-2022:0855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0855
29
reference_url https://access.redhat.com/errata/RHSA-2022:0927
reference_id RHSA-2022:0927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0927
30
reference_url https://access.redhat.com/errata/RHSA-2022:1051
reference_id RHSA-2022:1051
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1051
31
reference_url https://access.redhat.com/errata/RHSA-2022:1056
reference_id RHSA-2022:1056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1056
32
reference_url https://access.redhat.com/errata/RHSA-2022:1361
reference_id RHSA-2022:1361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1361
33
reference_url https://access.redhat.com/errata/RHSA-2022:1372
reference_id RHSA-2022:1372
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1372
34
reference_url https://access.redhat.com/errata/RHSA-2022:1628
reference_id RHSA-2022:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1628
35
reference_url https://access.redhat.com/errata/RHSA-2022:1734
reference_id RHSA-2022:1734
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1734
36
reference_url https://access.redhat.com/errata/RHSA-2023:0407
reference_id RHSA-2023:0407
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0407
37
reference_url https://access.redhat.com/errata/RHSA-2023:0408
reference_id RHSA-2023:0408
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0408
fixed_packages
0
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u2?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u2?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u2%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2021-44716, GHSA-vc3p-29h2-gpcp
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w53f-uad6-gqdn
39
url VCID-w9qm-pwnh-4ydj
vulnerability_id VCID-w9qm-pwnh-4ydj
summary golang: data race in certain net/http servers including ReverseProxy can lead to DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15586.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15586.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15586
reference_id
reference_type
scores
0
value 0.00614
scoring_system epss
scoring_elements 0.69813
published_at 2026-04-01T12:55:00Z
1
value 0.00614
scoring_system epss
scoring_elements 0.69826
published_at 2026-04-02T12:55:00Z
2
value 0.00614
scoring_system epss
scoring_elements 0.69841
published_at 2026-04-04T12:55:00Z
3
value 0.00614
scoring_system epss
scoring_elements 0.69817
published_at 2026-04-07T12:55:00Z
4
value 0.00614
scoring_system epss
scoring_elements 0.69866
published_at 2026-04-08T12:55:00Z
5
value 0.00614
scoring_system epss
scoring_elements 0.69882
published_at 2026-04-09T12:55:00Z
6
value 0.00614
scoring_system epss
scoring_elements 0.69904
published_at 2026-04-11T12:55:00Z
7
value 0.00614
scoring_system epss
scoring_elements 0.69889
published_at 2026-04-12T12:55:00Z
8
value 0.00614
scoring_system epss
scoring_elements 0.69874
published_at 2026-04-13T12:55:00Z
9
value 0.00614
scoring_system epss
scoring_elements 0.69916
published_at 2026-04-16T12:55:00Z
10
value 0.00614
scoring_system epss
scoring_elements 0.69925
published_at 2026-04-18T12:55:00Z
11
value 0.00614
scoring_system epss
scoring_elements 0.69906
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15586
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15586
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7919
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3114
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1856953
reference_id 1856953
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1856953
8
reference_url https://access.redhat.com/errata/RHSA-2020:3665
reference_id RHSA-2020:3665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3665
9
reference_url https://access.redhat.com/errata/RHSA-2020:4201
reference_id RHSA-2020:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4201
10
reference_url https://access.redhat.com/errata/RHSA-2020:4214
reference_id RHSA-2020:4214
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4214
11
reference_url https://access.redhat.com/errata/RHSA-2020:4297
reference_id RHSA-2020:4297
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4297
12
reference_url https://access.redhat.com/errata/RHSA-2020:5118
reference_id RHSA-2020:5118
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5118
13
reference_url https://access.redhat.com/errata/RHSA-2020:5119
reference_id RHSA-2020:5119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5119
14
reference_url https://access.redhat.com/errata/RHSA-2020:5605
reference_id RHSA-2020:5605
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5605
15
reference_url https://access.redhat.com/errata/RHSA-2020:5606
reference_id RHSA-2020:5606
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5606
16
reference_url https://access.redhat.com/errata/RHSA-2020:5649
reference_id RHSA-2020:5649
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5649
17
reference_url https://access.redhat.com/errata/RHSA-2021:0072
reference_id RHSA-2021:0072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0072
18
reference_url https://access.redhat.com/errata/RHSA-2021:0172
reference_id RHSA-2021:0172
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0172
19
reference_url https://access.redhat.com/errata/RHSA-2021:0713
reference_id RHSA-2021:0713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0713
20
reference_url https://access.redhat.com/errata/RHSA-2021:0956
reference_id RHSA-2021:0956
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0956
21
reference_url https://access.redhat.com/errata/RHSA-2021:1016
reference_id RHSA-2021:1016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1016
22
reference_url https://access.redhat.com/errata/RHSA-2021:1366
reference_id RHSA-2021:1366
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1366
23
reference_url https://access.redhat.com/errata/RHSA-2021:1515
reference_id RHSA-2021:1515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1515
24
reference_url https://access.redhat.com/errata/RHSA-2021:2122
reference_id RHSA-2021:2122
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2122
25
reference_url https://access.redhat.com/errata/RHSA-2021:4103
reference_id RHSA-2021:4103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4103
fixed_packages
0
url pkg:deb/debian/golang-1.15@1.15~rc1-1?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15~rc1-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15~rc1-1%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2020-15586
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w9qm-pwnh-4ydj
40
url VCID-wrkj-pngh-rybx
vulnerability_id VCID-wrkj-pngh-rybx
summary Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41772.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41772.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-41772
reference_id
reference_type
scores
0
value 0.00062
scoring_system epss
scoring_elements 0.19421
published_at 2026-04-01T12:55:00Z
1
value 0.00062
scoring_system epss
scoring_elements 0.19333
published_at 2026-04-21T12:55:00Z
2
value 0.00062
scoring_system epss
scoring_elements 0.19313
published_at 2026-04-16T12:55:00Z
3
value 0.00062
scoring_system epss
scoring_elements 0.1932
published_at 2026-04-18T12:55:00Z
4
value 0.00062
scoring_system epss
scoring_elements 0.19555
published_at 2026-04-02T12:55:00Z
5
value 0.00062
scoring_system epss
scoring_elements 0.19602
published_at 2026-04-04T12:55:00Z
6
value 0.00062
scoring_system epss
scoring_elements 0.19322
published_at 2026-04-07T12:55:00Z
7
value 0.00062
scoring_system epss
scoring_elements 0.194
published_at 2026-04-08T12:55:00Z
8
value 0.00062
scoring_system epss
scoring_elements 0.19451
published_at 2026-04-09T12:55:00Z
9
value 0.00062
scoring_system epss
scoring_elements 0.19456
published_at 2026-04-11T12:55:00Z
10
value 0.00062
scoring_system epss
scoring_elements 0.19409
published_at 2026-04-12T12:55:00Z
11
value 0.00062
scoring_system epss
scoring_elements 0.19351
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-41772
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2020736
reference_id 2020736
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2020736
4
reference_url https://security.archlinux.org/AVG-2527
reference_id AVG-2527
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2527
5
reference_url https://security.gentoo.org/glsa/202208-02
reference_id GLSA-202208-02
reference_type
scores
url https://security.gentoo.org/glsa/202208-02
6
reference_url https://access.redhat.com/errata/RHSA-2021:5176
reference_id RHSA-2021:5176
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5176
7
reference_url https://access.redhat.com/errata/RHSA-2022:0055
reference_id RHSA-2022:0055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0055
8
reference_url https://access.redhat.com/errata/RHSA-2022:0056
reference_id RHSA-2022:0056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0056
9
reference_url https://access.redhat.com/errata/RHSA-2022:1734
reference_id RHSA-2022:1734
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1734
10
reference_url https://access.redhat.com/errata/RHSA-2022:1745
reference_id RHSA-2022:1745
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1745
11
reference_url https://access.redhat.com/errata/RHSA-2022:1747
reference_id RHSA-2022:1747
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1747
12
reference_url https://access.redhat.com/errata/RHSA-2022:1819
reference_id RHSA-2022:1819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1819
fixed_packages
0
url pkg:deb/debian/golang-1.15@0?distro=bullseye
purl pkg:deb/debian/golang-1.15@0?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2021-41772
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wrkj-pngh-rybx
41
url VCID-x5ub-bfb7-nbbr
vulnerability_id VCID-x5ub-bfb7-nbbr
summary crypto/x509: Incorrect enforcement of email constraints in crypto/x509
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27137.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27137.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-27137
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.017
published_at 2026-04-04T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01692
published_at 2026-04-02T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.0223
published_at 2026-04-21T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02175
published_at 2026-04-11T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02177
published_at 2026-04-08T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02198
published_at 2026-04-09T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.0216
published_at 2026-04-12T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02157
published_at 2026-04-13T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.02132
published_at 2026-04-16T12:55:00Z
9
value 0.00013
scoring_system epss
scoring_elements 0.02145
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-27137
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2445345
reference_id 2445345
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2445345
4
reference_url https://go.dev/cl/752182
reference_id 752182
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-10T13:32:09Z/
url https://go.dev/cl/752182
5
reference_url https://go.dev/issue/77952
reference_id 77952
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-10T13:32:09Z/
url https://go.dev/issue/77952
6
reference_url https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk
reference_id EdhZqrQ98hk
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-10T13:32:09Z/
url https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk
7
reference_url https://pkg.go.dev/vuln/GO-2026-4599
reference_id GO-2026-4599
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-10T13:32:09Z/
url https://pkg.go.dev/vuln/GO-2026-4599
8
reference_url https://access.redhat.com/errata/RHSA-2026:10125
reference_id RHSA-2026:10125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10125
9
reference_url https://access.redhat.com/errata/RHSA-2026:10158
reference_id RHSA-2026:10158
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10158
10
reference_url https://access.redhat.com/errata/RHSA-2026:10169
reference_id RHSA-2026:10169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10169
11
reference_url https://access.redhat.com/errata/RHSA-2026:10175
reference_id RHSA-2026:10175
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10175
12
reference_url https://access.redhat.com/errata/RHSA-2026:10184
reference_id RHSA-2026:10184
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10184
13
reference_url https://access.redhat.com/errata/RHSA-2026:10225
reference_id RHSA-2026:10225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10225
14
reference_url https://access.redhat.com/errata/RHSA-2026:10250
reference_id RHSA-2026:10250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10250
15
reference_url https://access.redhat.com/errata/RHSA-2026:5110
reference_id RHSA-2026:5110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5110
16
reference_url https://access.redhat.com/errata/RHSA-2026:5549
reference_id RHSA-2026:5549
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5549
17
reference_url https://access.redhat.com/errata/RHSA-2026:8151
reference_id RHSA-2026:8151
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8151
18
reference_url https://access.redhat.com/errata/RHSA-2026:8167
reference_id RHSA-2026:8167
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8167
19
reference_url https://access.redhat.com/errata/RHSA-2026:8337
reference_id RHSA-2026:8337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8337
20
reference_url https://access.redhat.com/errata/RHSA-2026:8338
reference_id RHSA-2026:8338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8338
21
reference_url https://access.redhat.com/errata/RHSA-2026:8842
reference_id RHSA-2026:8842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8842
22
reference_url https://access.redhat.com/errata/RHSA-2026:9052
reference_id RHSA-2026:9052
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9052
23
reference_url https://access.redhat.com/errata/RHSA-2026:9385
reference_id RHSA-2026:9385
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9385
24
reference_url https://access.redhat.com/errata/RHSA-2026:9697
reference_id RHSA-2026:9697
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9697
25
reference_url https://access.redhat.com/errata/RHSA-2026:9698
reference_id RHSA-2026:9698
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9698
26
reference_url https://access.redhat.com/errata/RHSA-2026:9699
reference_id RHSA-2026:9699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9699
27
reference_url https://access.redhat.com/errata/RHSA-2026:9872
reference_id RHSA-2026:9872
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9872
fixed_packages
0
url pkg:deb/debian/golang-1.15@0?distro=bullseye
purl pkg:deb/debian/golang-1.15@0?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2026-27137
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x5ub-bfb7-nbbr
42
url VCID-xjm1-yec3-mkc6
vulnerability_id VCID-xjm1-yec3-mkc6
summary os.OpenFile(path, os.O_CREATE|O_EXCL) behaved differently on Unix and Windows systems when the target path was a dangling symlink. On Unix systems, OpenFile with O_CREATE and O_EXCL flags never follows symlinks. On Windows, when the target path was a symlink to a nonexistent location, OpenFile would create a file in that location. OpenFile now always returns an error when the O_CREATE and O_EXCL flags are both set and the target path is a symlink.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-0913
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03051
published_at 2026-04-04T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03037
published_at 2026-04-02T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.12094
published_at 2026-04-21T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.12035
published_at 2026-04-07T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.12117
published_at 2026-04-08T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.12169
published_at 2026-04-09T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.12176
published_at 2026-04-11T12:55:00Z
7
value 0.0004
scoring_system epss
scoring_elements 0.1214
published_at 2026-04-12T12:55:00Z
8
value 0.0004
scoring_system epss
scoring_elements 0.12108
published_at 2026-04-13T12:55:00Z
9
value 0.0004
scoring_system epss
scoring_elements 0.11979
published_at 2026-04-16T12:55:00Z
10
value 0.0004
scoring_system epss
scoring_elements 0.11975
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-0913
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://go.dev/cl/672396
reference_id 672396
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-11T17:35:44Z/
url https://go.dev/cl/672396
3
reference_url https://go.dev/issue/73702
reference_id 73702
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-11T17:35:44Z/
url https://go.dev/issue/73702
4
reference_url https://pkg.go.dev/vuln/GO-2025-3750
reference_id GO-2025-3750
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-11T17:35:44Z/
url https://pkg.go.dev/vuln/GO-2025-3750
5
reference_url https://groups.google.com/g/golang-announce/c/ufZ8WpEsA3A
reference_id ufZ8WpEsA3A
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-11T17:35:44Z/
url https://groups.google.com/g/golang-announce/c/ufZ8WpEsA3A
fixed_packages
0
url pkg:deb/debian/golang-1.15@0?distro=bullseye
purl pkg:deb/debian/golang-1.15@0?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2025-0913
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xjm1-yec3-mkc6
43
url VCID-z1ct-cecz-mqer
vulnerability_id VCID-z1ct-cecz-mqer
summary Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33197.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33197.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-33197
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.11881
published_at 2026-04-01T12:55:00Z
1
value 0.00039
scoring_system epss
scoring_elements 0.11905
published_at 2026-04-21T12:55:00Z
2
value 0.00039
scoring_system epss
scoring_elements 0.11787
published_at 2026-04-16T12:55:00Z
3
value 0.00039
scoring_system epss
scoring_elements 0.11785
published_at 2026-04-18T12:55:00Z
4
value 0.00039
scoring_system epss
scoring_elements 0.11994
published_at 2026-04-02T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.12037
published_at 2026-04-04T12:55:00Z
6
value 0.00039
scoring_system epss
scoring_elements 0.11839
published_at 2026-04-07T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.11922
published_at 2026-04-08T12:55:00Z
8
value 0.00039
scoring_system epss
scoring_elements 0.11974
published_at 2026-04-09T12:55:00Z
9
value 0.00039
scoring_system epss
scoring_elements 0.11981
published_at 2026-04-11T12:55:00Z
10
value 0.00039
scoring_system epss
scoring_elements 0.11944
published_at 2026-04-12T12:55:00Z
11
value 0.00039
scoring_system epss
scoring_elements 0.11918
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-33197
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33197
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1989570
reference_id 1989570
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1989570
5
reference_url https://security.archlinux.org/ASA-202106-42
reference_id ASA-202106-42
reference_type
scores
url https://security.archlinux.org/ASA-202106-42
6
reference_url https://security.archlinux.org/AVG-2006
reference_id AVG-2006
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2006
7
reference_url https://security.gentoo.org/glsa/202208-02
reference_id GLSA-202208-02
reference_type
scores
url https://security.gentoo.org/glsa/202208-02
8
reference_url https://access.redhat.com/errata/RHSA-2021:2983
reference_id RHSA-2021:2983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2983
9
reference_url https://access.redhat.com/errata/RHSA-2021:2984
reference_id RHSA-2021:2984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2984
10
reference_url https://access.redhat.com/errata/RHSA-2021:3009
reference_id RHSA-2021:3009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3009
11
reference_url https://access.redhat.com/errata/RHSA-2021:3146
reference_id RHSA-2021:3146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3146
12
reference_url https://access.redhat.com/errata/RHSA-2021:3229
reference_id RHSA-2021:3229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3229
13
reference_url https://access.redhat.com/errata/RHSA-2021:3248
reference_id RHSA-2021:3248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3248
14
reference_url https://access.redhat.com/errata/RHSA-2021:3361
reference_id RHSA-2021:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3361
15
reference_url https://access.redhat.com/errata/RHSA-2021:3431
reference_id RHSA-2021:3431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3431
16
reference_url https://access.redhat.com/errata/RHSA-2021:3487
reference_id RHSA-2021:3487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3487
17
reference_url https://access.redhat.com/errata/RHSA-2021:3555
reference_id RHSA-2021:3555
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3555
18
reference_url https://access.redhat.com/errata/RHSA-2021:3556
reference_id RHSA-2021:3556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3556
19
reference_url https://access.redhat.com/errata/RHSA-2021:3598
reference_id RHSA-2021:3598
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3598
20
reference_url https://access.redhat.com/errata/RHSA-2021:3759
reference_id RHSA-2021:3759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3759
21
reference_url https://access.redhat.com/errata/RHSA-2021:3820
reference_id RHSA-2021:3820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3820
22
reference_url https://access.redhat.com/errata/RHSA-2021:4104
reference_id RHSA-2021:4104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4104
23
reference_url https://access.redhat.com/errata/RHSA-2021:4156
reference_id RHSA-2021:4156
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4156
24
reference_url https://access.redhat.com/errata/RHSA-2021:4226
reference_id RHSA-2021:4226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4226
25
reference_url https://access.redhat.com/errata/RHSA-2021:5072
reference_id RHSA-2021:5072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5072
26
reference_url https://access.redhat.com/errata/RHSA-2021:5085
reference_id RHSA-2021:5085
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5085
27
reference_url https://access.redhat.com/errata/RHSA-2021:5086
reference_id RHSA-2021:5086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5086
28
reference_url https://access.redhat.com/errata/RHSA-2022:0191
reference_id RHSA-2022:0191
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0191
29
reference_url https://access.redhat.com/errata/RHSA-2022:0577
reference_id RHSA-2022:0577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0577
30
reference_url https://access.redhat.com/errata/RHSA-2022:1329
reference_id RHSA-2022:1329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1329
31
reference_url https://access.redhat.com/errata/RHSA-2022:1402
reference_id RHSA-2022:1402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1402
32
reference_url https://access.redhat.com/errata/RHSA-2022:7954
reference_id RHSA-2022:7954
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7954
fixed_packages
0
url pkg:deb/debian/golang-1.15@1.15.9-5?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.9-5?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.9-5%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2021-33197
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z1ct-cecz-mqer
44
url VCID-z5x6-xqtc-q3at
vulnerability_id VCID-z5x6-xqtc-q3at
summary Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23773.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23773.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23773
reference_id
reference_type
scores
0
value 0.00118
scoring_system epss
scoring_elements 0.30823
published_at 2026-04-02T12:55:00Z
1
value 0.00118
scoring_system epss
scoring_elements 0.3087
published_at 2026-04-04T12:55:00Z
2
value 0.00118
scoring_system epss
scoring_elements 0.30689
published_at 2026-04-07T12:55:00Z
3
value 0.00118
scoring_system epss
scoring_elements 0.30747
published_at 2026-04-08T12:55:00Z
4
value 0.00118
scoring_system epss
scoring_elements 0.30779
published_at 2026-04-09T12:55:00Z
5
value 0.00118
scoring_system epss
scoring_elements 0.30782
published_at 2026-04-11T12:55:00Z
6
value 0.00118
scoring_system epss
scoring_elements 0.30738
published_at 2026-04-12T12:55:00Z
7
value 0.00118
scoring_system epss
scoring_elements 0.30692
published_at 2026-04-13T12:55:00Z
8
value 0.00118
scoring_system epss
scoring_elements 0.30716
published_at 2026-04-16T12:55:00Z
9
value 0.00118
scoring_system epss
scoring_elements 0.30698
published_at 2026-04-18T12:55:00Z
10
value 0.00118
scoring_system epss
scoring_elements 0.30664
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23773
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23773
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2053541
reference_id 2053541
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2053541
5
reference_url https://security.gentoo.org/glsa/202208-02
reference_id GLSA-202208-02
reference_type
scores
url https://security.gentoo.org/glsa/202208-02
6
reference_url https://access.redhat.com/errata/RHSA-2022:1819
reference_id RHSA-2022:1819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1819
7
reference_url https://access.redhat.com/errata/RHSA-2022:4860
reference_id RHSA-2022:4860
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4860
8
reference_url https://access.redhat.com/errata/RHSA-2022:4863
reference_id RHSA-2022:4863
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4863
9
reference_url https://access.redhat.com/errata/RHSA-2022:5004
reference_id RHSA-2022:5004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5004
10
reference_url https://access.redhat.com/errata/RHSA-2022:5068
reference_id RHSA-2022:5068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5068
11
reference_url https://access.redhat.com/errata/RHSA-2022:5729
reference_id RHSA-2022:5729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5729
12
reference_url https://access.redhat.com/errata/RHSA-2022:5875
reference_id RHSA-2022:5875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5875
13
reference_url https://access.redhat.com/errata/RHSA-2022:6094
reference_id RHSA-2022:6094
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6094
14
reference_url https://access.redhat.com/errata/RHSA-2022:6156
reference_id RHSA-2022:6156
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6156
15
reference_url https://access.redhat.com/errata/RHSA-2023:0408
reference_id RHSA-2023:0408
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0408
16
reference_url https://access.redhat.com/errata/RHSA-2023:1529
reference_id RHSA-2023:1529
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1529
fixed_packages
0
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u3?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u3?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u3%3Fdistro=bullseye
1
url pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
purl pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye
aliases CVE-2022-23773
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z5x6-xqtc-q3at
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye