Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/923810?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "type": "deb", "namespace": "debian", "name": "golang-1.15", "version": "1.15.15-1~deb11u4", "qualifiers": { "distro": "bullseye" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36633?format=api", "vulnerability_id": "VCID-2zj9-xmsh-xbcn", "summary": "Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44717.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44717.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-44717", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44535", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44613", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44634", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44572", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44623", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44626", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44643", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44614", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44668", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44661", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44592", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44506", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.4451", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-44717" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44717", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44717" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030806", "reference_id": "2030806", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030806" }, { "reference_url": "https://security.archlinux.org/AVG-2617", "reference_id": "AVG-2617", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2617" }, { "reference_url": "https://security.gentoo.org/glsa/202208-02", "reference_id": "GLSA-202208-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5160", "reference_id": "RHSA-2021:5160", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5160" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5176", "reference_id": "RHSA-2021:5176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5176" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0055", "reference_id": "RHSA-2022:0055", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0055" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0056", "reference_id": "RHSA-2022:0056", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0056" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0557", "reference_id": "RHSA-2022:0557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0927", "reference_id": "RHSA-2022:0927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1051", "reference_id": "RHSA-2022:1051", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1051" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1056", "reference_id": "RHSA-2022:1056", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1056" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1361", "reference_id": "RHSA-2022:1361", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1361" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1372", "reference_id": "RHSA-2022:1372", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1372" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1734", "reference_id": "RHSA-2022:1734", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1734" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0407", "reference_id": "RHSA-2023:0407", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0407" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0408", "reference_id": "RHSA-2023:0408", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0408" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923823?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u2?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u2%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2021-44717" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2zj9-xmsh-xbcn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36622?format=api", "vulnerability_id": "VCID-35du-rm88-k7bw", "summary": "Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33195.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33195.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33195", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09083", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09147", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09159", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09202", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09088", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09141", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09062", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09173", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09172", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09139", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09126", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0902", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33195" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33195", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33195" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564", "reference_id": "1989564", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "reference_url": "https://security.archlinux.org/ASA-202106-42", "reference_id": "ASA-202106-42", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-42" }, { "reference_url": "https://security.archlinux.org/AVG-2006", "reference_id": "AVG-2006", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2006" }, { "reference_url": "https://security.gentoo.org/glsa/202208-02", "reference_id": "GLSA-202208-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2983", "reference_id": "RHSA-2021:2983", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2983" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2984", "reference_id": "RHSA-2021:2984", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2984" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3009", "reference_id": "RHSA-2021:3009", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3009" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3146", "reference_id": "RHSA-2021:3146", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3146" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3229", "reference_id": "RHSA-2021:3229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3248", "reference_id": "RHSA-2021:3248", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3248" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3361", "reference_id": "RHSA-2021:3361", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3361" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3431", "reference_id": "RHSA-2021:3431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3487", "reference_id": "RHSA-2021:3487", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3487" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3555", "reference_id": "RHSA-2021:3555", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3555" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3556", "reference_id": "RHSA-2021:3556", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3556" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3598", "reference_id": "RHSA-2021:3598", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3598" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3759", "reference_id": "RHSA-2021:3759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3820", "reference_id": "RHSA-2021:3820", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3820" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4104", "reference_id": "RHSA-2021:4104", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4104" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4156", "reference_id": "RHSA-2021:4156", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4156" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4226", "reference_id": "RHSA-2021:4226", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4226" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5072", "reference_id": "RHSA-2021:5072", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5072" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5085", "reference_id": "RHSA-2021:5085", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5085" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5086", "reference_id": "RHSA-2021:5086", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0191", "reference_id": "RHSA-2022:0191", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0191" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0577", "reference_id": "RHSA-2022:0577", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0577" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1329", "reference_id": "RHSA-2022:1329", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1329" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1402", "reference_id": "RHSA-2022:1402", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1402" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923819?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.9-5?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.9-5%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2021-33195" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-35du-rm88-k7bw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36616?format=api", "vulnerability_id": "VCID-3vjm-2r63-afbr", "summary": "Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27919.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27919.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-27919", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32741", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32459", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32756", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32576", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32872", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32907", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32727", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32775", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32802", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32803", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32765", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32739", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.3278", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-27919" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937909", "reference_id": "1937909", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937909" }, { "reference_url": "https://security.archlinux.org/AVG-1668", "reference_id": "AVG-1668", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1668" }, { "reference_url": "https://security.gentoo.org/glsa/202208-02", "reference_id": "GLSA-202208-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923811?format=api", "purl": "pkg:deb/debian/golang-1.15@0?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2021-27919" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3vjm-2r63-afbr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36638?format=api", "vulnerability_id": "VCID-4pue-fbre-zfcf", "summary": "Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23806.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23806.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23806", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12203", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12248", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12048", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12129", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12181", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12189", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12105", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12085", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12152", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.1212", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.1199", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.11986", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13728", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23806" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23806", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23806" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053429", "reference_id": "2053429", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053429" }, { "reference_url": "https://security.gentoo.org/glsa/202208-02", "reference_id": "GLSA-202208-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1819", "reference_id": "RHSA-2022:1819", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1819" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4860", "reference_id": "RHSA-2022:4860", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4860" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4863", "reference_id": "RHSA-2022:4863", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4863" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5004", "reference_id": "RHSA-2022:5004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5006", "reference_id": "RHSA-2022:5006", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5006" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5068", "reference_id": "RHSA-2022:5068", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5068" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5729", "reference_id": "RHSA-2022:5729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5729" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5875", "reference_id": "RHSA-2022:5875", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5875" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6094", "reference_id": "RHSA-2022:6094", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6094" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6156", "reference_id": "RHSA-2022:6156", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6156" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0408", "reference_id": "RHSA-2023:0408", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0408" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1529", "reference_id": "RHSA-2023:1529", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1529" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923824?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u3?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u3%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-23806" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4pue-fbre-zfcf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64830?format=api", "vulnerability_id": "VCID-5q9b-a7c4-1yht", "summary": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61728.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61728.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-61728", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05221", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05068", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05101", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05115", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.0509", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05072", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05056", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05002", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05007", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05153", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.0518", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05956", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05923", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-61728" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125916", "reference_id": "1125916", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125916" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125917", "reference_id": "1125917", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125917" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431", "reference_id": "2434431", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431" }, { "reference_url": "https://go.dev/cl/736713", "reference_id": "736713", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-29T18:29:58Z/" } ], "url": "https://go.dev/cl/736713" }, { "reference_url": "https://go.dev/issue/77102", "reference_id": "77102", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-29T18:29:58Z/" } ], "url": "https://go.dev/issue/77102" }, { "reference_url": "https://pkg.go.dev/vuln/GO-2026-4342", "reference_id": "GO-2026-4342", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-29T18:29:58Z/" } ], "url": "https://pkg.go.dev/vuln/GO-2026-4342" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:10175", "reference_id": "RHSA-2026:10175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:10175" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:10184", "reference_id": "RHSA-2026:10184", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:10184" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2706", "reference_id": "RHSA-2026:2706", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2706" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2708", "reference_id": "RHSA-2026:2708", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2708" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2709", "reference_id": "RHSA-2026:2709", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2709" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2914", "reference_id": "RHSA-2026:2914", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2914" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2920", "reference_id": "RHSA-2026:2920", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2920" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3186", "reference_id": "RHSA-2026:3186", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3186" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3188", "reference_id": "RHSA-2026:3188", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3188" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3192", "reference_id": "RHSA-2026:3192", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3192" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3193", "reference_id": "RHSA-2026:3193", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3193" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3336", "reference_id": "RHSA-2026:3336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3336" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3337", "reference_id": "RHSA-2026:3337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3337" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3469", "reference_id": "RHSA-2026:3469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3471", "reference_id": "RHSA-2026:3471", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3471" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3472", "reference_id": "RHSA-2026:3472", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3472" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3473", "reference_id": "RHSA-2026:3473", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3473" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3489", "reference_id": "RHSA-2026:3489", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3489" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3556", "reference_id": "RHSA-2026:3556", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3556" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3559", "reference_id": "RHSA-2026:3559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3752", "reference_id": "RHSA-2026:3752", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3752" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3753", "reference_id": "RHSA-2026:3753", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3753" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3782", "reference_id": "RHSA-2026:3782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3831", "reference_id": "RHSA-2026:3831", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3831" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3833", "reference_id": "RHSA-2026:3833", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3833" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3835", "reference_id": "RHSA-2026:3835", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3835" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3836", "reference_id": "RHSA-2026:3836", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3836" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3838", "reference_id": "RHSA-2026:3838", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3838" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3851", "reference_id": "RHSA-2026:3851", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3851" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3854", "reference_id": "RHSA-2026:3854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3854" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3855", "reference_id": "RHSA-2026:3855", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3855" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3880", "reference_id": "RHSA-2026:3880", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3880" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3884", "reference_id": "RHSA-2026:3884", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3884" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:4170", "reference_id": "RHSA-2026:4170", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:4170" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:4434", "reference_id": "RHSA-2026:4434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:4434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:4466", "reference_id": "RHSA-2026:4466", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:4466" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:4467", "reference_id": "RHSA-2026:4467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:4467" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:4672", "reference_id": "RHSA-2026:4672", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:4672" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:4942", "reference_id": "RHSA-2026:4942", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:4942" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:5110", "reference_id": "RHSA-2026:5110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:5110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:5439", "reference_id": "RHSA-2026:5439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:5439" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:5444", "reference_id": "RHSA-2026:5444", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:5444" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:5447", "reference_id": "RHSA-2026:5447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:5447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:5452", "reference_id": "RHSA-2026:5452", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:5452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:5549", "reference_id": "RHSA-2026:5549", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:5549" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:5645", "reference_id": "RHSA-2026:5645", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:5645" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:5665", "reference_id": "RHSA-2026:5665", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:5665" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:5851", "reference_id": "RHSA-2026:5851", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:5851" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:5948", "reference_id": "RHSA-2026:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:5950", "reference_id": "RHSA-2026:5950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:5950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:5952", "reference_id": "RHSA-2026:5952", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:5952" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6055", "reference_id": "RHSA-2026:6055", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6055" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6192", "reference_id": "RHSA-2026:6192", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6192" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6226", "reference_id": "RHSA-2026:6226", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6226" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6251", "reference_id": "RHSA-2026:6251", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6251" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6428", "reference_id": "RHSA-2026:6428", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6428" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6429", "reference_id": "RHSA-2026:6429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6497", "reference_id": "RHSA-2026:6497", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6497" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6554", "reference_id": "RHSA-2026:6554", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6554" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6564", "reference_id": "RHSA-2026:6564", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6564" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6567", "reference_id": "RHSA-2026:6567", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6567" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6568", "reference_id": "RHSA-2026:6568", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6568" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7249", "reference_id": "RHSA-2026:7249", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7249" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7854", "reference_id": "RHSA-2026:7854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7854" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8151", "reference_id": "RHSA-2026:8151", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8151" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8229", "reference_id": "RHSA-2026:8229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8448", "reference_id": "RHSA-2026:8448", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8448" }, { "reference_url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc", "reference_id": "Vd2tYVM8eUc", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-29T18:29:58Z/" } ], "url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923811?format=api", "purl": "pkg:deb/debian/golang-1.15@0?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2025-61728" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5q9b-a7c4-1yht" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36626?format=api", "vulnerability_id": "VCID-5wtx-278c-nycq", "summary": "Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33198.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33198.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33198", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08775", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08824", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08702", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08872", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08801", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.0885", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08782", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.0886", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08886", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08885", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08853", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08839", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08727", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33198" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33198", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33198" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575", "reference_id": "1989575", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "reference_url": "https://security.archlinux.org/ASA-202106-42", "reference_id": "ASA-202106-42", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-42" }, { "reference_url": "https://security.archlinux.org/AVG-2006", "reference_id": "AVG-2006", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2006" }, { "reference_url": "https://security.gentoo.org/glsa/202208-02", "reference_id": "GLSA-202208-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2983", "reference_id": "RHSA-2021:2983", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2983" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2984", "reference_id": "RHSA-2021:2984", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2984" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3009", "reference_id": "RHSA-2021:3009", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3009" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3146", "reference_id": "RHSA-2021:3146", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3146" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3229", "reference_id": "RHSA-2021:3229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3248", "reference_id": "RHSA-2021:3248", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3248" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3361", "reference_id": "RHSA-2021:3361", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3361" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3487", "reference_id": "RHSA-2021:3487", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3487" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3555", "reference_id": "RHSA-2021:3555", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3555" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3556", "reference_id": "RHSA-2021:3556", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3556" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3598", "reference_id": "RHSA-2021:3598", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3598" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3759", "reference_id": "RHSA-2021:3759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3820", "reference_id": "RHSA-2021:3820", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3820" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4104", "reference_id": "RHSA-2021:4104", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4104" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4156", "reference_id": "RHSA-2021:4156", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4156" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5072", "reference_id": "RHSA-2021:5072", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5072" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5085", "reference_id": "RHSA-2021:5085", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5085" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5086", "reference_id": "RHSA-2021:5086", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0191", "reference_id": "RHSA-2022:0191", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0191" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0577", "reference_id": "RHSA-2022:0577", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0577" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1329", "reference_id": "RHSA-2022:1329", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1329" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1402", "reference_id": "RHSA-2022:1402", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1402" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7955", "reference_id": "RHSA-2022:7955", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7955" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10289", "reference_id": "RHSA-2024:10289", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10289" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2586", "reference_id": "RHSA-2024:2586", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2586" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2988", "reference_id": "RHSA-2024:2988", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2988" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923819?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.9-5?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.9-5%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2021-33198" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5wtx-278c-nycq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36646?format=api", "vulnerability_id": "VCID-6189-d1tw-bfcp", "summary": "Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30630.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30630.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-30630", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11554", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11471", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11347", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11486", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11517", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11551", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11541", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11482", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11609", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11398", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13886", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13913", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-30630" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107371", "reference_id": "2107371", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107371" }, { "reference_url": "https://go.dev/cl/417065", "reference_id": "417065", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-24T20:38:26Z/" } ], "url": "https://go.dev/cl/417065" }, { "reference_url": "https://go.dev/issue/53415", "reference_id": "53415", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-24T20:38:26Z/" } ], "url": "https://go.dev/issue/53415" }, { "reference_url": "https://go.googlesource.com/go/+/fa2d41d0ca736f3ad6b200b2a4e134364e9acc59", "reference_id": "fa2d41d0ca736f3ad6b200b2a4e134364e9acc59", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-24T20:38:26Z/" } ], "url": "https://go.googlesource.com/go/+/fa2d41d0ca736f3ad6b200b2a4e134364e9acc59" }, { "reference_url": "https://security.gentoo.org/glsa/202208-02", "reference_id": "GLSA-202208-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-02" }, { "reference_url": "https://pkg.go.dev/vuln/GO-2022-0527", "reference_id": "GO-2022-0527", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-24T20:38:26Z/" } ], "url": "https://pkg.go.dev/vuln/GO-2022-0527" }, { "reference_url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "reference_id": "nqrv9fbR0zE", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-24T20:38:26Z/" } ], "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5775", "reference_id": "RHSA-2022:5775", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5775" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5799", "reference_id": "RHSA-2022:5799", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5799" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5866", "reference_id": "RHSA-2022:5866", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5866" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6040", "reference_id": "RHSA-2022:6040", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6040" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6042", "reference_id": "RHSA-2022:6042", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6042" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6113", "reference_id": "RHSA-2022:6113", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6113" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6152", "reference_id": "RHSA-2022:6152", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6152" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6188", "reference_id": "RHSA-2022:6188", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6188" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6283", "reference_id": "RHSA-2022:6283", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6283" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6430", "reference_id": "RHSA-2022:6430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7129", "reference_id": "RHSA-2022:7129", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7129" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7519", "reference_id": "RHSA-2022:7519", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7519" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7529", "reference_id": "RHSA-2022:7529", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7529" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7648", "reference_id": "RHSA-2022:7648", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7648" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8057", "reference_id": "RHSA-2022:8057", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8057" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8098", "reference_id": "RHSA-2022:8098", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8098" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8250", "reference_id": "RHSA-2022:8250", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8250" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:9047", "reference_id": "RHSA-2022:9047", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:9047" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0407", "reference_id": "RHSA-2023:0407", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0407" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0408", "reference_id": "RHSA-2023:0408", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0408" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1042", "reference_id": "RHSA-2023:1042", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1042" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1275", "reference_id": "RHSA-2023:1275", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1275" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1529", "reference_id": "RHSA-2023:1529", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1529" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2357", "reference_id": "RHSA-2023:2357", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2357" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2758", "reference_id": "RHSA-2023:2758", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2758" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2802", "reference_id": "RHSA-2023:2802", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2802" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3642", "reference_id": "RHSA-2023:3642", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3642" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2180", "reference_id": "RHSA-2024:2180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2180" }, { "reference_url": "https://usn.ubuntu.com/6038-1/", "reference_id": "USN-6038-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6038-1/" }, { "reference_url": "https://usn.ubuntu.com/6038-2/", "reference_id": "USN-6038-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6038-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923811?format=api", "purl": "pkg:deb/debian/golang-1.15@0?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-30630" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6189-d1tw-bfcp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64344?format=api", "vulnerability_id": "VCID-6a6z-bq7m-c3gf", "summary": "crypto/x509: Panic in name constraint checking for malformed certificates in crypto/x509", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27138.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27138.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-27138", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05215", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05245", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05749", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05894", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05741", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05778", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05784", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05792", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05813", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05788", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09915", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09952", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-27138" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445344", "reference_id": "2445344", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445344" }, { "reference_url": "https://go.dev/cl/752183", "reference_id": "752183", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-10T13:34:15Z/" } ], "url": "https://go.dev/cl/752183" }, { "reference_url": "https://go.dev/issue/77953", "reference_id": "77953", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-10T13:34:15Z/" } ], "url": "https://go.dev/issue/77953" }, { "reference_url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk", "reference_id": "EdhZqrQ98hk", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-10T13:34:15Z/" } ], "url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk" }, { "reference_url": "https://pkg.go.dev/vuln/GO-2026-4600", "reference_id": "GO-2026-4600", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-10T13:34:15Z/" } ], "url": "https://pkg.go.dev/vuln/GO-2026-4600" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923811?format=api", "purl": "pkg:deb/debian/golang-1.15@0?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2026-27138" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6a6z-bq7m-c3gf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64686?format=api", "vulnerability_id": "VCID-6rkv-zkwa-mqhf", "summary": "os: os: Information disclosure via path traversal using specially crafted filenames", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-22873.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-22873.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-22873", "reference_id": "", "reference_type": "", "scores": [ { "value": "3e-05", "scoring_system": "epss", "scoring_elements": "0.00136", "published_at": "2026-04-26T12:55:00Z" }, { "value": "3e-05", "scoring_system": "epss", "scoring_elements": "0.00101", "published_at": "2026-04-08T12:55:00Z" }, { "value": "3e-05", "scoring_system": "epss", "scoring_elements": "0.00102", "published_at": "2026-04-12T12:55:00Z" }, { "value": "3e-05", "scoring_system": "epss", "scoring_elements": "0.00133", "published_at": "2026-04-18T12:55:00Z" }, { "value": "3e-05", "scoring_system": "epss", "scoring_elements": "0.00132", "published_at": "2026-04-16T12:55:00Z" }, { "value": "4e-05", "scoring_system": "epss", "scoring_elements": "0.00148", "published_at": "2026-04-04T12:55:00Z" }, { "value": "4e-05", "scoring_system": "epss", "scoring_elements": "0.00178", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-22873" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1104816", "reference_id": "1104816", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1104816" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2436992", "reference_id": "2436992", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2436992" }, { "reference_url": "https://groups.google.com/g/golang-announce/c/UZoIkUT367A/m/5WDxKizJAQAJ", "reference_id": "5WDxKizJAQAJ", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-05T15:03:11Z/" } ], "url": "https://groups.google.com/g/golang-announce/c/UZoIkUT367A/m/5WDxKizJAQAJ" }, { "reference_url": "https://go.dev/cl/670036", "reference_id": "670036", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-05T15:03:11Z/" } ], "url": "https://go.dev/cl/670036" }, { "reference_url": "https://go.dev/issue/73555", "reference_id": "73555", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-05T15:03:11Z/" } ], "url": "https://go.dev/issue/73555" }, { "reference_url": "https://security.archlinux.org/ASA-202505-12", "reference_id": "ASA-202505-12", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202505-12" }, { "reference_url": "https://security.archlinux.org/AVG-2878", "reference_id": "AVG-2878", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2878" }, { "reference_url": "https://pkg.go.dev/vuln/GO-2026-4403", "reference_id": "GO-2026-4403", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-05T15:03:11Z/" } ], "url": "https://pkg.go.dev/vuln/GO-2026-4403" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923811?format=api", "purl": "pkg:deb/debian/golang-1.15@0?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2025-22873" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6rkv-zkwa-mqhf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36618?format=api", "vulnerability_id": "VCID-7ahs-f1qh-g7an", "summary": "Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3114.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3114.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3114", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11299", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11426", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11439", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11498", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11286", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11368", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11432", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.114", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30798", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.3068", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30991", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30957", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30978", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31008", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3114" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7919", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7919" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3114", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3114" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918750", "reference_id": "1918750", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918750" }, { "reference_url": "https://security.archlinux.org/ASA-202101-27", "reference_id": "ASA-202101-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202101-27" }, { "reference_url": "https://security.archlinux.org/AVG-1481", "reference_id": "AVG-1481", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1481" }, { "reference_url": "https://security.gentoo.org/glsa/202208-02", "reference_id": "GLSA-202208-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0957", "reference_id": "RHSA-2021:0957", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0957" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0958", "reference_id": "RHSA-2021:0958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1006", "reference_id": "RHSA-2021:1006", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1006" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1338", "reference_id": "RHSA-2021:1338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1338" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1339", "reference_id": "RHSA-2021:1339", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1339" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1366", "reference_id": "RHSA-2021:1366", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1366" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1551", "reference_id": "RHSA-2021:1551", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1551" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1746", "reference_id": "RHSA-2021:1746", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1746" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2021", "reference_id": "RHSA-2021:2021", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2021" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2041", "reference_id": "RHSA-2021:2041", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2041" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2093", "reference_id": "RHSA-2021:2093", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2093" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2095", "reference_id": "RHSA-2021:2095", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2095" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2437", "reference_id": "RHSA-2021:2437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2438", "reference_id": "RHSA-2021:2438", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2438" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2532", "reference_id": "RHSA-2021:2532", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2532" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2543", "reference_id": "RHSA-2021:2543", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2543" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2920", "reference_id": "RHSA-2021:2920", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2920" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3119", "reference_id": "RHSA-2021:3119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3119" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3748", "reference_id": "RHSA-2021:3748", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3748" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4103", "reference_id": "RHSA-2021:4103", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4103" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4226", "reference_id": "RHSA-2021:4226", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4226" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0308", "reference_id": "RHSA-2022:0308", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0308" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923817?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.7-1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.7-1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2021-3114" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7ahs-f1qh-g7an" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36640?format=api", "vulnerability_id": "VCID-7e1n-pvrt-g3fy", "summary": "Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24921.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24921.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24921", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04592", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04614", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04626", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04661", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04673", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04667", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04649", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04632", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.046", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.0461", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.0475", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04784", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04822", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24921" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24921", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24921" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064857", "reference_id": "2064857", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064857" }, { "reference_url": "https://security.gentoo.org/glsa/202208-02", "reference_id": "GLSA-202208-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5068", "reference_id": "RHSA-2022:5068", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5068" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5337", "reference_id": "RHSA-2022:5337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5337" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5415", "reference_id": "RHSA-2022:5415", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5415" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5729", "reference_id": "RHSA-2022:5729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5729" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5730", "reference_id": "RHSA-2022:5730", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5730" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5799", "reference_id": "RHSA-2022:5799", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5799" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6040", "reference_id": "RHSA-2022:6040", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6040" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6042", "reference_id": "RHSA-2022:6042", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6042" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6156", "reference_id": "RHSA-2022:6156", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6156" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6277", "reference_id": "RHSA-2022:6277", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6277" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6714", "reference_id": "RHSA-2022:6714", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6714" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0407", "reference_id": "RHSA-2023:0407", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0407" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-24921" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7e1n-pvrt-g3fy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36636?format=api", "vulnerability_id": "VCID-835d-4cep-d3ff", "summary": "Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23772.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23772.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23772", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10135", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.102", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10097", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10172", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10233", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10269", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.1019", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10171", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10228", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10209", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10081", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10058", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11157", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23772" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23772", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23772" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053532", "reference_id": "2053532", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053532" }, { "reference_url": "https://security.gentoo.org/glsa/202208-02", "reference_id": "GLSA-202208-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1819", "reference_id": "RHSA-2022:1819", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1819" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4860", "reference_id": "RHSA-2022:4860", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4860" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4863", "reference_id": "RHSA-2022:4863", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4863" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5004", "reference_id": "RHSA-2022:5004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5068", "reference_id": "RHSA-2022:5068", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5068" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5730", "reference_id": "RHSA-2022:5730", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5730" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6155", "reference_id": "RHSA-2022:6155", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6155" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6156", "reference_id": "RHSA-2022:6156", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6156" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6526", "reference_id": "RHSA-2022:6526", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6526" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0408", "reference_id": "RHSA-2023:0408", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0408" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1529", "reference_id": "RHSA-2023:1529", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1529" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3914", "reference_id": "RHSA-2023:3914", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3914" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5754", "reference_id": "RHSA-2024:5754", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5754" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6412", "reference_id": "RHSA-2024:6412", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6412" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923824?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u3?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u3%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-23772" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-835d-4cep-d3ff" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36619?format=api", "vulnerability_id": "VCID-8c9g-rytj-z3g7", "summary": "Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3115.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3115.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3115", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32476", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32189", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.3247", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32305", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.3262", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32656", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32477", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32525", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32552", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32555", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32518", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32491", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32503", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3115" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3115", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3115" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918761", "reference_id": "1918761", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918761" }, { "reference_url": "https://security.archlinux.org/ASA-202101-27", "reference_id": "ASA-202101-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202101-27" }, { "reference_url": "https://security.archlinux.org/AVG-1481", "reference_id": "AVG-1481", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1481" }, { "reference_url": "https://security.gentoo.org/glsa/202208-02", "reference_id": "GLSA-202208-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1338", "reference_id": "RHSA-2021:1338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1338" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1339", "reference_id": "RHSA-2021:1339", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1339" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1746", "reference_id": "RHSA-2021:1746", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1746" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2021", "reference_id": "RHSA-2021:2021", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2021" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2093", "reference_id": "RHSA-2021:2093", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2093" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2095", "reference_id": "RHSA-2021:2095", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2095" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923817?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.7-1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.7-1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2021-3115" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8c9g-rytj-z3g7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80083?format=api", "vulnerability_id": "VCID-aya4-n4ch-3ydm", "summary": "golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39293.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39293.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-39293", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11667", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11612", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11693", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11652", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.1179", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11834", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11618", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11703", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11758", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11769", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11731", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11706", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11568", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.1157", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-39293" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39293", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39293" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006044", "reference_id": "2006044", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006044" }, { "reference_url": "https://security.archlinux.org/AVG-2370", "reference_id": "AVG-2370", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2370" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4902", "reference_id": "RHSA-2021:4902", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4902" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0432", "reference_id": "RHSA-2022:0432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0434", "reference_id": "RHSA-2022:0434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0655", "reference_id": "RHSA-2022:0655", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0655" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1819", "reference_id": "RHSA-2022:1819", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1819" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4814", "reference_id": "RHSA-2022:4814", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4814" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923822?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2021-39293" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aya4-n4ch-3ydm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36627?format=api", "vulnerability_id": "VCID-ayxa-s9j4-k7hd", "summary": "Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-34558.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-34558.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-34558", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00917", "scoring_system": "epss", "scoring_elements": "0.7599", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00917", "scoring_system": "epss", "scoring_elements": "0.75955", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00917", "scoring_system": "epss", "scoring_elements": "0.75957", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00917", "scoring_system": "epss", "scoring_elements": "0.75942", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00917", "scoring_system": "epss", "scoring_elements": "0.7598", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00917", "scoring_system": "epss", "scoring_elements": "0.75899", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00917", "scoring_system": "epss", "scoring_elements": "0.75878", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00917", "scoring_system": "epss", "scoring_elements": "0.75911", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00917", "scoring_system": "epss", "scoring_elements": "0.75924", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00917", "scoring_system": "epss", "scoring_elements": "0.75947", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00917", "scoring_system": "epss", "scoring_elements": "0.75925", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00917", "scoring_system": "epss", "scoring_elements": "0.75918", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01475", "scoring_system": "epss", "scoring_elements": "0.80907", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01475", "scoring_system": "epss", "scoring_elements": "0.80898", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-34558" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34558", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34558" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596", "reference_id": "1983596", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "reference_url": "https://security.archlinux.org/ASA-202107-42", "reference_id": "ASA-202107-42", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-42" }, { "reference_url": "https://security.archlinux.org/AVG-2147", "reference_id": "AVG-2147", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2147" }, { "reference_url": "https://security.gentoo.org/glsa/202208-02", "reference_id": "GLSA-202208-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2983", "reference_id": "RHSA-2021:2983", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2983" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2984", "reference_id": "RHSA-2021:2984", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2984" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3009", "reference_id": "RHSA-2021:3009", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3009" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3015", "reference_id": "RHSA-2021:3015", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3015" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3076", "reference_id": "RHSA-2021:3076", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3076" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3146", "reference_id": "RHSA-2021:3146", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3146" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3229", "reference_id": "RHSA-2021:3229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3248", "reference_id": "RHSA-2021:3248", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3248" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3361", "reference_id": "RHSA-2021:3361", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3361" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3555", "reference_id": "RHSA-2021:3555", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3555" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3556", "reference_id": "RHSA-2021:3556", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3556" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3598", "reference_id": "RHSA-2021:3598", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3598" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3733", "reference_id": "RHSA-2021:3733", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3733" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3759", "reference_id": "RHSA-2021:3759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3820", "reference_id": "RHSA-2021:3820", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3820" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4104", "reference_id": "RHSA-2021:4104", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4104" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4226", "reference_id": "RHSA-2021:4226", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4226" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4582", "reference_id": "RHSA-2021:4582", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4582" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4722", "reference_id": "RHSA-2021:4722", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4722" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5085", "reference_id": "RHSA-2021:5085", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5085" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5086", "reference_id": "RHSA-2021:5086", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0191", "reference_id": "RHSA-2022:0191", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0191" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0237", "reference_id": "RHSA-2022:0237", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0237" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0260", "reference_id": "RHSA-2022:0260", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0260" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0577", "reference_id": "RHSA-2022:0577", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0577" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0988", "reference_id": "RHSA-2022:0988", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0988" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0998", "reference_id": "RHSA-2022:0998", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0998" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1329", "reference_id": "RHSA-2022:1329", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1329" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1372", "reference_id": "RHSA-2022:1372", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1372" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7954", "reference_id": "RHSA-2022:7954", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7954" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2988", "reference_id": "RHSA-2024:2988", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2988" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923821?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.9-6?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.9-6%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2021-34558" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ayxa-s9j4-k7hd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36615?format=api", "vulnerability_id": "VCID-bhax-mgs9-t3ga", "summary": "Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27918.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27918.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-27918", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06549", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06613", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06657", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06638", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06687", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06721", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.0672", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06714", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06707", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06641", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06633", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06789", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06797", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06816", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-27918" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27918", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27918" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937901", "reference_id": "1937901", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937901" }, { "reference_url": "https://security.archlinux.org/AVG-1668", "reference_id": "AVG-1668", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1668" }, { "reference_url": "https://security.gentoo.org/glsa/202208-02", "reference_id": "GLSA-202208-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2704", "reference_id": "RHSA-2021:2704", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2704" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2705", "reference_id": "RHSA-2021:2705", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2705" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3076", "reference_id": "RHSA-2021:3076", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3076" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3555", "reference_id": "RHSA-2021:3555", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3555" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3556", "reference_id": "RHSA-2021:3556", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3556" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923816?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.9-1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.9-1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2021-27918" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bhax-mgs9-t3ga" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36614?format=api", "vulnerability_id": "VCID-ce67-xmrt-yfd1", "summary": "Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28367.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28367.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-28367", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50592", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50664", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50709", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50656", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50645", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50671", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50626", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50682", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50678", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.5072", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50697", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50723", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50729", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-28367" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28367", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28367" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897646", "reference_id": "1897646", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897646" }, { "reference_url": "https://security.archlinux.org/ASA-202011-16", "reference_id": "ASA-202011-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202011-16" }, { "reference_url": "https://security.archlinux.org/AVG-1278", "reference_id": "AVG-1278", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1278" }, { "reference_url": "https://security.gentoo.org/glsa/202208-02", "reference_id": "GLSA-202208-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5333", "reference_id": "RHSA-2020:5333", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5333" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5493", "reference_id": "RHSA-2020:5493", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5493" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0145", "reference_id": "RHSA-2021:0145", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0145" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0146", "reference_id": "RHSA-2021:0146", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0146" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923815?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.5-1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.5-1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2020-28367" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ce67-xmrt-yfd1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36621?format=api", "vulnerability_id": "VCID-cr7c-xuh8-guhy", "summary": "Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-31525.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-31525.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-31525", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05976", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05941", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.0591", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05765", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05758", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05793", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05799", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05808", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05829", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05804", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05766", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.0577", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.0573", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05695", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-31525" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31525", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31525" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/golang/go", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/golang/go" }, { "reference_url": "https://github.com/golang/go/issues/45710", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/golang/go/issues/45710" }, { "reference_url": "https://go.dev/cl/313069", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://go.dev/cl/313069" }, { "reference_url": "https://go.dev/issue/45710", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://go.dev/issue/45710" }, { "reference_url": "https://go.googlesource.com/net/+/89ef3d95e781148a0951956029c92a211477f7f9", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://go.googlesource.com/net/+/89ef3d95e781148a0951956029c92a211477f7f9" }, { "reference_url": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ISRZZ6NY5R2TBYE72KZFOCO25TEUQTBF", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ISRZZ6NY5R2TBYE72KZFOCO25TEUQTBF" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525" }, { "reference_url": "https://pkg.go.dev/vuln/GO-2022-0236", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://pkg.go.dev/vuln/GO-2022-0236" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341", "reference_id": "1958341", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341" }, { "reference_url": "https://security.archlinux.org/AVG-1927", "reference_id": "AVG-1927", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1927" }, { "reference_url": "https://security.gentoo.org/glsa/202208-02", "reference_id": "GLSA-202208-02", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.gentoo.org/glsa/202208-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2543", "reference_id": "RHSA-2021:2543", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2543" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2704", "reference_id": "RHSA-2021:2704", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2704" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2705", "reference_id": "RHSA-2021:2705", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2705" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2983", "reference_id": "RHSA-2021:2983", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2983" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2984", "reference_id": "RHSA-2021:2984", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2984" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3076", "reference_id": "RHSA-2021:3076", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3076" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3248", "reference_id": "RHSA-2021:3248", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3248" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3487", "reference_id": "RHSA-2021:3487", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3487" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3555", "reference_id": "RHSA-2021:3555", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3555" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3556", "reference_id": "RHSA-2021:3556", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3556" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3733", "reference_id": "RHSA-2021:3733", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3733" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3748", "reference_id": "RHSA-2021:3748", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3748" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3759", "reference_id": "RHSA-2021:3759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4103", "reference_id": "RHSA-2021:4103", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4103" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4104", "reference_id": "RHSA-2021:4104", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4104" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5072", "reference_id": "RHSA-2021:5072", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5072" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0191", "reference_id": "RHSA-2022:0191", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0191" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0308", "reference_id": "RHSA-2022:0308", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0308" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0577", "reference_id": "RHSA-2022:0577", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0577" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923818?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.9-2?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.9-2%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2021-31525", "GHSA-h86h-8ppg-mxmh" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cr7c-xuh8-guhy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36458?format=api", "vulnerability_id": "VCID-dwge-3up7-yyaq", "summary": "Withdrawn Advisory: Infinite loop in xz\n### Withdrawn Advisory\nThis advisory has been withdrawn because alerts cannot be issued for the Go standard library at this time.\n\n### Original Description\nGo before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16845.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16845.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-16845", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.34916", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35253", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35249", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35224", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35179", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35298", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.3527", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.3507", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.3517", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.34935", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35232", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35194", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35218", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-16845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7919", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7919" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3114", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3114" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b" }, { "reference_url": "https://github.com/ulikunitz/xz/issues/35", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/ulikunitz/xz/issues/35" }, { "reference_url": "https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo" }, { "reference_url": "https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20200924-0002", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20200924-0002" }, { "reference_url": "https://www.debian.org/security/2021/dsa-4848", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.debian.org/security/2021/dsa-4848" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuApr2021.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099", "reference_id": "1867099", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3665", "reference_id": "RHSA-2020:3665", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3665" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4201", "reference_id": "RHSA-2020:4201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4201" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4214", "reference_id": "RHSA-2020:4214", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4214" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4297", "reference_id": "RHSA-2020:4297", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4297" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5118", "reference_id": "RHSA-2020:5118", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5118" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5119", "reference_id": "RHSA-2020:5119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5119" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5159", "reference_id": "RHSA-2020:5159", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5159" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5605", "reference_id": "RHSA-2020:5605", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5605" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5606", "reference_id": "RHSA-2020:5606", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5606" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5649", "reference_id": "RHSA-2020:5649", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5649" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0072", "reference_id": "RHSA-2021:0072", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0072" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0172", "reference_id": "RHSA-2021:0172", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0172" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0713", "reference_id": "RHSA-2021:0713", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0713" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0956", "reference_id": "RHSA-2021:0956", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0956" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1016", "reference_id": "RHSA-2021:1016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1016" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1366", "reference_id": "RHSA-2021:1366", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1366" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1515", "reference_id": "RHSA-2021:1515", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2122", "reference_id": "RHSA-2021:2122", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2122" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4103", "reference_id": "RHSA-2021:4103", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4103" }, { "reference_url": "https://usn.ubuntu.com/5725-1/", "reference_id": "USN-5725-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5725-1/" }, { "reference_url": "https://usn.ubuntu.com/5725-2/", "reference_id": "USN-5725-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5725-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923813?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15~rc2-1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15~rc2-1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2020-16845", "GHSA-q6gq-997w-f55g" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dwge-3up7-yyaq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/350604?format=api", "vulnerability_id": "VCID-gtys-5r5h-p7ht", "summary": "", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-33810.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-33810.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-33810", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01216", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01404", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01399", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01389", "published_at": "2026-04-21T12:55:00Z" }, { "value": "5e-05", "scoring_system": "epss", "scoring_elements": "0.00276", "published_at": "2026-04-08T12:55:00Z" }, { "value": "5e-05", "scoring_system": "epss", "scoring_elements": "0.00274", "published_at": "2026-04-09T12:55:00Z" }, { "value": "5e-05", "scoring_system": "epss", "scoring_elements": "0.00212", "published_at": "2026-04-11T12:55:00Z" }, { "value": "5e-05", "scoring_system": "epss", "scoring_elements": "0.00211", "published_at": "2026-04-13T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00967", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-33810" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU", "reference_id": "0uYbvbPZRWU", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-13T17:48:57Z/" } ], "url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456335", "reference_id": "2456335", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456335" }, { "reference_url": "https://go.dev/cl/763763", "reference_id": "763763", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-13T17:48:57Z/" } ], "url": "https://go.dev/cl/763763" }, { "reference_url": "https://go.dev/issue/78332", "reference_id": "78332", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-13T17:48:57Z/" } ], "url": "https://go.dev/issue/78332" }, { "reference_url": "https://pkg.go.dev/vuln/GO-2026-4866", "reference_id": "GO-2026-4866", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-13T17:48:57Z/" } ], "url": "https://pkg.go.dev/vuln/GO-2026-4866" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:10155", "reference_id": "RHSA-2026:10155", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:10155" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:10158", "reference_id": "RHSA-2026:10158", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:10158" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9385", "reference_id": "RHSA-2026:9385", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9385" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923811?format=api", "purl": "pkg:deb/debian/golang-1.15@0?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2026-33810" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gtys-5r5h-p7ht" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/258004?format=api", "vulnerability_id": "VCID-h2xu-3fm4-hkap", "summary": "On Darwin, building a Go module which contains CGO can trigger arbitrary code execution when using the Apple version of ld, due to usage of the -lto_library flag in a \"#cgo LDFLAGS\" directive.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-24787", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02711", "scoring_system": "epss", "scoring_elements": "0.85954", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02711", "scoring_system": "epss", "scoring_elements": "0.85854", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02711", "scoring_system": "epss", "scoring_elements": "0.85871", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02711", "scoring_system": "epss", "scoring_elements": "0.85875", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02711", "scoring_system": "epss", "scoring_elements": "0.85894", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02711", "scoring_system": "epss", "scoring_elements": "0.85904", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02711", "scoring_system": "epss", "scoring_elements": "0.85918", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02711", "scoring_system": "epss", "scoring_elements": "0.85916", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02711", "scoring_system": "epss", "scoring_elements": "0.8591", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02711", "scoring_system": "epss", "scoring_elements": "0.85928", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02711", "scoring_system": "epss", "scoring_elements": "0.85933", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02711", "scoring_system": "epss", "scoring_elements": "0.85924", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02711", "scoring_system": "epss", "scoring_elements": "0.85945", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-24787" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/08/3", "reference_id": "3", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-05T14:49:29Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/05/08/3" }, { "reference_url": "https://go.dev/cl/583815", "reference_id": "583815", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-05T14:49:29Z/" } ], "url": "https://go.dev/cl/583815" }, { "reference_url": "https://go.dev/issue/67119", "reference_id": "67119", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-05T14:49:29Z/" } ], "url": "https://go.dev/issue/67119" }, { "reference_url": "https://pkg.go.dev/vuln/GO-2024-2825", "reference_id": "GO-2024-2825", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-05T14:49:29Z/" } ], "url": "https://pkg.go.dev/vuln/GO-2024-2825" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240531-0006/", "reference_id": "ntap-20240531-0006", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-05T14:49:29Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240531-0006/" }, { "reference_url": "https://groups.google.com/g/golang-announce/c/wkkO4P9stm0", "reference_id": "wkkO4P9stm0", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-05T14:49:29Z/" } ], "url": "https://groups.google.com/g/golang-announce/c/wkkO4P9stm0" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923811?format=api", "purl": "pkg:deb/debian/golang-1.15@0?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2024-24787" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h2xu-3fm4-hkap" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48341?format=api", "vulnerability_id": "VCID-h3bw-m2us-cbgz", "summary": "Multiple vulnerabilities have been discovered in Go, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32190.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32190.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32190", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24544", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24613", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24557", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38718", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38698", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38708", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38719", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38681", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38655", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38702", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.3868", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38647", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38696", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32190" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124668", "reference_id": "2124668", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124668" }, { "reference_url": "https://security.gentoo.org/glsa/202209-26", "reference_id": "GLSA-202209-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202209-26" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7398", "reference_id": "RHSA-2022:7398", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7398" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7399", "reference_id": "RHSA-2022:7399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8634", "reference_id": "RHSA-2022:8634", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8634" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0264", "reference_id": "RHSA-2023:0264", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0264" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0584", "reference_id": "RHSA-2023:0584", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0584" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0693", "reference_id": "RHSA-2023:0693", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0693" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3204", "reference_id": "RHSA-2023:3204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3205", "reference_id": "RHSA-2023:3205", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3205" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3613", "reference_id": "RHSA-2023:3613", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3613" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3642", "reference_id": "RHSA-2023:3642", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3642" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3742", "reference_id": "RHSA-2023:3742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0485", "reference_id": "RHSA-2024:0485", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0485" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923811?format=api", "purl": "pkg:deb/debian/golang-1.15@0?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-32190" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h3bw-m2us-cbgz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/266545?format=api", "vulnerability_id": "VCID-j7b3-yz47-pbdp", "summary": "Infinite loop in Read in crypto/rand before Go 1.17.11 and Go 1.18.3 on Windows allows attacker to cause an indefinite hang by passing a buffer larger than 1 << 32 - 1 bytes.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-30634", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23235", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23586", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23623", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23401", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23473", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23522", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23539", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23498", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23444", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.2346", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23452", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.2343", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23245", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-30634" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923811?format=api", "purl": "pkg:deb/debian/golang-1.15@0?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-30634" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j7b3-yz47-pbdp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69448?format=api", "vulnerability_id": "VCID-jsz8-cdt5-27f6", "summary": "crypto/x509: Usage of ExtKeyUsageAny disables policy validation in crypto/x509", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-22874.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-22874.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-22874", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06949", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06899", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22531", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22676", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22752", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22803", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22825", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22787", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22731", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22747", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22742", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22701", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22539", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-22874" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107364", "reference_id": "1107364", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107364" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372320", "reference_id": "2372320", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372320" }, { "reference_url": "https://go.dev/cl/670375", "reference_id": "670375", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-11T17:45:40Z/" } ], "url": "https://go.dev/cl/670375" }, { "reference_url": "https://go.dev/issue/73612", "reference_id": "73612", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-11T17:45:40Z/" } ], "url": "https://go.dev/issue/73612" }, { "reference_url": "https://security.archlinux.org/ASA-202506-4", "reference_id": "ASA-202506-4", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202506-4" }, { "reference_url": "https://security.archlinux.org/AVG-2896", "reference_id": "AVG-2896", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2896" }, { "reference_url": "https://pkg.go.dev/vuln/GO-2025-3749", "reference_id": "GO-2025-3749", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-11T17:45:40Z/" } ], "url": "https://pkg.go.dev/vuln/GO-2025-3749" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10676", "reference_id": "RHSA-2025:10676", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10676" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10677", "reference_id": "RHSA-2025:10677", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10677" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13931", "reference_id": "RHSA-2025:13931", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13931" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13932", "reference_id": "RHSA-2025:13932", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13932" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14470", "reference_id": "RHSA-2025:14470", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14470" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14472", "reference_id": "RHSA-2025:14472", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14472" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14473", "reference_id": "RHSA-2025:14473", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14473" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14476", "reference_id": "RHSA-2025:14476", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14476" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14479", "reference_id": "RHSA-2025:14479", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14479" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14481", "reference_id": "RHSA-2025:14481", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14481" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14484", "reference_id": "RHSA-2025:14484", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14484" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17043", "reference_id": "RHSA-2025:17043", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17043" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17730", "reference_id": "RHSA-2025:17730", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17730" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17731", "reference_id": "RHSA-2025:17731", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17731" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19003", "reference_id": "RHSA-2025:19003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19890", "reference_id": "RHSA-2025:19890", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19890" }, { "reference_url": "https://groups.google.com/g/golang-announce/c/ufZ8WpEsA3A", "reference_id": "ufZ8WpEsA3A", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-11T17:45:40Z/" } ], "url": "https://groups.google.com/g/golang-announce/c/ufZ8WpEsA3A" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923811?format=api", "purl": "pkg:deb/debian/golang-1.15@0?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2025-22874" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jsz8-cdt5-27f6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36623?format=api", "vulnerability_id": "VCID-kd6v-aemf-3khm", "summary": "Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33196.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33196.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33196", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16782", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16901", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16802", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.1768", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17725", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17445", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17536", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17595", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17613", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17566", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17514", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17458", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17467", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17517", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33196" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33196", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33196" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965503", "reference_id": "1965503", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965503" }, { "reference_url": "https://security.archlinux.org/ASA-202106-42", "reference_id": "ASA-202106-42", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-42" }, { "reference_url": "https://security.archlinux.org/AVG-2006", "reference_id": "AVG-2006", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2006" }, { "reference_url": "https://security.gentoo.org/glsa/202208-02", "reference_id": "GLSA-202208-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2634", "reference_id": "RHSA-2021:2634", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2634" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2704", "reference_id": "RHSA-2021:2704", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2704" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2705", "reference_id": "RHSA-2021:2705", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2705" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2983", "reference_id": "RHSA-2021:2983", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2983" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2984", "reference_id": "RHSA-2021:2984", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2984" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3076", "reference_id": "RHSA-2021:3076", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3076" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3229", "reference_id": "RHSA-2021:3229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3361", "reference_id": "RHSA-2021:3361", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3361" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3555", "reference_id": "RHSA-2021:3555", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3555" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3556", "reference_id": "RHSA-2021:3556", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3556" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3758", "reference_id": "RHSA-2021:3758", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3758" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923820?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.9-4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.9-4%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2021-33196" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kd6v-aemf-3khm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67452?format=api", "vulnerability_id": "VCID-kjf2-r6zt-zqg9", "summary": "net/http: CrossOriginProtection bypass in net/http", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47910.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47910.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-47910", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01189", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01195", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01204", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01211", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01214", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.012", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01194", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01197", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01186", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.0174", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01734", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01641", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02183", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-47910" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1116341", "reference_id": "1116341", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1116341" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2397528", "reference_id": "2397528", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2397528" }, { "reference_url": "https://go.dev/cl/699275", "reference_id": "699275", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-24T13:29:38Z/" } ], "url": "https://go.dev/cl/699275" }, { "reference_url": "https://go.dev/issue/75054", "reference_id": "75054", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-24T13:29:38Z/" } ], "url": "https://go.dev/issue/75054" }, { "reference_url": "https://groups.google.com/g/golang-announce/c/PtW9VW21NPs/m/DJhMQ-m5AQAJ", "reference_id": "DJhMQ-m5AQAJ", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-24T13:29:38Z/" } ], "url": "https://groups.google.com/g/golang-announce/c/PtW9VW21NPs/m/DJhMQ-m5AQAJ" }, { "reference_url": "https://pkg.go.dev/vuln/GO-2025-3955", "reference_id": "GO-2025-3955", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-24T13:29:38Z/" } ], "url": "https://pkg.go.dev/vuln/GO-2025-3955" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923811?format=api", "purl": "pkg:deb/debian/golang-1.15@0?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2025-47910" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kjf2-r6zt-zqg9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/266546?format=api", "vulnerability_id": "VCID-kysh-ukcw-tbcj", "summary": "Incorrect conversion of certain invalid paths to valid, absolute paths in Clean in path/filepath before Go 1.17.11 and Go 1.18.3 on Windows allows potential directory traversal attack.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29804", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15391", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15512", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15582", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15382", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.1547", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.1552", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15485", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15446", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15381", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.153", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15305", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15352", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15394", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29804" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923811?format=api", "purl": "pkg:deb/debian/golang-1.15@0?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-29804" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kysh-ukcw-tbcj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80796?format=api", "vulnerability_id": "VCID-ncjz-1n22-vuax", "summary": "golang: math/big: panic during recursive division of very large numbers", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28362.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28362.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-28362", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37136", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.36888", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37145", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.36921", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37302", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37329", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37156", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37207", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37222", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37232", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37198", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37172", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37218", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37201", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-28362" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28362", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28362" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635", "reference_id": "1897635", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635" }, { "reference_url": "https://security.archlinux.org/ASA-202011-16", "reference_id": "ASA-202011-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202011-16" }, { "reference_url": "https://security.archlinux.org/AVG-1278", "reference_id": "AVG-1278", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1278" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5333", "reference_id": "RHSA-2020:5333", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5333" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5493", "reference_id": "RHSA-2020:5493", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5493" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5633", "reference_id": "RHSA-2020:5633", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5633" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0037", "reference_id": "RHSA-2021:0037", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0037" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0038", "reference_id": "RHSA-2021:0038", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0038" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0039", "reference_id": "RHSA-2021:0039", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0039" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0145", "reference_id": "RHSA-2021:0145", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0145" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0146", "reference_id": "RHSA-2021:0146", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0146" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0172", "reference_id": "RHSA-2021:0172", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0172" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0436", "reference_id": "RHSA-2021:0436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0436" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0568", "reference_id": "RHSA-2021:0568", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0568" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0706", "reference_id": "RHSA-2021:0706", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0706" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0799", "reference_id": "RHSA-2021:0799", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0799" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0956", "reference_id": "RHSA-2021:0956", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0956" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1366", "reference_id": "RHSA-2021:1366", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1366" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1551", "reference_id": "RHSA-2021:1551", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1551" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2041", "reference_id": "RHSA-2021:2041", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2041" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2042", "reference_id": "RHSA-2021:2042", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2042" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2532", "reference_id": "RHSA-2021:2532", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2532" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2543", "reference_id": "RHSA-2021:2543", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2543" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923815?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.5-1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.5-1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2020-28362" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ncjz-1n22-vuax" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/216856?format=api", "vulnerability_id": "VCID-njxh-yaq5-gbf8", "summary": "In Go before 1.13.13 and 1.14.x before 1.14.5, Certificate.Verify may lack a check on the VerifyOptions.KeyUsages EKU requirements (if VerifyOptions.Roots equals nil and the installation is on Windows). Thus, X.509 certificate verification is incomplete.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14039", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00431", "scoring_system": "epss", "scoring_elements": "0.62512", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00431", "scoring_system": "epss", "scoring_elements": "0.6257", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00431", "scoring_system": "epss", "scoring_elements": "0.62603", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00431", "scoring_system": "epss", "scoring_elements": "0.62569", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00431", "scoring_system": "epss", "scoring_elements": "0.62619", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00431", "scoring_system": "epss", "scoring_elements": "0.62635", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00431", "scoring_system": "epss", "scoring_elements": "0.62653", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00431", "scoring_system": "epss", "scoring_elements": "0.62642", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00431", "scoring_system": "epss", "scoring_elements": "0.62618", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00431", "scoring_system": "epss", "scoring_elements": "0.6266", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00431", "scoring_system": "epss", "scoring_elements": "0.62667", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00431", "scoring_system": "epss", "scoring_elements": "0.62649", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00431", "scoring_system": "epss", "scoring_elements": "0.62661", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00431", "scoring_system": "epss", "scoring_elements": "0.62677", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14039" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923811?format=api", "purl": "pkg:deb/debian/golang-1.15@0?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2020-14039" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-njxh-yaq5-gbf8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71945?format=api", "vulnerability_id": "VCID-nwsd-53hk-ffhr", "summary": "crypto/x509: ParsePKCS1PrivateKey panic with partial keys in crypto/x509", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-22865.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-22865.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-22865", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22507", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22201", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22421", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22475", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22495", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22453", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22398", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22416", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22414", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22364", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22214", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2255", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22339", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-22865" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2342464", "reference_id": "2342464", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2342464" }, { "reference_url": "https://go.dev/cl/643098", "reference_id": "643098", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-28T14:58:11Z/" } ], "url": "https://go.dev/cl/643098" }, { "reference_url": "https://go.dev/issue/71216", "reference_id": "71216", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-28T14:58:11Z/" } ], "url": "https://go.dev/issue/71216" }, { "reference_url": "https://groups.google.com/g/golang-dev/c/CAWXhan3Jww/m/bk9LAa-lCgAJ", "reference_id": "bk9LAa-lCgAJ", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-28T14:58:11Z/" } ], "url": "https://groups.google.com/g/golang-dev/c/CAWXhan3Jww/m/bk9LAa-lCgAJ" }, { "reference_url": "https://pkg.go.dev/vuln/GO-2025-3421", "reference_id": "GO-2025-3421", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-28T14:58:11Z/" } ], "url": "https://pkg.go.dev/vuln/GO-2025-3421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:11749", "reference_id": "RHSA-2025:11749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:11749" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:11889", "reference_id": "RHSA-2025:11889", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:11889" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923811?format=api", "purl": "pkg:deb/debian/golang-1.15@0?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2025-22865" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nwsd-53hk-ffhr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64346?format=api", "vulnerability_id": "VCID-pcez-y67t-8yg3", "summary": "net/url: Incorrect parsing of IPv6 host literals in net/url", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-25679.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-25679.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-25679", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08768", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08816", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09743", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09672", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09612", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.0964", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09754", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09771", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09802", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09793", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15881", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16013", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16017", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-25679" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445356", "reference_id": "2445356", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445356" }, { "reference_url": "https://go.dev/cl/752180", "reference_id": "752180", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-10T13:36:26Z/" } ], "url": "https://go.dev/cl/752180" }, { "reference_url": "https://go.dev/issue/77578", "reference_id": "77578", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-10T13:36:26Z/" } ], "url": "https://go.dev/issue/77578" }, { "reference_url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk", "reference_id": "EdhZqrQ98hk", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-10T13:36:26Z/" } ], "url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk" }, { "reference_url": "https://pkg.go.dev/vuln/GO-2026-4601", "reference_id": "GO-2026-4601", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-10T13:36:26Z/" } ], "url": "https://pkg.go.dev/vuln/GO-2026-4601" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:10065", "reference_id": "RHSA-2026:10065", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:10065" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:10125", "reference_id": "RHSA-2026:10125", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:10125" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:10133", "reference_id": "RHSA-2026:10133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:10133" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:10140", "reference_id": "RHSA-2026:10140", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:10140" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:10141", "reference_id": "RHSA-2026:10141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:10141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:10158", "reference_id": "RHSA-2026:10158", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:10158" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:10169", "reference_id": "RHSA-2026:10169", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:10169" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:10175", "reference_id": "RHSA-2026:10175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:10175" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:10184", "reference_id": "RHSA-2026:10184", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:10184" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:10225", "reference_id": "RHSA-2026:10225", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:10225" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:10250", "reference_id": "RHSA-2026:10250", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:10250" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:5110", "reference_id": "RHSA-2026:5110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:5110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:5549", "reference_id": "RHSA-2026:5549", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:5549" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:5941", "reference_id": "RHSA-2026:5941", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:5941" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:5942", "reference_id": "RHSA-2026:5942", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:5942" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:5943", "reference_id": "RHSA-2026:5943", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:5943" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:5944", "reference_id": "RHSA-2026:5944", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:5944" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6341", "reference_id": "RHSA-2026:6341", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6341" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6344", "reference_id": "RHSA-2026:6344", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6344" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6382", "reference_id": "RHSA-2026:6382", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6382" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6383", "reference_id": "RHSA-2026:6383", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6383" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6388", "reference_id": "RHSA-2026:6388", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6388" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6564", "reference_id": "RHSA-2026:6564", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6564" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6720", "reference_id": "RHSA-2026:6720", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6720" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6802", "reference_id": "RHSA-2026:6802", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6802" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6949", "reference_id": "RHSA-2026:6949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7005", "reference_id": "RHSA-2026:7005", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7005" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7009", "reference_id": "RHSA-2026:7009", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7009" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7011", "reference_id": "RHSA-2026:7011", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7011" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7259", "reference_id": "RHSA-2026:7259", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7259" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7315", "reference_id": "RHSA-2026:7315", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7315" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7328", "reference_id": "RHSA-2026:7328", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7328" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7665", "reference_id": "RHSA-2026:7665", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7665" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7669", "reference_id": "RHSA-2026:7669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7674", "reference_id": "RHSA-2026:7674", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7674" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7833", "reference_id": "RHSA-2026:7833", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7833" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7834", "reference_id": "RHSA-2026:7834", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7834" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7876", "reference_id": "RHSA-2026:7876", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7876" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7877", "reference_id": "RHSA-2026:7877", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7877" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7878", "reference_id": "RHSA-2026:7878", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7878" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7879", "reference_id": "RHSA-2026:7879", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7879" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7883", "reference_id": "RHSA-2026:7883", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7883" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7992", "reference_id": "RHSA-2026:7992", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7992" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8151", "reference_id": "RHSA-2026:8151", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8151" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8167", "reference_id": "RHSA-2026:8167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8314", "reference_id": "RHSA-2026:8314", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8314" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8322", "reference_id": "RHSA-2026:8322", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8322" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8324", "reference_id": "RHSA-2026:8324", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8324" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8337", "reference_id": "RHSA-2026:8337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8337" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8338", "reference_id": "RHSA-2026:8338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8338" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8433", "reference_id": "RHSA-2026:8433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8434", "reference_id": "RHSA-2026:8434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8456", "reference_id": "RHSA-2026:8456", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8456" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8483", "reference_id": "RHSA-2026:8483", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8483" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8484", "reference_id": "RHSA-2026:8484", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8484" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8490", "reference_id": "RHSA-2026:8490", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8490" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8491", "reference_id": "RHSA-2026:8491", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8491" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8493", "reference_id": "RHSA-2026:8493", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8493" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8840", "reference_id": "RHSA-2026:8840", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8840" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8841", "reference_id": "RHSA-2026:8841", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8841" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8842", "reference_id": "RHSA-2026:8842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8845", "reference_id": "RHSA-2026:8845", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8845" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8847", "reference_id": "RHSA-2026:8847", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8847" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8848", "reference_id": "RHSA-2026:8848", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8848" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8849", "reference_id": "RHSA-2026:8849", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8849" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8851", "reference_id": "RHSA-2026:8851", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8851" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8852", "reference_id": "RHSA-2026:8852", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8852" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8853", "reference_id": "RHSA-2026:8853", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8853" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8855", "reference_id": "RHSA-2026:8855", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8855" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8856", "reference_id": "RHSA-2026:8856", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8856" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8860", "reference_id": "RHSA-2026:8860", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8860" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8877", "reference_id": "RHSA-2026:8877", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8877" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8878", "reference_id": "RHSA-2026:8878", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8878" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8879", "reference_id": "RHSA-2026:8879", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8879" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8881", "reference_id": "RHSA-2026:8881", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8881" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8882", "reference_id": "RHSA-2026:8882", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8882" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8930", "reference_id": "RHSA-2026:8930", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8930" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8931", "reference_id": "RHSA-2026:8931", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8931" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8949", "reference_id": "RHSA-2026:8949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9043", "reference_id": "RHSA-2026:9043", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9043" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9044", "reference_id": "RHSA-2026:9044", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9044" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9052", "reference_id": "RHSA-2026:9052", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9052" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9090", "reference_id": "RHSA-2026:9090", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9090" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9093", "reference_id": "RHSA-2026:9093", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9093" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9094", "reference_id": "RHSA-2026:9094", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9094" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9097", "reference_id": "RHSA-2026:9097", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9097" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9098", "reference_id": "RHSA-2026:9098", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9098" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9108", "reference_id": "RHSA-2026:9108", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9108" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9109", "reference_id": "RHSA-2026:9109", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9109" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9385", "reference_id": "RHSA-2026:9385", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9385" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9434", "reference_id": "RHSA-2026:9434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9435", "reference_id": "RHSA-2026:9435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9435" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9436", "reference_id": "RHSA-2026:9436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9436" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9439", "reference_id": "RHSA-2026:9439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9439" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9440", "reference_id": "RHSA-2026:9440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9448", "reference_id": "RHSA-2026:9448", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9448" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9453", "reference_id": "RHSA-2026:9453", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9453" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9461", "reference_id": "RHSA-2026:9461", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9461" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9695", "reference_id": "RHSA-2026:9695", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9695" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9742", "reference_id": "RHSA-2026:9742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9872", "reference_id": "RHSA-2026:9872", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9872" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923811?format=api", "purl": "pkg:deb/debian/golang-1.15@0?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2026-25679" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pcez-y67t-8yg3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48753?format=api", "vulnerability_id": "VCID-qemj-x1bx-h7gp", "summary": "Multiple vulnerabilities have been discovered in Go, the worst of which could lead to information leakage or a denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24788.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24788.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-24788", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35119", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.3548", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35504", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35387", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35433", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35458", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35467", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35424", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.354", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.3544", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35428", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35375", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.3514", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-24788" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279814", "reference_id": "2279814", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279814" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/08/3", "reference_id": "3", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T19:38:26Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/05/08/3" }, { "reference_url": "https://go.dev/cl/578375", "reference_id": "578375", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T19:38:26Z/" } ], "url": "https://go.dev/cl/578375" }, { "reference_url": "https://go.dev/issue/66754", "reference_id": "66754", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T19:38:26Z/" } ], "url": "https://go.dev/issue/66754" }, { "reference_url": "https://security.gentoo.org/glsa/202408-07", "reference_id": "GLSA-202408-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202408-07" }, { "reference_url": "https://pkg.go.dev/vuln/GO-2024-2824", "reference_id": "GO-2024-2824", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T19:38:26Z/" } ], "url": "https://pkg.go.dev/vuln/GO-2024-2824" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240605-0002/", "reference_id": "ntap-20240605-0002", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T19:38:26Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240605-0002/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240614-0001/", "reference_id": "ntap-20240614-0001", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T19:38:26Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240614-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4616", "reference_id": "RHSA-2024:4616", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4616" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4697", "reference_id": "RHSA-2024:4697", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4697" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4872", "reference_id": "RHSA-2024:4872", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4872" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4982", "reference_id": "RHSA-2024:4982", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4982" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5013", "reference_id": "RHSA-2024:5013", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5013" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5291", "reference_id": "RHSA-2024:5291", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5291" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5547", "reference_id": "RHSA-2024:5547", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5547" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6221", "reference_id": "RHSA-2024:6221", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6221" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6341", "reference_id": "RHSA-2024:6341", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6341" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6969", "reference_id": "RHSA-2024:6969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7548", "reference_id": "RHSA-2024:7548", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7548" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9089", "reference_id": "RHSA-2024:9089", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9089" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9115", "reference_id": "RHSA-2024:9115", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9115" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9135", "reference_id": "RHSA-2024:9135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9200", "reference_id": "RHSA-2024:9200", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9200" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9277", "reference_id": "RHSA-2024:9277", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9277" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9485", "reference_id": "RHSA-2024:9485", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9485" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:9776", "reference_id": "RHSA-2025:9776", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:9776" }, { "reference_url": "https://usn.ubuntu.com/6886-1/", "reference_id": "USN-6886-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6886-1/" }, { "reference_url": "https://groups.google.com/g/golang-announce/c/wkkO4P9stm0", "reference_id": "wkkO4P9stm0", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T19:38:26Z/" } ], "url": "https://groups.google.com/g/golang-announce/c/wkkO4P9stm0" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923811?format=api", "purl": "pkg:deb/debian/golang-1.15@0?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2024-24788" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qemj-x1bx-h7gp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36628?format=api", "vulnerability_id": "VCID-qn4v-xah4-fya7", "summary": "Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36221.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36221.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-36221", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45869", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45916", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45937", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45885", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45941", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45938", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45961", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45932", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45939", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45991", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45987", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45882", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45892", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-36221" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36221", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36221" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656", "reference_id": "1995656", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991961", "reference_id": "991961", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991961" }, { "reference_url": "https://security.archlinux.org/AVG-2259", "reference_id": "AVG-2259", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2259" }, { "reference_url": "https://security.gentoo.org/glsa/202208-02", "reference_id": "GLSA-202208-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4156", "reference_id": "RHSA-2021:4156", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4156" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4765", "reference_id": "RHSA-2021:4765", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4765" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4766", "reference_id": "RHSA-2021:4766", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4766" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0557", "reference_id": "RHSA-2022:0557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0561", "reference_id": "RHSA-2022:0561", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0561" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0577", "reference_id": "RHSA-2022:0577", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0577" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0855", "reference_id": "RHSA-2022:0855", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0855" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1276", "reference_id": "RHSA-2022:1276", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1276" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1361", "reference_id": "RHSA-2022:1361", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1361" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1372", "reference_id": "RHSA-2022:1372", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1372" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1396", "reference_id": "RHSA-2022:1396", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1396" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7457", "reference_id": "RHSA-2022:7457", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7457" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923822?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2021-36221" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qn4v-xah4-fya7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36629?format=api", "vulnerability_id": "VCID-rmev-jnbb-2yat", "summary": "Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38297.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38297.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-38297", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.10629", "scoring_system": "epss", "scoring_elements": "0.93331", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.10629", "scoring_system": "epss", "scoring_elements": "0.9332", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.10629", "scoring_system": "epss", "scoring_elements": "0.93327", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.13775", "scoring_system": "epss", "scoring_elements": "0.94248", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.13775", "scoring_system": "epss", "scoring_elements": "0.9426", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.13775", "scoring_system": "epss", "scoring_elements": "0.94261", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.13775", "scoring_system": "epss", "scoring_elements": "0.9427", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.13775", "scoring_system": "epss", "scoring_elements": "0.94274", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.13775", "scoring_system": "epss", "scoring_elements": "0.94278", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.13775", "scoring_system": "epss", "scoring_elements": "0.94279", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.13775", "scoring_system": "epss", "scoring_elements": "0.94294", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.13775", "scoring_system": "epss", "scoring_elements": "0.94239", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-38297" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38297", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38297" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2012887", "reference_id": "2012887", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2012887" }, { "reference_url": "https://security.archlinux.org/AVG-2454", "reference_id": "AVG-2454", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2454" }, { "reference_url": "https://security.gentoo.org/glsa/202208-02", "reference_id": "GLSA-202208-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0432", "reference_id": "RHSA-2022:0432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0434", "reference_id": "RHSA-2022:0434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1819", "reference_id": "RHSA-2022:1819", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1819" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923823?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u2?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u2%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2021-38297" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rmev-jnbb-2yat" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81002?format=api", "vulnerability_id": "VCID-skce-3sxx-h3cy", "summary": "golang: default Content-Type setting in net/http/cgi and net/http/fcgi could cause XSS", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24553.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24553.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-24553", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35259", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35579", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35569", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35518", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.3528", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00204", "scoring_system": "epss", "scoring_elements": "0.42589", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00204", "scoring_system": "epss", "scoring_elements": "0.42579", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00204", "scoring_system": "epss", "scoring_elements": "0.42588", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00204", "scoring_system": "epss", "scoring_elements": "0.4261", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00204", "scoring_system": "epss", "scoring_elements": "0.42573", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00204", "scoring_system": "epss", "scoring_elements": "0.42545", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00204", "scoring_system": "epss", "scoring_elements": "0.4249", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00204", "scoring_system": "epss", "scoring_elements": "0.42561", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00204", "scoring_system": "epss", "scoring_elements": "0.42527", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-24553" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24553", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24553" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874857", "reference_id": "1874857", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874857" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969661", "reference_id": "969661", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969661" }, { "reference_url": "https://security.archlinux.org/ASA-202009-3", "reference_id": "ASA-202009-3", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202009-3" }, { "reference_url": "https://security.archlinux.org/AVG-1215", "reference_id": "AVG-1215", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1215" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5493", "reference_id": "RHSA-2020:5493", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5493" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0145", "reference_id": "RHSA-2021:0145", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0145" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0146", "reference_id": "RHSA-2021:0146", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0146" }, { "reference_url": "https://usn.ubuntu.com/4758-1/", "reference_id": "USN-4758-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4758-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923814?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.2-1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.2-1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2020-24553" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-skce-3sxx-h3cy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36630?format=api", "vulnerability_id": "VCID-thkn-q21m-kyfr", "summary": "Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41771.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41771.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-41771", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00868", "scoring_system": "epss", "scoring_elements": "0.75111", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00868", "scoring_system": "epss", "scoring_elements": "0.7523", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00868", "scoring_system": "epss", "scoring_elements": "0.75188", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00868", "scoring_system": "epss", "scoring_elements": "0.75226", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00868", "scoring_system": "epss", "scoring_elements": "0.75114", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00868", "scoring_system": "epss", "scoring_elements": "0.75144", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00868", "scoring_system": "epss", "scoring_elements": "0.75121", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00868", "scoring_system": "epss", "scoring_elements": "0.75155", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00868", "scoring_system": "epss", "scoring_elements": "0.75167", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00868", "scoring_system": "epss", "scoring_elements": "0.75189", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00868", "scoring_system": "epss", "scoring_elements": "0.75192", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00868", "scoring_system": "epss", "scoring_elements": "0.75199", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-41771" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41771", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41771" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2020725", "reference_id": "2020725", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2020725" }, { "reference_url": "https://security.archlinux.org/AVG-2527", "reference_id": "AVG-2527", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2527" }, { "reference_url": "https://security.gentoo.org/glsa/202208-02", "reference_id": "GLSA-202208-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1734", "reference_id": "RHSA-2022:1734", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1734" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1745", "reference_id": "RHSA-2022:1745", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1745" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1747", "reference_id": "RHSA-2022:1747", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1747" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1819", "reference_id": "RHSA-2022:1819", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1819" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923823?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u2?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u2%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2021-41771" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-thkn-q21m-kyfr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79139?format=api", "vulnerability_id": "VCID-urf8-3h24-2fgu", "summary": "golang: os/exec: Code injection in Cmd.Start", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30580.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30580.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-30580", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.1895", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18607", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.19003", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18726", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18806", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18858", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18862", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18814", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18762", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18713", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18742", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18629", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-30580" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2118605", "reference_id": "2118605", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2118605" }, { "reference_url": "https://go.dev/cl/403759", "reference_id": "403759", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-24T20:37:17Z/" } ], "url": "https://go.dev/cl/403759" }, { "reference_url": "https://go.dev/issue/52574", "reference_id": "52574", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-24T20:37:17Z/" } ], "url": "https://go.dev/issue/52574" }, { "reference_url": "https://go.googlesource.com/go/+/960ffa98ce73ef2c2060c84c7ac28d37a83f345e", "reference_id": "960ffa98ce73ef2c2060c84c7ac28d37a83f345e", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-24T20:37:17Z/" } ], "url": "https://go.googlesource.com/go/+/960ffa98ce73ef2c2060c84c7ac28d37a83f345e" }, { "reference_url": "https://pkg.go.dev/vuln/GO-2022-0532", "reference_id": "GO-2022-0532", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-24T20:37:17Z/" } ], "url": "https://pkg.go.dev/vuln/GO-2022-0532" }, { "reference_url": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ", "reference_id": "IWz5T6x7AAAJ", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-24T20:37:17Z/" } ], "url": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923811?format=api", "purl": "pkg:deb/debian/golang-1.15@0?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-30580" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-urf8-3h24-2fgu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36613?format=api", "vulnerability_id": "VCID-vw9d-f7d1-gkhh", "summary": "Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28366.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28366.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-28366", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37702", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37508", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37768", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.3753", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37883", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37908", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37787", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37837", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.3785", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37865", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37828", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37803", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.3783", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-28366" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28366" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897643", "reference_id": "1897643", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897643" }, { "reference_url": "https://security.archlinux.org/ASA-202011-16", "reference_id": "ASA-202011-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202011-16" }, { "reference_url": "https://security.archlinux.org/AVG-1278", "reference_id": "AVG-1278", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1278" }, { "reference_url": "https://security.gentoo.org/glsa/202208-02", "reference_id": "GLSA-202208-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5333", "reference_id": "RHSA-2020:5333", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5333" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5493", "reference_id": "RHSA-2020:5493", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5493" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0145", "reference_id": "RHSA-2021:0145", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0145" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0146", "reference_id": "RHSA-2021:0146", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0146" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923815?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.5-1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.5-1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2020-28366" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vw9d-f7d1-gkhh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36632?format=api", "vulnerability_id": "VCID-w53f-uad6-gqdn", "summary": "Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44716.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44716.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-44716", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.24962", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.24952", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25052", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25024", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26375", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26404", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26396", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26454", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26494", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.265", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26547", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26592", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26444", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-44716" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44716", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44716" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://go.dev/cl/369794", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://go.dev/cl/369794" }, { "reference_url": "https://go.dev/issue/50058", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://go.dev/issue/50058" }, { "reference_url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00016.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00016.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00017.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00017.html" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716" }, { "reference_url": "https://pkg.go.dev/vuln/GO-2022-0288", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://pkg.go.dev/vuln/GO-2022-0288" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0002", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0002" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801", "reference_id": "2030801", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801" }, { "reference_url": "https://security.archlinux.org/AVG-2617", "reference_id": "AVG-2617", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2617" }, { "reference_url": "https://security.gentoo.org/glsa/202208-02", "reference_id": "GLSA-202208-02", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.gentoo.org/glsa/202208-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5160", "reference_id": "RHSA-2021:5160", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5160" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5176", "reference_id": "RHSA-2021:5176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5176" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0001", "reference_id": "RHSA-2022:0001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0002", "reference_id": "RHSA-2022:0002", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0055", "reference_id": "RHSA-2022:0055", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0055" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0056", "reference_id": "RHSA-2022:0056", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0056" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0163", "reference_id": "RHSA-2022:0163", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0163" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0237", "reference_id": "RHSA-2022:0237", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0237" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0260", "reference_id": "RHSA-2022:0260", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0260" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0557", "reference_id": "RHSA-2022:0557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0585", "reference_id": "RHSA-2022:0585", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0585" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0587", "reference_id": "RHSA-2022:0587", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0587" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0842", "reference_id": "RHSA-2022:0842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0855", "reference_id": "RHSA-2022:0855", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0855" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0927", "reference_id": "RHSA-2022:0927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1051", "reference_id": "RHSA-2022:1051", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1051" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1056", "reference_id": "RHSA-2022:1056", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1056" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1361", "reference_id": "RHSA-2022:1361", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1361" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1372", "reference_id": "RHSA-2022:1372", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1372" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1628", "reference_id": "RHSA-2022:1628", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1628" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1734", "reference_id": "RHSA-2022:1734", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1734" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0407", "reference_id": "RHSA-2023:0407", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0407" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0408", "reference_id": "RHSA-2023:0408", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0408" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923823?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u2?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u2%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2021-44716", "GHSA-vc3p-29h2-gpcp" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w53f-uad6-gqdn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81088?format=api", "vulnerability_id": "VCID-w9qm-pwnh-4ydj", "summary": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15586.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15586.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15586", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69813", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69826", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69841", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69817", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69866", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69882", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69904", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69889", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69874", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69916", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69925", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69906", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69958", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69967", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7919", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7919" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3114", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3114" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953", "reference_id": "1856953", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3665", "reference_id": "RHSA-2020:3665", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3665" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4201", "reference_id": "RHSA-2020:4201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4201" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4214", "reference_id": "RHSA-2020:4214", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4214" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4297", "reference_id": "RHSA-2020:4297", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4297" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5118", "reference_id": "RHSA-2020:5118", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5118" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5119", "reference_id": "RHSA-2020:5119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5119" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5605", "reference_id": "RHSA-2020:5605", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5605" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5606", "reference_id": "RHSA-2020:5606", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5606" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5649", "reference_id": "RHSA-2020:5649", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5649" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0072", "reference_id": "RHSA-2021:0072", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0072" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0172", "reference_id": "RHSA-2021:0172", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0172" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0713", "reference_id": "RHSA-2021:0713", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0713" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0956", "reference_id": "RHSA-2021:0956", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0956" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1016", "reference_id": "RHSA-2021:1016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1016" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1366", "reference_id": "RHSA-2021:1366", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1366" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1515", "reference_id": "RHSA-2021:1515", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2122", "reference_id": "RHSA-2021:2122", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2122" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4103", "reference_id": "RHSA-2021:4103", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4103" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923812?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15~rc1-1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15~rc1-1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2020-15586" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w9qm-pwnh-4ydj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36631?format=api", "vulnerability_id": "VCID-wrkj-pngh-rybx", "summary": "Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41772.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41772.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-41772", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19421", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19219", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19333", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19231", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19555", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19602", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19322", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.194", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19451", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19456", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19409", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19351", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19313", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.1932", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-41772" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2020736", "reference_id": "2020736", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2020736" }, { "reference_url": "https://security.archlinux.org/AVG-2527", "reference_id": "AVG-2527", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2527" }, { "reference_url": "https://security.gentoo.org/glsa/202208-02", "reference_id": "GLSA-202208-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5176", "reference_id": "RHSA-2021:5176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5176" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0055", "reference_id": "RHSA-2022:0055", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0055" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0056", "reference_id": "RHSA-2022:0056", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0056" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1734", "reference_id": "RHSA-2022:1734", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1734" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1745", "reference_id": "RHSA-2022:1745", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1745" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1747", "reference_id": "RHSA-2022:1747", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1747" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1819", "reference_id": "RHSA-2022:1819", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1819" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923811?format=api", "purl": "pkg:deb/debian/golang-1.15@0?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2021-41772" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wrkj-pngh-rybx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64347?format=api", "vulnerability_id": "VCID-x5ub-bfb7-nbbr", "summary": "crypto/x509: Incorrect enforcement of email constraints in crypto/x509", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27137.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27137.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-27137", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01692", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.017", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02175", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.0223", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02145", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02132", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02157", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.0216", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02198", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02177", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03112", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03123", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-27137" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445345", "reference_id": "2445345", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445345" }, { "reference_url": "https://go.dev/cl/752182", "reference_id": "752182", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-10T13:32:09Z/" } ], "url": "https://go.dev/cl/752182" }, { "reference_url": "https://go.dev/issue/77952", "reference_id": "77952", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-10T13:32:09Z/" } ], "url": "https://go.dev/issue/77952" }, { "reference_url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk", "reference_id": "EdhZqrQ98hk", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-10T13:32:09Z/" } ], "url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk" }, { "reference_url": "https://pkg.go.dev/vuln/GO-2026-4599", "reference_id": "GO-2026-4599", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-10T13:32:09Z/" } ], "url": "https://pkg.go.dev/vuln/GO-2026-4599" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:10125", "reference_id": "RHSA-2026:10125", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:10125" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:10158", "reference_id": "RHSA-2026:10158", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:10158" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:10169", "reference_id": "RHSA-2026:10169", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:10169" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:10175", "reference_id": "RHSA-2026:10175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:10175" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:10184", "reference_id": "RHSA-2026:10184", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:10184" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:10225", "reference_id": "RHSA-2026:10225", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:10225" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:10250", "reference_id": "RHSA-2026:10250", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:10250" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:5110", "reference_id": "RHSA-2026:5110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:5110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:5549", "reference_id": "RHSA-2026:5549", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:5549" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8151", "reference_id": "RHSA-2026:8151", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8151" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8167", "reference_id": "RHSA-2026:8167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8337", "reference_id": "RHSA-2026:8337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8337" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8338", "reference_id": "RHSA-2026:8338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8338" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8842", "reference_id": "RHSA-2026:8842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9052", "reference_id": "RHSA-2026:9052", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9052" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9385", "reference_id": "RHSA-2026:9385", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9385" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9697", "reference_id": "RHSA-2026:9697", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9697" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9698", "reference_id": "RHSA-2026:9698", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9698" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9699", "reference_id": "RHSA-2026:9699", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9699" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9872", "reference_id": "RHSA-2026:9872", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9872" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923811?format=api", "purl": "pkg:deb/debian/golang-1.15@0?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2026-27137" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x5ub-bfb7-nbbr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/266506?format=api", "vulnerability_id": "VCID-xjm1-yec3-mkc6", "summary": "os.OpenFile(path, os.O_CREATE|O_EXCL) behaved differently on Unix and Windows systems when the target path was a dangling symlink. On Unix systems, OpenFile with O_CREATE and O_EXCL flags never follows symlinks. On Windows, when the target path was a symlink to a nonexistent location, OpenFile would create a file in that location. OpenFile now always returns an error when the O_CREATE and O_EXCL flags are both set and the target path is a symlink.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0913", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03051", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03037", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12041", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12117", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12169", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12176", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.1214", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12108", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.11979", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.11975", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12094", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12073", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12035", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0913" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://go.dev/cl/672396", "reference_id": "672396", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-11T17:35:44Z/" } ], "url": "https://go.dev/cl/672396" }, { "reference_url": "https://go.dev/issue/73702", "reference_id": "73702", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-11T17:35:44Z/" } ], "url": "https://go.dev/issue/73702" }, { "reference_url": "https://pkg.go.dev/vuln/GO-2025-3750", "reference_id": "GO-2025-3750", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-11T17:35:44Z/" } ], "url": "https://pkg.go.dev/vuln/GO-2025-3750" }, { "reference_url": "https://groups.google.com/g/golang-announce/c/ufZ8WpEsA3A", "reference_id": "ufZ8WpEsA3A", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-11T17:35:44Z/" } ], "url": "https://groups.google.com/g/golang-announce/c/ufZ8WpEsA3A" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923811?format=api", "purl": "pkg:deb/debian/golang-1.15@0?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2025-0913" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xjm1-yec3-mkc6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36625?format=api", "vulnerability_id": "VCID-z1ct-cecz-mqer", "summary": "Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33197.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33197.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33197", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11881", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11845", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11905", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11876", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11994", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.12037", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11839", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11922", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11974", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11981", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11944", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11918", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11787", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11785", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33197" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570", "reference_id": "1989570", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "reference_url": "https://security.archlinux.org/ASA-202106-42", "reference_id": "ASA-202106-42", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-42" }, { "reference_url": "https://security.archlinux.org/AVG-2006", "reference_id": "AVG-2006", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2006" }, { "reference_url": "https://security.gentoo.org/glsa/202208-02", "reference_id": "GLSA-202208-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2983", "reference_id": "RHSA-2021:2983", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2983" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2984", "reference_id": "RHSA-2021:2984", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2984" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3009", "reference_id": "RHSA-2021:3009", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3009" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3146", "reference_id": "RHSA-2021:3146", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3146" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3229", "reference_id": "RHSA-2021:3229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3248", "reference_id": "RHSA-2021:3248", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3248" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3361", "reference_id": "RHSA-2021:3361", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3361" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3431", "reference_id": "RHSA-2021:3431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3487", "reference_id": "RHSA-2021:3487", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3487" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3555", "reference_id": "RHSA-2021:3555", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3555" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3556", "reference_id": "RHSA-2021:3556", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3556" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3598", "reference_id": "RHSA-2021:3598", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3598" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3759", "reference_id": "RHSA-2021:3759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3820", "reference_id": "RHSA-2021:3820", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3820" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4104", "reference_id": "RHSA-2021:4104", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4104" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4156", "reference_id": "RHSA-2021:4156", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4156" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4226", "reference_id": "RHSA-2021:4226", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4226" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5072", "reference_id": "RHSA-2021:5072", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5072" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5085", "reference_id": "RHSA-2021:5085", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5085" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5086", "reference_id": "RHSA-2021:5086", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0191", "reference_id": "RHSA-2022:0191", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0191" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0577", "reference_id": "RHSA-2022:0577", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0577" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1329", "reference_id": "RHSA-2022:1329", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1329" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1402", "reference_id": "RHSA-2022:1402", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1402" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7954", "reference_id": "RHSA-2022:7954", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7954" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923819?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.9-5?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.9-5%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2021-33197" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z1ct-cecz-mqer" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36637?format=api", "vulnerability_id": "VCID-z5x6-xqtc-q3at", "summary": "Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23773.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23773.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23773", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30823", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.3087", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30689", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30747", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30779", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30782", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30738", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30692", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30716", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30698", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30664", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30487", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30374", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23773" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23773", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23773" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053541", "reference_id": "2053541", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053541" }, { "reference_url": "https://security.gentoo.org/glsa/202208-02", "reference_id": "GLSA-202208-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1819", "reference_id": "RHSA-2022:1819", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1819" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4860", "reference_id": "RHSA-2022:4860", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4860" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4863", "reference_id": "RHSA-2022:4863", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4863" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5004", "reference_id": "RHSA-2022:5004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5068", "reference_id": "RHSA-2022:5068", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5068" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5729", "reference_id": "RHSA-2022:5729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5729" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5875", "reference_id": "RHSA-2022:5875", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5875" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6094", "reference_id": "RHSA-2022:6094", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6094" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6156", "reference_id": "RHSA-2022:6156", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6156" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0408", "reference_id": "RHSA-2023:0408", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0408" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1529", "reference_id": "RHSA-2023:1529", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1529" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923824?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u3?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u3%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-23773" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z5x6-xqtc-q3at" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" }