Lookup for vulnerable packages by Package URL.

GET /api/packages/941326?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/941326?format=api",
    "purl": "pkg:deb/debian/tomcat10@10.1.52-1~deb12u1?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "tomcat10",
    "version": "10.1.52-1~deb12u1",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "10.1.52-2",
    "latest_non_vulnerable_version": "10.1.54-1",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4420?format=api",
            "vulnerability_id": "VCID-1e6p-cppr-2bh2",
            "summary": "Improper Resource Shutdown or Release vulnerability in Apache Tomcat made Tomcat vulnerable to the made you reset attack.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.9, from 10.1.0-M1 through 10.1.43 and from 9.0.0.M1 through 9.0.107. Older, EOL versions may also be affected.\n\nUsers are recommended to upgrade to one of versions 11.0.10, 10.1.44 or 9.0.108 which fix the issue.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-48989.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-48989.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-48989",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47345",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47384",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47326",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47319",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4732",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47323",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47268",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47322",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47302",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49797",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49768",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49754",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49763",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57646",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-48989"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/73c04a10395774bda71a0b37802cf983662ce255",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/73c04a10395774bda71a0b37802cf983662ce255"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/f362c8eb3b8ec5b7f312f7f5610731c0fb299a06",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/f362c8eb3b8ec5b7f312f7f5610731c0fb299a06"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/f36b8a4eea4ce8a0bc035079e1d259d29f5eb7bf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/f36b8a4eea4ce8a0bc035079e1d259d29f5eb7bf"
                },
                {
                    "reference_url": "https://lists.apache.org/thread/9ydfg0xr0tchmglcprhxgwhj0hfwxlyf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-08-13T18:37:15Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread/9ydfg0xr0tchmglcprhxgwhj0hfwxlyf"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48989",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48989"
                },
                {
                    "reference_url": "https://tomcat.apache.org/security-10.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://tomcat.apache.org/security-10.html"
                },
                {
                    "reference_url": "https://tomcat.apache.org/security-11.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://tomcat.apache.org/security-11.html"
                },
                {
                    "reference_url": "https://tomcat.apache.org/security-9.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://tomcat.apache.org/security-9.html"
                },
                {
                    "reference_url": "https://www.kb.cert.org/vuls/id/767506",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.kb.cert.org/vuls/id/767506"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2025/08/13/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2025/08/13/2"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1111096",
                    "reference_id": "1111096",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1111096"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1111097",
                    "reference_id": "1111097",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1111097"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373309",
                    "reference_id": "2373309",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373309"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48989",
                    "reference_id": "CVE-2025-48989",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Important",
                            "scoring_system": "apache_tomcat",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48989"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-gqp3-2cvr-x8m3",
                    "reference_id": "GHSA-gqp3-2cvr-x8m3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-gqp3-2cvr-x8m3"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:13685",
                    "reference_id": "RHSA-2025:13685",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:13685"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:13686",
                    "reference_id": "RHSA-2025:13686",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:13686"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14177",
                    "reference_id": "RHSA-2025:14177",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14177"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14178",
                    "reference_id": "RHSA-2025:14178",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14178"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14179",
                    "reference_id": "RHSA-2025:14179",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14179"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14180",
                    "reference_id": "RHSA-2025:14180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14180"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14181",
                    "reference_id": "RHSA-2025:14181",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14181"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14182",
                    "reference_id": "RHSA-2025:14182",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14182"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14183",
                    "reference_id": "RHSA-2025:14183",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14183"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:22924",
                    "reference_id": "RHSA-2025:22924",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:22924"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:22925",
                    "reference_id": "RHSA-2025:22925",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:22925"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941305?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.34-0%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.34-0%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941326?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1~deb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941309?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941307?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941308?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1066849?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.54-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.54-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-48989",
                "GHSA-gqp3-2cvr-x8m3"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1e6p-cppr-2bh2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4424?format=api",
            "vulnerability_id": "VCID-246u-a4rh-yyd4",
            "summary": "Authentication Bypass Using an Alternate Path or Channel vulnerability in Apache Tomcat.  When using PreResources or PostResources mounted other than at the root of the web application, it was possible to access those resources via an unexpected path. That path was likely not to be protected by the same security constraints as the expected path, allowing those security constraints to be bypassed.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105.\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 through 8.5.100. Other, older, EOL versions \nmay also be affected.\n\n\nUsers are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49125.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49125.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-49125",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35536",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35515",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35561",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35444",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3549",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35525",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57477",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57485",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57415",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57436",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57414",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5746",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57481",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57458",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-49125"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/7617b9c247bc77ed0444dd69adcd8aa48777886c",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/7617b9c247bc77ed0444dd69adcd8aa48777886c"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/9418e3ff9f1f4c006b4661311ae9376c52d162b9",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/9418e3ff9f1f4c006b4661311ae9376c52d162b9"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/d94bd36fb7eb32e790dae0339bc249069649a637",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/d94bd36fb7eb32e790dae0339bc249069649a637"
                },
                {
                    "reference_url": "https://lists.apache.org/thread/m66cytbfrty9k7dc4cg6tl1czhsnbywk",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:06:30Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread/m66cytbfrty9k7dc4cg6tl1czhsnbywk"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2025/07/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2025/07/msg00009.html"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49125",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49125"
                },
                {
                    "reference_url": "https://tomcat.apache.org/security-10.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://tomcat.apache.org/security-10.html"
                },
                {
                    "reference_url": "https://tomcat.apache.org/security-11.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://tomcat.apache.org/security-11.html"
                },
                {
                    "reference_url": "https://tomcat.apache.org/security-9.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://tomcat.apache.org/security-9.html"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2025/06/16/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2025/06/16/2"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108114",
                    "reference_id": "1108114",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108114"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108115",
                    "reference_id": "1108115",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108115"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373018",
                    "reference_id": "2373018",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373018"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2888",
                    "reference_id": "AVG-2888",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2888"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2889",
                    "reference_id": "AVG-2889",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2889"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49125",
                    "reference_id": "CVE-2025-49125",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Moderate",
                            "scoring_system": "apache_tomcat",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49125"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-wc4r-xq3c-5cf3",
                    "reference_id": "GHSA-wc4r-xq3c-5cf3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-wc4r-xq3c-5cf3"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:11695",
                    "reference_id": "RHSA-2025:11695",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:11695"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:11696",
                    "reference_id": "RHSA-2025:11696",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:11696"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:11741",
                    "reference_id": "RHSA-2025:11741",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:11741"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:11742",
                    "reference_id": "RHSA-2025:11742",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:11742"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14177",
                    "reference_id": "RHSA-2025:14177",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14177"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14178",
                    "reference_id": "RHSA-2025:14178",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14178"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14179",
                    "reference_id": "RHSA-2025:14179",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14179"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14180",
                    "reference_id": "RHSA-2025:14180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14180"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14181",
                    "reference_id": "RHSA-2025:14181",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14181"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14182",
                    "reference_id": "RHSA-2025:14182",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14182"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14183",
                    "reference_id": "RHSA-2025:14183",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14183"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941305?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.34-0%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.34-0%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941327?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.46-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.46-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941326?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1~deb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941309?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941307?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941308?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1066849?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.54-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.54-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-49125",
                "GHSA-wc4r-xq3c-5cf3"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-246u-a4rh-yyd4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4423?format=api",
            "vulnerability_id": "VCID-2kku-pzer-9ufv",
            "summary": "Session Fixation vulnerability in Apache Tomcat via rewrite valve.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105.\nOlder, EOL versions may also be affected.\n\nUsers are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55668.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55668.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-55668",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03655",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03668",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03706",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03684",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0368",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0367",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03594",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0362",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03645",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04472",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04452",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04436",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04307",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04625",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-55668"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/8621e4c6ba2c916a41eb34cb0f781171ead33fb6",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/8621e4c6ba2c916a41eb34cb0f781171ead33fb6"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/90306d971bb8b8393336d893644124fb2ca11d21",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/90306d971bb8b8393336d893644124fb2ca11d21"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/9c3673ba04009377cb0c81ccb6cf5078aec1aa95",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/9c3673ba04009377cb0c81ccb6cf5078aec1aa95"
                },
                {
                    "reference_url": "https://lists.apache.org/thread/v6bknr96rl7l1qxkl1c03v0qdvbbqs47",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-13T13:38:12Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread/v6bknr96rl7l1qxkl1c03v0qdvbbqs47"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55668",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55668"
                },
                {
                    "reference_url": "https://tomcat.apache.org/security-10.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://tomcat.apache.org/security-10.html"
                },
                {
                    "reference_url": "https://tomcat.apache.org/security-11.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://tomcat.apache.org/security-11.html"
                },
                {
                    "reference_url": "https://tomcat.apache.org/security-9.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://tomcat.apache.org/security-9.html"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2025/08/13/3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2025/08/13/3"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1111098",
                    "reference_id": "1111098",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1111098"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1111099",
                    "reference_id": "1111099",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1111099"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2388226",
                    "reference_id": "2388226",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2388226"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55668",
                    "reference_id": "CVE-2025-55668",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Moderate",
                            "scoring_system": "apache_tomcat",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55668"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-23hv-mwm6-g8jf",
                    "reference_id": "GHSA-23hv-mwm6-g8jf",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-23hv-mwm6-g8jf"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:2740",
                    "reference_id": "RHSA-2026:2740",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:2740"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:2741",
                    "reference_id": "RHSA-2026:2741",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:2741"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:6569",
                    "reference_id": "RHSA-2026:6569",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:6569"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8334",
                    "reference_id": "RHSA-2026:8334",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8334"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941305?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.34-0%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.34-0%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941327?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.46-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.46-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941326?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1~deb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941309?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941307?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941308?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1066849?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.54-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.54-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-55668",
                "GHSA-23hv-mwm6-g8jf"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2kku-pzer-9ufv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4427?format=api",
            "vulnerability_id": "VCID-2x6a-3gh1-rkhs",
            "summary": "Allocation of resources for multipart headers with insufficient limits enabled a DoS vulnerability in Apache Commons FileUpload.\n\nThis issue affects Apache Commons FileUpload: from 1.0 before 1.6; from 2.0.0-M1 before 2.0.0-M4.\n\nUsers are recommended to upgrade to versions 1.6 or 2.0.0-M4, which fix the issue.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-48976.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-48976.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-48976",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00347",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57306",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00347",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57255",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00457",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63894",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00457",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63959",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00457",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63947",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00457",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63921",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00972",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76685",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78101",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79627",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79621",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79584",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79556",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79586",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79564",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-48976"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/apache/commons-fileupload",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/commons-fileupload"
                },
                {
                    "reference_url": "https://github.com/apache/commons-fileupload/commit/b247774a72a044f5d5380ae947140ee80af4e78b",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/commons-fileupload/commit/b247774a72a044f5d5380ae947140ee80af4e78b"
                },
                {
                    "reference_url": "https://github.com/apache/commons-fileupload/commit/bf68f63cfb312ef4710fb3dfb4d8e4e1665f4497",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/commons-fileupload/commit/bf68f63cfb312ef4710fb3dfb4d8e4e1665f4497"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/667ddd76e2a0e762f3a784d86f0d25e7fd7cdb86",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/apache/tomcat/commit/667ddd76e2a0e762f3a784d86f0d25e7fd7cdb86"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/74f69ffaf61e54c727603e7e831fe20f0ac5d2a7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/apache/tomcat/commit/74f69ffaf61e54c727603e7e831fe20f0ac5d2a7"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/97790a35a27d236fa053e660676c3f8196284d93",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/97790a35a27d236fa053e660676c3f8196284d93"
                },
                {
                    "reference_url": "https://lists.apache.org/thread/fbs3wrr3p67vkjcxogqqqqz45pqtso12",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:04:56Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread/fbs3wrr3p67vkjcxogqqqqz45pqtso12"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2025/07/msg00008.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2025/07/msg00008.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2025/07/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2025/07/msg00009.html"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48976",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48976"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2025/06/16/4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2025/06/16/4"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108118",
                    "reference_id": "1108118",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108118"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108119",
                    "reference_id": "1108119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108119"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108120",
                    "reference_id": "1108120",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108120"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373020",
                    "reference_id": "2373020",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373020"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2888",
                    "reference_id": "AVG-2888",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2888"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2889",
                    "reference_id": "AVG-2889",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2889"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48976",
                    "reference_id": "CVE-2025-48976",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Important",
                            "scoring_system": "apache_tomcat",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48976"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-vv7r-c36w-3prj",
                    "reference_id": "GHSA-vv7r-c36w-3prj",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-vv7r-c36w-3prj"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:11695",
                    "reference_id": "RHSA-2025:11695",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:11695"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:11696",
                    "reference_id": "RHSA-2025:11696",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:11696"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:11741",
                    "reference_id": "RHSA-2025:11741",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:11741"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:11742",
                    "reference_id": "RHSA-2025:11742",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:11742"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14177",
                    "reference_id": "RHSA-2025:14177",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14177"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14178",
                    "reference_id": "RHSA-2025:14178",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14178"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14179",
                    "reference_id": "RHSA-2025:14179",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14179"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14180",
                    "reference_id": "RHSA-2025:14180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14180"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14181",
                    "reference_id": "RHSA-2025:14181",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14181"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14182",
                    "reference_id": "RHSA-2025:14182",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14182"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14183",
                    "reference_id": "RHSA-2025:14183",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14183"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941305?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.34-0%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.34-0%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941327?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.46-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.46-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941326?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1~deb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941309?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941307?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941308?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1066849?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.54-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.54-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-48976",
                "GHSA-vv7r-c36w-3prj"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2x6a-3gh1-rkhs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4417?format=api",
            "vulnerability_id": "VCID-4cag-c4pb-dfaz",
            "summary": "Improper Resource Shutdown or Release vulnerability in Apache Tomcat.\n\nIf an error occurred (including exceeding limits) during the processing of a multipart upload, temporary copies of the uploaded parts written to disc were not cleaned up immediately but left for the garbage collection process to delete. Depending on JVM settings, application memory usage and application load, it was possible that space for the temporary copies of uploaded parts would be filled faster than GC cleared it, leading to a DoS.\n\n\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.11, from 10.1.0-M1 through 10.1.46, from 9.0.0.M1 through 9.0.109.\n\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected.\nUsers are recommended to upgrade to version 11.0.12 or later, 10.1.47 or later or 9.0.110 or later which fixes the issue.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61795.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61795.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-61795",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25512",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2555",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31776",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32068",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32096",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32118",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32084",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32116",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32154",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3215",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32123",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31903",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31695",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33823",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-61795"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/1cdf5f730ede75a0759492f179ac21ca4ff68e06",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/1cdf5f730ede75a0759492f179ac21ca4ff68e06"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/af6e9181620304c0d818121c29c074e1330610d0",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/af6e9181620304c0d818121c29c074e1330610d0"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/afa422bd7ca1eef0f507259c682fd876494d9c3b",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/afa422bd7ca1eef0f507259c682fd876494d9c3b"
                },
                {
                    "reference_url": "https://lists.apache.org/thread/wm9mx8brmx9g4zpywm06ryrtvd3160pp",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "2.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-27T18:48:52Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread/wm9mx8brmx9g4zpywm06ryrtvd3160pp"
                },
                {
                    "reference_url": "https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.47",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.47"
                },
                {
                    "reference_url": "https://tomcat.apache.org/security-11.html#Fixed_in_Apache_Tomcat_11.0.12",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://tomcat.apache.org/security-11.html#Fixed_in_Apache_Tomcat_11.0.12"
                },
                {
                    "reference_url": "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.110",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.110"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2025/10/27/6",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2025/10/27/6"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1119293",
                    "reference_id": "1119293",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1119293"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1119294",
                    "reference_id": "1119294",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1119294"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2406588",
                    "reference_id": "2406588",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2406588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61795",
                    "reference_id": "CVE-2025-61795",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "apache_tomcat",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61795"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61795",
                    "reference_id": "CVE-2025-61795",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61795"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-hgrr-935x-pq79",
                    "reference_id": "GHSA-hgrr-935x-pq79",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-hgrr-935x-pq79"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19809",
                    "reference_id": "RHSA-2025:19809",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19809"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19810",
                    "reference_id": "RHSA-2025:19810",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19810"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:23050",
                    "reference_id": "RHSA-2025:23050",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:23050"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:23051",
                    "reference_id": "RHSA-2025:23051",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:23051"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:6569",
                    "reference_id": "RHSA-2026:6569",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:6569"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8334",
                    "reference_id": "RHSA-2026:8334",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8334"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941305?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.34-0%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.34-0%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941326?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1~deb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941309?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941307?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941308?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1066849?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.54-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.54-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-61795",
                "GHSA-hgrr-935x-pq79"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4cag-c4pb-dfaz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4414?format=api",
            "vulnerability_id": "VCID-8war-4v58-eub2",
            "summary": "Improper Input Validation vulnerability in Apache Tomcat Native, Apache Tomcat.\n\nWhen using an OCSP responder, Tomcat Native (and Tomcat's FFM port of the Tomcat Native code) did not complete verification or freshness checks on the OCSP response which could allow certificate revocation to be bypassed.\n\nThis issue affects Apache Tomcat Native:  from 1.3.0 through 1.3.4, from 2.0.0 through 2.0.11; Apache Tomcat: from 11.0.0-M1 through 11.0.17, from 10.1.0-M7 through 10.1.51, from 9.0.83 through 9.0.114.\n\n\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: from 1.1.23 through 1.1.34, from 1.2.0 through 1.2.39. Older EOL versions are not affected.\n\nApache Tomcat Native users are recommended to upgrade to versions 1.3.5 or later or 2.0.12 or later, which fix the issue.\n\nApache Tomcat users are recommended to upgrade to versions 11.0.18 or later, 10.1.52 or later or 9.0.115 or later which fix the issue.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-24734.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-24734.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-24734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25958",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26007",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29188",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29213",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29186",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29285",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29315",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29279",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29239",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29175",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29363",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29021",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29143",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-24734"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat"
                },
                {
                    "reference_url": "https://lists.apache.org/thread/292dlmx3fz1888v6v16221kpozq56gml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-21T21:16:49Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread/292dlmx3fz1888v6v16221kpozq56gml"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24734"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2440426",
                    "reference_id": "2440426",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2440426"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24734",
                    "reference_id": "CVE-2026-24734",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Moderate",
                            "scoring_system": "apache_tomcat",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24734"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-mgp5-rv84-w37q",
                    "reference_id": "GHSA-mgp5-rv84-w37q",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-mgp5-rv84-w37q"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:5611",
                    "reference_id": "RHSA-2026:5611",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:5611"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:5612",
                    "reference_id": "RHSA-2026:5612",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:5612"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:6569",
                    "reference_id": "RHSA-2026:6569",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:6569"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8334",
                    "reference_id": "RHSA-2026:8334",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8334"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941305?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.34-0%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.34-0%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941326?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1~deb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941309?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941307?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941308?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1066849?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.54-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.54-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2026-24734",
                "GHSA-mgp5-rv84-w37q"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8war-4v58-eub2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4418?format=api",
            "vulnerability_id": "VCID-cfhw-vmcp-y3bc",
            "summary": "Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat.\n\nTomcat did not escape ANSI escape sequences in log messages. If Tomcat was running in a console on a Windows operating system, and the console supported ANSI escape sequences, it was possible for an attacker to use a specially crafted URL to inject ANSI escape sequences to manipulate the console and the clipboard and attempt to trick an administrator into running an attacker controlled command. While no attack vector was found, it may have been possible to mount this attack on other operating systems.\n\n\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.40 through 9.0.108.\n\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.60 though 8.5.100. Other, older, EOL versions may also be affected.\nUsers are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55754.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55754.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-55754",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28878",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28928",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31809",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32026",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.316",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31683",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32003",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31993",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32065",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32061",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32032",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32204",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3221",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-55754"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "2.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/138d7f5cfaae683078948303333c080e6faa75d2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "2.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/138d7f5cfaae683078948303333c080e6faa75d2"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/5a3db092982c0c58d4855304167ee757fe5e79bb",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "2.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/5a3db092982c0c58d4855304167ee757fe5e79bb"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/a03cabf3a36a42d27d8d997ed31f034f50ba6cd5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "2.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/a03cabf3a36a42d27d8d997ed31f034f50ba6cd5"
                },
                {
                    "reference_url": "https://lists.apache.org/thread/j7w54hqbkfcn0xb9xy0wnx8w5nymcbqd",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "2.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-09T04:55:55Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread/j7w54hqbkfcn0xb9xy0wnx8w5nymcbqd"
                },
                {
                    "reference_url": "https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.45",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "2.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.45"
                },
                {
                    "reference_url": "https://tomcat.apache.org/security-11.html#Fixed_in_Apache_Tomcat_11.0.11",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "2.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://tomcat.apache.org/security-11.html#Fixed_in_Apache_Tomcat_11.0.11"
                },
                {
                    "reference_url": "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.109",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "2.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.109"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2025/10/27/5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "2.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2025/10/27/5"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2406590",
                    "reference_id": "2406590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2406590"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55754",
                    "reference_id": "CVE-2025-55754",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "apache_tomcat",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55754"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55754",
                    "reference_id": "CVE-2025-55754",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "2.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55754"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-vfww-5hm6-hx2j",
                    "reference_id": "GHSA-vfww-5hm6-hx2j",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-vfww-5hm6-hx2j"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:2740",
                    "reference_id": "RHSA-2026:2740",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:2740"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:2741",
                    "reference_id": "RHSA-2026:2741",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:2741"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:6569",
                    "reference_id": "RHSA-2026:6569",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:6569"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8334",
                    "reference_id": "RHSA-2026:8334",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8334"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941305?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.34-0%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.34-0%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941327?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.46-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.46-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941326?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1~deb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941309?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941307?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941308?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1066849?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.54-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.54-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-55754",
                "GHSA-vfww-5hm6-hx2j"
            ],
            "risk_score": 4.3,
            "exploitability": "0.5",
            "weighted_severity": "8.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cfhw-vmcp-y3bc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4422?format=api",
            "vulnerability_id": "VCID-fpgj-82wf-ykbw",
            "summary": "Uncontrolled Resource Consumption vulnerability in Apache Tomcat if an HTTP/2 client did not acknowledge the initial settings frame that reduces the maximum permitted concurrent streams.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.8, from 10.1.0-M1 through 10.1.42, from 9.0.0.M1 through 9.0.106.\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 through 8.5.100. Other EOL versions may also be affected.\n\n\nUsers are recommended to upgrade to version 11.0.9, 10.1.43 or 9.0.107, which fix the issue.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53506.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53506.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-53506",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5542",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55445",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6252",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62478",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.625",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62511",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62492",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62476",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62425",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6251",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62527",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00446",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63494",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00446",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63498",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-53506"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/2aa6261276ebe50b99276953591e3a2be7898bdb",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/2aa6261276ebe50b99276953591e3a2be7898bdb"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/434772930f362145516dd60681134e7f0cf8115b",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/434772930f362145516dd60681134e7f0cf8115b"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/be8f330f83ceddaf3baeed57522e571572b6b99b",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/be8f330f83ceddaf3baeed57522e571572b6b99b"
                },
                {
                    "reference_url": "https://lists.apache.org/thread/p09775q0rd185m6zz98krg0fp45j8kr0",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-11T13:46:01Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread/p09775q0rd185m6zz98krg0fp45j8kr0"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2025/07/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2025/07/msg00009.html"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53506",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53506"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2025/07/10/13",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2025/07/10/13"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109113",
                    "reference_id": "1109113",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109113"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109114",
                    "reference_id": "1109114",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109114"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2379386",
                    "reference_id": "2379386",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2379386"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53506",
                    "reference_id": "CVE-2025-53506",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Important",
                            "scoring_system": "apache_tomcat",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53506"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-25xr-qj8w-c4vf",
                    "reference_id": "GHSA-25xr-qj8w-c4vf",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-25xr-qj8w-c4vf"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:11695",
                    "reference_id": "RHSA-2025:11695",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:11695"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:11696",
                    "reference_id": "RHSA-2025:11696",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:11696"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:11741",
                    "reference_id": "RHSA-2025:11741",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:11741"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:11742",
                    "reference_id": "RHSA-2025:11742",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:11742"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14177",
                    "reference_id": "RHSA-2025:14177",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14177"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14178",
                    "reference_id": "RHSA-2025:14178",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14178"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14179",
                    "reference_id": "RHSA-2025:14179",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14179"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14180",
                    "reference_id": "RHSA-2025:14180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14180"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14181",
                    "reference_id": "RHSA-2025:14181",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14181"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14182",
                    "reference_id": "RHSA-2025:14182",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14182"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14183",
                    "reference_id": "RHSA-2025:14183",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14183"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941305?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.34-0%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.34-0%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941327?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.46-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.46-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941326?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1~deb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941309?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941307?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941308?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1066849?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.54-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.54-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-53506",
                "GHSA-25xr-qj8w-c4vf"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fpgj-82wf-ykbw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4426?format=api",
            "vulnerability_id": "VCID-gb2v-96xj-ybad",
            "summary": "Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105.\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions \nmay also be affected.\n\n\nUsers are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-48988.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-48988.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-48988",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50478",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50513",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50471",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50424",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5047",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50441",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73352",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73359",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73351",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73307",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73315",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73397",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73399",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73386",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-48988"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/2b0ab14fb55d4edc896e5f1817f2ab76f714ae5e",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/2b0ab14fb55d4edc896e5f1817f2ab76f714ae5e"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/cdde8e655bc1c5c60a07efd216251d77c52fd7f6",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/cdde8e655bc1c5c60a07efd216251d77c52fd7f6"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/ee8042ffce4cb9324dfd79efda5984f37bbb6910",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/ee8042ffce4cb9324dfd79efda5984f37bbb6910"
                },
                {
                    "reference_url": "https://lists.apache.org/thread/nzkqsok8t42qofgqfmck536mtyzygp18",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-17T18:20:54Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread/nzkqsok8t42qofgqfmck536mtyzygp18"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2025/07/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2025/07/msg00009.html"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48988",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48988"
                },
                {
                    "reference_url": "https://tomcat.apache.org/security-10.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://tomcat.apache.org/security-10.html"
                },
                {
                    "reference_url": "https://tomcat.apache.org/security-11.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://tomcat.apache.org/security-11.html"
                },
                {
                    "reference_url": "https://tomcat.apache.org/security-9.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://tomcat.apache.org/security-9.html"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2025/06/16/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2025/06/16/1"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108116",
                    "reference_id": "1108116",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108116"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108117",
                    "reference_id": "1108117",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108117"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373015",
                    "reference_id": "2373015",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373015"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2888",
                    "reference_id": "AVG-2888",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2888"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2889",
                    "reference_id": "AVG-2889",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2889"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48988",
                    "reference_id": "CVE-2025-48988",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Important",
                            "scoring_system": "apache_tomcat",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48988"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-h3gc-qfqq-6h8f",
                    "reference_id": "GHSA-h3gc-qfqq-6h8f",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-h3gc-qfqq-6h8f"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:11695",
                    "reference_id": "RHSA-2025:11695",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:11695"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:11696",
                    "reference_id": "RHSA-2025:11696",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:11696"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:11741",
                    "reference_id": "RHSA-2025:11741",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:11741"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:11742",
                    "reference_id": "RHSA-2025:11742",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:11742"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14177",
                    "reference_id": "RHSA-2025:14177",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14177"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14178",
                    "reference_id": "RHSA-2025:14178",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14178"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14179",
                    "reference_id": "RHSA-2025:14179",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14179"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14180",
                    "reference_id": "RHSA-2025:14180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14180"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14181",
                    "reference_id": "RHSA-2025:14181",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14181"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14182",
                    "reference_id": "RHSA-2025:14182",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14182"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14183",
                    "reference_id": "RHSA-2025:14183",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14183"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941305?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.34-0%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.34-0%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941327?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.46-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.46-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941326?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1~deb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941309?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941307?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941308?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1066849?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.54-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.54-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-48988",
                "GHSA-h3gc-qfqq-6h8f"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gb2v-96xj-ybad"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4421?format=api",
            "vulnerability_id": "VCID-k59r-wjt3-wqe5",
            "summary": "For some unlikely configurations of multipart upload, an Integer Overflow vulnerability in Apache Tomcat could lead to a DoS via bypassing of size limits.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.8, from 10.1.0-M1 through 10.1.42, from 9.0.0.M1 through 9.0.106.\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 through 8.5.100. Other, older, EOL versions \nmay also be affected.\n\n\nUsers are recommended to upgrade to version 11.0.9, 10.1.43 or 9.0.107, which fix the issue.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-52520.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-52520.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-52520",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39188",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3921",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46282",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46228",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46219",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46247",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46223",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46221",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46165",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46208",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46225",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00243",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47503",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00243",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47556",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-52520"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/927d66fbc294cb65242102b817a45fd80834e040",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/927d66fbc294cb65242102b817a45fd80834e040"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/a51e4bedccfafd35b7cdd0ee3e22267dee9f90db",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/a51e4bedccfafd35b7cdd0ee3e22267dee9f90db"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/fc42bbccb9041fafd194fbfdf3eab1d44cb5c45c",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/fc42bbccb9041fafd194fbfdf3eab1d44cb5c45c"
                },
                {
                    "reference_url": "https://lists.apache.org/thread/trqq01bbxw6c92zx69kx2mw2qgmfy0o5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-11T14:08:03Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread/trqq01bbxw6c92zx69kx2mw2qgmfy0o5"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2025/07/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2025/07/msg00009.html"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52520",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52520"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2025/07/10/12",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2025/07/10/12"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109111",
                    "reference_id": "1109111",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109111"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109112",
                    "reference_id": "1109112",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109112"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2379374",
                    "reference_id": "2379374",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2379374"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52520",
                    "reference_id": "CVE-2025-52520",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "apache_tomcat",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52520"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-wr62-c79q-cv37",
                    "reference_id": "GHSA-wr62-c79q-cv37",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-wr62-c79q-cv37"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:11695",
                    "reference_id": "RHSA-2025:11695",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:11695"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:11696",
                    "reference_id": "RHSA-2025:11696",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:11696"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:13685",
                    "reference_id": "RHSA-2025:13685",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:13685"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:13686",
                    "reference_id": "RHSA-2025:13686",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:13686"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14177",
                    "reference_id": "RHSA-2025:14177",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14177"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14178",
                    "reference_id": "RHSA-2025:14178",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14178"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14179",
                    "reference_id": "RHSA-2025:14179",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14179"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14180",
                    "reference_id": "RHSA-2025:14180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14180"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14181",
                    "reference_id": "RHSA-2025:14181",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14181"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14182",
                    "reference_id": "RHSA-2025:14182",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14182"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:14183",
                    "reference_id": "RHSA-2025:14183",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:14183"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941305?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.34-0%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.34-0%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941327?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.46-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.46-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941326?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1~deb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941309?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941307?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941308?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1066849?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.54-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.54-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-52520",
                "GHSA-wr62-c79q-cv37"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k59r-wjt3-wqe5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4416?format=api",
            "vulnerability_id": "VCID-maw6-4qs5-ykae",
            "summary": "Improper Input Validation vulnerability.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14, from 10.1.0-M1 through 10.1.49, from 9.0.0-M1 through 9.0.112.\n\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 through 8.5.100. Older EOL versions are not affected.\nTomcat did not validate that the host name provided via the SNI \nextension was the same as the host name provided in the HTTP host header \nfield. If Tomcat was configured with more than one virtual host and the \nTLS configuration for one of those hosts did not require client \ncertificate authentication but another one did, it was possible for a \nclient to bypass the client certificate authentication by sending \ndifferent host names in the SNI extension and the HTTP host header field.\n\n\n\nThe vulnerability only applies if client certificate authentication is \nonly enforced at the Connector. It does not apply if client certificate \nauthentication is enforced at the web application.\n\n\nUsers are recommended to upgrade to version 11.0.15 or later, 10.1.50 or later or 9.0.113 or later, which fix the issue.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-66614.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-66614.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-66614",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13413",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13341",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1329",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13209",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13349",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13221",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13128",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13222",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1327",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13309",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13471",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15854",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15889",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-66614"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/021d1f833e38b683a44688f7b28f1f27e8e37c36",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/apache/tomcat/commit/021d1f833e38b683a44688f7b28f1f27e8e37c36"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/152c14885d45f5e0a8b59bd9f93c289cfe20ce30",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/152c14885d45f5e0a8b59bd9f93c289cfe20ce30"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/258a591b61f8cf5c22109e21e5a2a38b63454fd2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/258a591b61f8cf5c22109e21e5a2a38b63454fd2"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/4d0615a5c718c260d6d4e0b944a050f09a490c02",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/apache/tomcat/commit/4d0615a5c718c260d6d4e0b944a050f09a490c02"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/5053fa82a1b2b52756810601227984a8b71888a4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/5053fa82a1b2b52756810601227984a8b71888a4"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/9276b5e783c8cd5b3fe2bb716306b65004bdd940",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/9276b5e783c8cd5b3fe2bb716306b65004bdd940"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/95f7778248cac46d03e6af04de9c72a598be3a53",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/apache/tomcat/commit/95f7778248cac46d03e6af04de9c72a598be3a53"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/972f9a5e2a07674d92610c478aac1b205d60724e",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/972f9a5e2a07674d92610c478aac1b205d60724e"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/a4aa74232e826028cd2f7ba0445caf8a8b52c509",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/a4aa74232e826028cd2f7ba0445caf8a8b52c509"
                },
                {
                    "reference_url": "https://lists.apache.org/thread/vw6lxtlh2qbqwpb61wd3sv1flm2nttw7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L"
                        },
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-21T21:17:26Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread/vw6lxtlh2qbqwpb61wd3sv1flm2nttw7"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66614",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66614"
                },
                {
                    "reference_url": "https://tomcat.apache.org/security-10.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://tomcat.apache.org/security-10.html"
                },
                {
                    "reference_url": "https://tomcat.apache.org/security-11.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://tomcat.apache.org/security-11.html"
                },
                {
                    "reference_url": "https://tomcat.apache.org/security-9.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://tomcat.apache.org/security-9.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2440430",
                    "reference_id": "2440430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2440430"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66614",
                    "reference_id": "CVE-2025-66614",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Moderate",
                            "scoring_system": "apache_tomcat",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66614"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-fpj8-gq4v-p354",
                    "reference_id": "GHSA-fpj8-gq4v-p354",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-fpj8-gq4v-p354"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:12194",
                    "reference_id": "RHSA-2026:12194",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:12194"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:12195",
                    "reference_id": "RHSA-2026:12195",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:12195"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:6569",
                    "reference_id": "RHSA-2026:6569",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:6569"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8334",
                    "reference_id": "RHSA-2026:8334",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8334"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941305?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.34-0%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.34-0%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941326?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1~deb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941309?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941307?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941308?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1066849?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.54-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.54-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-66614",
                "GHSA-fpj8-gq4v-p354"
            ],
            "risk_score": 4.1,
            "exploitability": "0.5",
            "weighted_severity": "8.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-maw6-4qs5-ykae"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4428?format=api",
            "vulnerability_id": "VCID-sr8e-w1qk-r7fz",
            "summary": "Improper Handling of Case Sensitivity vulnerability in Apache Tomcat's GCI servlet allows security constraint bypass of security constraints that apply to the pathInfo component of a URI mapped to the CGI servlet.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.6, from 10.1.0-M1 through 10.1.40, from 9.0.0.M1 through 9.0.104.\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions \nmay also be affected.\n\n\nUsers are recommended to upgrade to version 11.0.7, 10.1.41 or 9.0.105, which fixes the issue.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-46701.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-46701.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-46701",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00132",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32322",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00132",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32405",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00132",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3252",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00132",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32713",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00132",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32749",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00132",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32748",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00132",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32722",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00132",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32674",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00132",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32853",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00132",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32817",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00132",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32703",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00132",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32726",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00132",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32686",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-46701"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/0f01966eb60015d975525019e12a087f05ebf01a",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/0f01966eb60015d975525019e12a087f05ebf01a"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/238d2aa54b99f91d1111467e2237d2244c64e558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/238d2aa54b99f91d1111467e2237d2244c64e558"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/2c6800111e7d8d8d5403c07978ea9bff3db5a5a5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/2c6800111e7d8d8d5403c07978ea9bff3db5a5a5"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/8cb95ff03221067c511b3fa66d4f745bc4b0a605",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/8cb95ff03221067c511b3fa66d4f745bc4b0a605"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/8df00018a252baa9497615d6420fb6c10466fa74",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/8df00018a252baa9497615d6420fb6c10466fa74"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/fab7247d2f0e3a29d5daef565f829f383e10e5e2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/fab7247d2f0e3a29d5daef565f829f383e10e5e2"
                },
                {
                    "reference_url": "https://lists.apache.org/thread/xhqqk9w5q45srcdqhogdk04lhdscv30j",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "1.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-30T14:58:21Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread/xhqqk9w5q45srcdqhogdk04lhdscv30j"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2025/07/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2025/07/msg00009.html"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46701",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46701"
                },
                {
                    "reference_url": "https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.41",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.41"
                },
                {
                    "reference_url": "https://tomcat.apache.org/security-11.html#Fixed_in_Apache_Tomcat_11.0.7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://tomcat.apache.org/security-11.html#Fixed_in_Apache_Tomcat_11.0.7"
                },
                {
                    "reference_url": "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.105",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.105"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2025/05/29/4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2025/05/29/4"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106820",
                    "reference_id": "1106820",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106820"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106821",
                    "reference_id": "1106821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106821"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2369253",
                    "reference_id": "2369253",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2369253"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2888",
                    "reference_id": "AVG-2888",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2888"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2889",
                    "reference_id": "AVG-2889",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2889"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46701",
                    "reference_id": "CVE-2025-46701",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "apache_tomcat",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46701"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-h2fw-rfh5-95r3",
                    "reference_id": "GHSA-h2fw-rfh5-95r3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-h2fw-rfh5-95r3"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:2740",
                    "reference_id": "RHSA-2026:2740",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:2740"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:2741",
                    "reference_id": "RHSA-2026:2741",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:2741"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7705-1/",
                    "reference_id": "USN-7705-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7705-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941305?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.34-0%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.34-0%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941327?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.46-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.46-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941326?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1~deb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941309?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941307?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941308?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1066849?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.54-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.54-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-46701",
                "GHSA-h2fw-rfh5-95r3"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sr8e-w1qk-r7fz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4419?format=api",
            "vulnerability_id": "VCID-xqjr-7xfw-mbh2",
            "summary": "Relative Path Traversal vulnerability in Apache Tomcat.\n\nThe fix for bug 60013 introduced a regression where the       rewritten URL was normalized before it was decoded. This introduced the       possibility that, for rewrite rules that rewrite query parameters to the       URL, an attacker could manipulate the request URI to bypass security       constraints including the protection for /WEB-INF/ and /META-INF/. If PUT requests were also enabled then malicious files could be uploaded leading to remote code execution. PUT requests are normally limited to trusted users and it is considered unlikely that PUT requests would be enabled in conjunction with a rewrite that manipulated the URI.\n\n\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.0.M11 through 9.0.108.\n\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.6 though 8.5.100. Other, older, EOL versions may also be affected.\nUsers are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55752.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55752.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-55752",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31081",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31161",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31286",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31592",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34655",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37914",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37913",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3795",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37934",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37922",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00169",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38046",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38312",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38337",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-55752"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "7.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/130d36d8492ef9e4eb22952c17c92423cb35fd06",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "7.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/130d36d8492ef9e4eb22952c17c92423cb35fd06"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/b5042622b8b78340ae65403c55dcb9c7416924df",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "7.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/b5042622b8b78340ae65403c55dcb9c7416924df"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/fec06c610ed7466b401e29cc567a58aee5ed826a",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "7.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/fec06c610ed7466b401e29cc567a58aee5ed826a"
                },
                {
                    "reference_url": "https://lists.apache.org/thread/n05kjcwyj1s45ovs8ll1qrrojhfb1tog",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "7.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-28T03:56:06Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread/n05kjcwyj1s45ovs8ll1qrrojhfb1tog"
                },
                {
                    "reference_url": "https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.45",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "7.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.45"
                },
                {
                    "reference_url": "https://tomcat.apache.org/security-11.html#Fixed_in_Apache_Tomcat_11.0.11",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "7.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://tomcat.apache.org/security-11.html#Fixed_in_Apache_Tomcat_11.0.11"
                },
                {
                    "reference_url": "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.109",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "7.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.109"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2025/10/27/4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "7.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2025/10/27/4"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2406591",
                    "reference_id": "2406591",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2406591"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55752",
                    "reference_id": "CVE-2025-55752",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Important",
                            "scoring_system": "apache_tomcat",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55752"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55752",
                    "reference_id": "CVE-2025-55752",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "7.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55752"
                },
                {
                    "reference_url": "https://www.vicarius.io/vsociety/posts/cve-2025-55752-detect-apache-tomcat-vulnerability",
                    "reference_id": "CVE-2025-55752-DETECT-APACHE-TOMCAT-VULNERABILITY",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "7.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.vicarius.io/vsociety/posts/cve-2025-55752-detect-apache-tomcat-vulnerability"
                },
                {
                    "reference_url": "https://www.vicarius.io/vsociety/posts/cve-2025-55752-mitigate-apache-tomcat-vulnerability",
                    "reference_id": "CVE-2025-55752-MITIGATE-APACHE-TOMCAT-VULNERABILITY",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "7.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.vicarius.io/vsociety/posts/cve-2025-55752-mitigate-apache-tomcat-vulnerability"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-wmwf-9ccg-fff5",
                    "reference_id": "GHSA-wmwf-9ccg-fff5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-wmwf-9ccg-fff5"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19809",
                    "reference_id": "RHSA-2025:19809",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19809"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19810",
                    "reference_id": "RHSA-2025:19810",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19810"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:22924",
                    "reference_id": "RHSA-2025:22924",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:22924"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:22925",
                    "reference_id": "RHSA-2025:22925",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:22925"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:23044",
                    "reference_id": "RHSA-2025:23044",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:23044"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:23045",
                    "reference_id": "RHSA-2025:23045",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:23045"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:23046",
                    "reference_id": "RHSA-2025:23046",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:23046"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:23047",
                    "reference_id": "RHSA-2025:23047",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:23047"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:23048",
                    "reference_id": "RHSA-2025:23048",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:23048"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:23049",
                    "reference_id": "RHSA-2025:23049",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:23049"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:23050",
                    "reference_id": "RHSA-2025:23050",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:23050"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:23051",
                    "reference_id": "RHSA-2025:23051",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:23051"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:23052",
                    "reference_id": "RHSA-2025:23052",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:23052"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:23053",
                    "reference_id": "RHSA-2025:23053",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:23053"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:23225",
                    "reference_id": "RHSA-2025:23225",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:23225"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0292",
                    "reference_id": "RHSA-2026:0292",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0292"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0293",
                    "reference_id": "RHSA-2026:0293",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0293"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:2724",
                    "reference_id": "RHSA-2026:2724",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:2724"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:2725",
                    "reference_id": "RHSA-2026:2725",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:2725"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:2726",
                    "reference_id": "RHSA-2026:2726",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:2726"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:6569",
                    "reference_id": "RHSA-2026:6569",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:6569"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8334",
                    "reference_id": "RHSA-2026:8334",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8334"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941305?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.34-0%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.34-0%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941327?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.46-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.46-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941326?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1~deb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941309?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941307?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941308?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1066849?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.54-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.54-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-55752",
                "GHSA-wmwf-9ccg-fff5"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xqjr-7xfw-mbh2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4415?format=api",
            "vulnerability_id": "VCID-y9ne-rw7e-vugf",
            "summary": "Improper Input Validation vulnerability in Apache Tomcat.\n\n\nTomcat did not limit HTTP/0.9 requests to the GET method. If a security \nconstraint was configured to allow HEAD requests to a URI but deny GET \nrequests, the user could bypass that constraint on GET requests by \nsending a (specification invalid) HEAD request using HTTP/0.9.\n\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14, from 10.1.0-M1 through 10.1.49, from 9.0.0.M1 through 9.0.112.\n\n\nOlder, EOL versions are also affected.\n\nUsers are recommended to upgrade to version 11.0.15 or later, 10.1.50 or later or 9.0.113 or later, which fixes the issue.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-24733.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-24733.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-24733",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36423",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36512",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4034",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40289",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40166",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40245",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40322",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40354",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40339",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40364",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40307",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40326",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40363",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40352",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-24733"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/2e2fa23f2635bbb819759576a2f2f5e64ecf7c5f",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/2e2fa23f2635bbb819759576a2f2f5e64ecf7c5f"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/6c73d74ff281260d74c836370ff6b82f1da8048b",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/6c73d74ff281260d74c836370ff6b82f1da8048b"
                },
                {
                    "reference_url": "https://github.com/apache/tomcat/commit/711b465cf22684a1acf0cb43501cdbbce9b6c5f4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/tomcat/commit/711b465cf22684a1acf0cb43501cdbbce9b6c5f4"
                },
                {
                    "reference_url": "https://lists.apache.org/thread/6xk3t65qpn1myp618krtfotbjn1qt90f",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-21T21:16:58Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread/6xk3t65qpn1myp618krtfotbjn1qt90f"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24733",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24733"
                },
                {
                    "reference_url": "https://tomcat.apache.org/security-10.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://tomcat.apache.org/security-10.html"
                },
                {
                    "reference_url": "https://tomcat.apache.org/security-11.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://tomcat.apache.org/security-11.html"
                },
                {
                    "reference_url": "https://tomcat.apache.org/security-9.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://tomcat.apache.org/security-9.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2440437",
                    "reference_id": "2440437",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2440437"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24733",
                    "reference_id": "CVE-2026-24733",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "apache_tomcat",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24733"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-qq5r-98hh-rxc9",
                    "reference_id": "GHSA-qq5r-98hh-rxc9",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-qq5r-98hh-rxc9"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:12194",
                    "reference_id": "RHSA-2026:12194",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:12194"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:12195",
                    "reference_id": "RHSA-2026:12195",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:12195"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:6569",
                    "reference_id": "RHSA-2026:6569",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:6569"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8334",
                    "reference_id": "RHSA-2026:8334",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8334"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941305?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.34-0%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.34-0%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941326?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1~deb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941309?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941307?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2rmy-13ym-3bgm"
                        },
                        {
                            "vulnerability": "VCID-35xg-a746-5qgc"
                        },
                        {
                            "vulnerability": "VCID-74tx-sx8a-guhs"
                        },
                        {
                            "vulnerability": "VCID-8e1c-rbkg-v7c2"
                        },
                        {
                            "vulnerability": "VCID-d1fm-vbd1-n7au"
                        },
                        {
                            "vulnerability": "VCID-gyed-x6s8-ybhr"
                        },
                        {
                            "vulnerability": "VCID-rsxs-u5cc-rkgj"
                        },
                        {
                            "vulnerability": "VCID-yrzk-1dbk-muhy"
                        },
                        {
                            "vulnerability": "VCID-zw2q-kna8-mqcm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941308?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.52-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1066849?format=api",
                    "purl": "pkg:deb/debian/tomcat10@10.1.54-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.54-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2026-24733",
                "GHSA-qq5r-98hh-rxc9"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y9ne-rw7e-vugf"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat10@10.1.52-1~deb12u1%3Fdistro=trixie"
}