{"url":"http://public2.vulnerablecode.io/api/packages/1032798?format=json","purl":"pkg:apk/alpine/avahi@0.8-r25?arch=loongarch64&distroversion=edge&reponame=main","type":"apk","namespace":"alpine","name":"avahi","version":"0.8-r25","qualifiers":{"arch":"loongarch64","distroversion":"edge","reponame":"main"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"0.8-r26","latest_non_vulnerable_version":"0.8-r26","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64887?format=json","vulnerability_id":"VCID-1gkw-3zt3-sbb9","summary":"avahi: Avahi: Denial of Service via recursive CNAME record in mDNS response","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-24401.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-24401.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-24401","reference_id":"","reference_type":"","scores":[{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13259","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12918","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13137","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13039","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13042","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13138","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13144","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13116","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13014","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13326","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13124","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13205","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13256","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13225","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13188","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-24401"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24401","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24401"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126342","reference_id":"1126342","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126342"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2432534","reference_id":"2432534","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2432534"},{"reference_url":"https://github.com/avahi/avahi/issues/501","reference_id":"501","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T16:14:24Z/"}],"url":"https://github.com/avahi/avahi/issues/501"},{"reference_url":"https://github.com/avahi/avahi/commit/78eab31128479f06e30beb8c1cbf99dd921e2524","reference_id":"78eab31128479f06e30beb8c1cbf99dd921e2524","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T16:14:24Z/"}],"url":"https://github.com/avahi/avahi/commit/78eab31128479f06e30beb8c1cbf99dd921e2524"},{"reference_url":"https://github.com/avahi/avahi/security/advisories/GHSA-h4vp-5m8j-f6w3","reference_id":"GHSA-h4vp-5m8j-f6w3","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T16:14:24Z/"}],"url":"https://github.com/avahi/avahi/security/advisories/GHSA-h4vp-5m8j-f6w3"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11316","reference_id":"RHSA-2026:11316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11316"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1032798?format=json","purl":"pkg:apk/alpine/avahi@0.8-r25?arch=loongarch64&distroversion=edge&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/avahi@0.8-r25%3Farch=loongarch64&distroversion=edge&reponame=main"}],"aliases":["CVE-2026-24401"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1gkw-3zt3-sbb9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65172?format=json","vulnerability_id":"VCID-1qch-uvj9-nucr","summary":"avahi: Avahi: Denial of Service via unsolicited CNAME announcements","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-68471.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-68471.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-68471","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03992","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04164","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04005","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03977","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0396","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03972","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04097","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04111","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04128","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04008","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04023","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04029","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04047","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04019","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-68471"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68471","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68471"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125419","reference_id":"1125419","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125419"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2428717","reference_id":"2428717","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2428717"},{"reference_url":"https://github.com/avahi/avahi/issues/678","reference_id":"678","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-12T18:42:17Z/"}],"url":"https://github.com/avahi/avahi/issues/678"},{"reference_url":"https://github.com/avahi/avahi/commit/9c6eb53bf2e290aed84b1f207e3ce35c54cc0aa1","reference_id":"9c6eb53bf2e290aed84b1f207e3ce35c54cc0aa1","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-12T18:42:17Z/"}],"url":"https://github.com/avahi/avahi/commit/9c6eb53bf2e290aed84b1f207e3ce35c54cc0aa1"},{"reference_url":"https://github.com/avahi/avahi/security/advisories/GHSA-56rf-42xr-qmmg","reference_id":"GHSA-56rf-42xr-qmmg","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-12T18:42:17Z/"}],"url":"https://github.com/avahi/avahi/security/advisories/GHSA-56rf-42xr-qmmg"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11316","reference_id":"RHSA-2026:11316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11316"},{"reference_url":"https://usn.ubuntu.com/7967-1/","reference_id":"USN-7967-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7967-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1032798?format=json","purl":"pkg:apk/alpine/avahi@0.8-r25?arch=loongarch64&distroversion=edge&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/avahi@0.8-r25%3Farch=loongarch64&distroversion=edge&reponame=main"}],"aliases":["CVE-2025-68471"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1qch-uvj9-nucr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65173?format=json","vulnerability_id":"VCID-c1wj-a2qm-wbhr","summary":"avahi: Avahi: Denial of Service via crafted mDNS/DNS-SD announcements","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-68468.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-68468.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-68468","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02483","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02589","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02485","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02469","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02475","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02582","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02571","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02559","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0262","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02496","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02499","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0252","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02497","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02487","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-68468"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68468","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68468"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125418","reference_id":"1125418","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125418"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2428714","reference_id":"2428714","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2428714"},{"reference_url":"https://github.com/avahi/avahi/issues/683","reference_id":"683","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-12T18:41:41Z/"}],"url":"https://github.com/avahi/avahi/issues/683"},{"reference_url":"https://github.com/avahi/avahi/commit/f66be13d7f31a3ef806d226bf8b67240179d309a","reference_id":"f66be13d7f31a3ef806d226bf8b67240179d309a","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-12T18:41:41Z/"}],"url":"https://github.com/avahi/avahi/commit/f66be13d7f31a3ef806d226bf8b67240179d309a"},{"reference_url":"https://github.com/avahi/avahi/security/advisories/GHSA-cp79-r4x9-vf52","reference_id":"GHSA-cp79-r4x9-vf52","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-12T18:41:41Z/"}],"url":"https://github.com/avahi/avahi/security/advisories/GHSA-cp79-r4x9-vf52"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11316","reference_id":"RHSA-2026:11316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11316"},{"reference_url":"https://usn.ubuntu.com/7967-1/","reference_id":"USN-7967-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7967-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1032798?format=json","purl":"pkg:apk/alpine/avahi@0.8-r25?arch=loongarch64&distroversion=edge&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/avahi@0.8-r25%3Farch=loongarch64&distroversion=edge&reponame=main"}],"aliases":["CVE-2025-68468"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c1wj-a2qm-wbhr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65174?format=json","vulnerability_id":"VCID-unwy-8b3g-hbbx","summary":"avahi: Avahi: Denial of Service via D-Bus record browsers with AVAHI_LOOKUP_USE_WIDE_AREA flag","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-68276.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-68276.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-68276","reference_id":"","reference_type":"","scores":[{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00314","published_at":"2026-05-05T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00317","published_at":"2026-04-26T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00303","published_at":"2026-04-08T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00302","published_at":"2026-04-09T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00301","published_at":"2026-04-11T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.003","published_at":"2026-04-13T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00296","published_at":"2026-04-16T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00299","published_at":"2026-04-18T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00319","published_at":"2026-04-24T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00313","published_at":"2026-04-04T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00304","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-68276"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68276","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68276"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125417","reference_id":"1125417","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125417"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2428713","reference_id":"2428713","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2428713"},{"reference_url":"https://github.com/avahi/avahi/pull/806","reference_id":"806","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-12T18:41:12Z/"}],"url":"https://github.com/avahi/avahi/pull/806"},{"reference_url":"https://github.com/avahi/avahi/commit/ede7048475c5d47d53890e3bc1350dda8e0b3688","reference_id":"ede7048475c5d47d53890e3bc1350dda8e0b3688","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-12T18:41:12Z/"}],"url":"https://github.com/avahi/avahi/commit/ede7048475c5d47d53890e3bc1350dda8e0b3688"},{"reference_url":"https://github.com/avahi/avahi/security/advisories/GHSA-mhf3-865v-g5rc","reference_id":"GHSA-mhf3-865v-g5rc","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-12T18:41:12Z/"}],"url":"https://github.com/avahi/avahi/security/advisories/GHSA-mhf3-865v-g5rc"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11316","reference_id":"RHSA-2026:11316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11316"},{"reference_url":"https://usn.ubuntu.com/7967-1/","reference_id":"USN-7967-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7967-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1032798?format=json","purl":"pkg:apk/alpine/avahi@0.8-r25?arch=loongarch64&distroversion=edge&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/avahi@0.8-r25%3Farch=loongarch64&distroversion=edge&reponame=main"}],"aliases":["CVE-2025-68276"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-unwy-8b3g-hbbx"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/avahi@0.8-r25%3Farch=loongarch64&distroversion=edge&reponame=main"}