{"url":"http://public2.vulnerablecode.io/api/packages/436159?format=json","purl":"pkg:apk/alpine/dotnet8-runtime@8.0.21-r0?arch=ppc64le&distroversion=edge&reponame=community","type":"apk","namespace":"alpine","name":"dotnet8-runtime","version":"8.0.21-r0","qualifiers":{"arch":"ppc64le","distroversion":"edge","reponame":"community"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"8.0.24-r0","latest_non_vulnerable_version":"8.0.26-r0","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/21798?format=json","vulnerability_id":"VCID-cju3-5hjk-h3d3","summary":"Microsoft Security Advisory CVE-2025-55315: .NET Security Feature Bypass Vulnerability\nMicrosoft is releasing this security advisory to provide information about a vulnerability in ASP.NET Core 10.0 , ASP.NET Core 9.0 , ASP.NET Core 8.0, and ASP.NET Core 2.3. This advisory also provides guidance on what developers can do to update their applications to address this vulnerability.\n\nInconsistent interpretation of http requests ('http request/response smuggling') in ASP.NET Core allows an authorized attacker to bypass a security feature over a network.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55315.json","reference_id":"","reference_type":"","scores":[{"value":"8.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55315.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-55315","reference_id":"","reference_type":"","scores":[{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42672","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42645","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01104","scoring_system":"epss","scoring_elements":"0.78068","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01104","scoring_system":"epss","scoring_elements":"0.78042","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01284","scoring_system":"epss","scoring_elements":"0.79639","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01284","scoring_system":"epss","scoring_elements":"0.79612","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01284","scoring_system":"epss","scoring_elements":"0.79609","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01284","scoring_system":"epss","scoring_elements":"0.7964","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01284","scoring_system":"epss","scoring_elements":"0.79695","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01284","scoring_system":"epss","scoring_elements":"0.79679","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01284","scoring_system":"epss","scoring_elements":"0.79673","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01284","scoring_system":"epss","scoring_elements":"0.79642","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01284","scoring_system":"epss","scoring_elements":"0.79617","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01284","scoring_system":"epss","scoring_elements":"0.79633","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-55315"},{"reference_url":"https://github.com/dotnet/announcements/issues/371","reference_id":"","reference_type":"","scores":[{"value":"9.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/dotnet/announcements/issues/371"},{"reference_url":"https://github.com/dotnet/aspnetcore","reference_id":"","reference_type":"","scores":[{"value":"9.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/dotnet/aspnetcore"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2403085","reference_id":"2403085","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2403085"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/52492.py","reference_id":"CVE-2025-55315","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/52492.py"},{"reference_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55315","reference_id":"CVE-2025-55315","reference_type":"","scores":[{"value":"9.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L"},{"value":"9.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L/E:U/RL:O/RC:C"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-10-28T12:57:54Z/"}],"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55315"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2025-55315","reference_id":"CVE-2025-55315","reference_type":"","scores":[{"value":"9.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-55315"},{"reference_url":"https://github.com/advisories/GHSA-5rrx-jjjq-q2r5","reference_id":"GHSA-5rrx-jjjq-q2r5","reference_type":"","scores":[{"value":"CRITICAL","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-5rrx-jjjq-q2r5"},{"reference_url":"https://github.com/dotnet/aspnetcore/security/advisories/GHSA-5rrx-jjjq-q2r5","reference_id":"GHSA-5rrx-jjjq-q2r5","reference_type":"","scores":[{"value":"9.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L"},{"value":"CRITICAL","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/dotnet/aspnetcore/security/advisories/GHSA-5rrx-jjjq-q2r5"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18148","reference_id":"RHSA-2025:18148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18149","reference_id":"RHSA-2025:18149","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18149"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18150","reference_id":"RHSA-2025:18150","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18150"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18151","reference_id":"RHSA-2025:18151","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18151"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18152","reference_id":"RHSA-2025:18152","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18152"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18153","reference_id":"RHSA-2025:18153","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18153"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18256","reference_id":"RHSA-2025:18256","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18256"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23225","reference_id":"RHSA-2025:23225","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23225"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9080","reference_id":"RHSA-2026:9080","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9080"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9205","reference_id":"RHSA-2026:9205","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9205"},{"reference_url":"https://usn.ubuntu.com/7822-1/","reference_id":"USN-7822-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7822-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/436159?format=json","purl":"pkg:apk/alpine/dotnet8-runtime@8.0.21-r0?arch=ppc64le&distroversion=edge&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/dotnet8-runtime@8.0.21-r0%3Farch=ppc64le&distroversion=edge&reponame=community"}],"aliases":["CVE-2025-55315","GHSA-5rrx-jjjq-q2r5"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cju3-5hjk-h3d3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/21831?format=json","vulnerability_id":"VCID-hrdk-wnbt-cyes","summary":"Microsoft Security Advisory CVE-2025-55247 | .NET Denial of Service Vulnerability\nMicrosoft is releasing this security advisory to provide information about a vulnerability in .NET 8.0.xxx, .NET 9.0.xxx and .NET 10.0.xxx. This advisory also provides guidance on what developers can do to update their environments to remove this vulnerability.\n\nA vulnerability exists in .NET where predictable paths for MSBuild's temporary directories on Linux let another user create the directories ahead of MSBuild, leading to DoS of builds. This only affects .NET on Linux operating systems.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55247.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55247.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-55247","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03065","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0302","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03031","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03002","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02975","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02977","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02964","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03033","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02915","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02906","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02953","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02931","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02941","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02968","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-55247"},{"reference_url":"https://github.com/dotnet/msbuild","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/dotnet/msbuild"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2403086","reference_id":"2403086","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2403086"},{"reference_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55247","reference_id":"CVE-2025-55247","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-15T13:49:15Z/"}],"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55247"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2025-55247","reference_id":"CVE-2025-55247","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-55247"},{"reference_url":"https://github.com/advisories/GHSA-w3q9-fxm7-j8fq","reference_id":"GHSA-w3q9-fxm7-j8fq","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-w3q9-fxm7-j8fq"},{"reference_url":"https://github.com/dotnet/msbuild/security/advisories/GHSA-w3q9-fxm7-j8fq","reference_id":"GHSA-w3q9-fxm7-j8fq","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/dotnet/msbuild/security/advisories/GHSA-w3q9-fxm7-j8fq"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18148","reference_id":"RHSA-2025:18148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18149","reference_id":"RHSA-2025:18149","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18149"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18150","reference_id":"RHSA-2025:18150","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18150"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18151","reference_id":"RHSA-2025:18151","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18151"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18152","reference_id":"RHSA-2025:18152","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18152"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18153","reference_id":"RHSA-2025:18153","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18153"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18256","reference_id":"RHSA-2025:18256","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18256"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23225","reference_id":"RHSA-2025:23225","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23225"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9080","reference_id":"RHSA-2026:9080","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9080"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9205","reference_id":"RHSA-2026:9205","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9205"},{"reference_url":"https://usn.ubuntu.com/7822-1/","reference_id":"USN-7822-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7822-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/436159?format=json","purl":"pkg:apk/alpine/dotnet8-runtime@8.0.21-r0?arch=ppc64le&distroversion=edge&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/dotnet8-runtime@8.0.21-r0%3Farch=ppc64le&distroversion=edge&reponame=community"}],"aliases":["CVE-2025-55247","GHSA-w3q9-fxm7-j8fq"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hrdk-wnbt-cyes"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/21832?format=json","vulnerability_id":"VCID-k3fx-jcj4-jfc6","summary":"Microsoft Security Advisory CVE-2025-55248: .NET Information Disclosure Vulnerability\nMicrosoft is releasing this security advisory to provide information about a vulnerability in .NET 8.0 and .NET 9.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.\n\nA MITM (man in the middle) attacker may prevent use of TLS between client and SMTP server, forcing client to send data over unencrypted connection.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55248.json","reference_id":"","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55248.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-55248","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07293","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07319","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07356","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07246","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07223","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07326","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07327","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07268","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07301","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07234","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07304","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07313","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08003","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-55248"},{"reference_url":"https://github.com/dotnet/announcements/issues/372","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/dotnet/announcements/issues/372"},{"reference_url":"https://github.com/dotnet/runtime","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/dotnet/runtime"},{"reference_url":"https://github.com/dotnet/runtime/issues/120713","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/dotnet/runtime/issues/120713"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2403083","reference_id":"2403083","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2403083"},{"reference_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55248","reference_id":"CVE-2025-55248","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C"},{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-14T19:18:38Z/"}],"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55248"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2025-55248","reference_id":"CVE-2025-55248","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-55248"},{"reference_url":"https://github.com/advisories/GHSA-gwq6-fmvp-qp68","reference_id":"GHSA-gwq6-fmvp-qp68","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-gwq6-fmvp-qp68"},{"reference_url":"https://github.com/dotnet/runtime/security/advisories/GHSA-gwq6-fmvp-qp68","reference_id":"GHSA-gwq6-fmvp-qp68","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/dotnet/runtime/security/advisories/GHSA-gwq6-fmvp-qp68"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18148","reference_id":"RHSA-2025:18148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18149","reference_id":"RHSA-2025:18149","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18149"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18150","reference_id":"RHSA-2025:18150","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18150"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18151","reference_id":"RHSA-2025:18151","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18151"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18152","reference_id":"RHSA-2025:18152","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18152"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18153","reference_id":"RHSA-2025:18153","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18153"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18256","reference_id":"RHSA-2025:18256","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18256"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23225","reference_id":"RHSA-2025:23225","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23225"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9080","reference_id":"RHSA-2026:9080","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9080"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9205","reference_id":"RHSA-2026:9205","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9205"},{"reference_url":"https://usn.ubuntu.com/7822-1/","reference_id":"USN-7822-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7822-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/436159?format=json","purl":"pkg:apk/alpine/dotnet8-runtime@8.0.21-r0?arch=ppc64le&distroversion=edge&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/dotnet8-runtime@8.0.21-r0%3Farch=ppc64le&distroversion=edge&reponame=community"}],"aliases":["CVE-2025-55248","GHSA-gwq6-fmvp-qp68"],"risk_score":3.7,"exploitability":"0.5","weighted_severity":"7.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k3fx-jcj4-jfc6"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/dotnet8-runtime@8.0.21-r0%3Farch=ppc64le&distroversion=edge&reponame=community"}