{"url":"http://public2.vulnerablecode.io/api/packages/583458?format=json","purl":"pkg:deb/debian/expat@2.5.0-1%2Bdeb12u2","type":"deb","namespace":"debian","name":"expat","version":"2.5.0-1+deb12u2","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"2.8.0-2","latest_non_vulnerable_version":"2.8.0-2","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/352863?format=json","vulnerability_id":"VCID-292c-g8n3-cyfn","summary":"libexpat before 2.7.6 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-41080.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-41080.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-41080","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06902","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06758","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08646","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08692","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09814","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09592","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09508","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09669","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09738","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09715","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09747","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-41080"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-41080","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-41080"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.openwall.com/lists/oss-security/2026/04/26/1","reference_id":"1","reference_type":"","scores":[{"value":"2.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-18T02:32:34Z/"}],"url":"https://www.openwall.com/lists/oss-security/2026/04/26/1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134732","reference_id":"1134732","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134732"},{"reference_url":"https://github.com/libexpat/libexpat/pull/1183","reference_id":"1183","reference_type":"","scores":[{"value":"2.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-18T02:32:34Z/"}],"url":"https://github.com/libexpat/libexpat/pull/1183"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2458967","reference_id":"2458967","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2458967"},{"reference_url":"https://github.com/libexpat/libexpat/issues/47","reference_id":"47","reference_type":"","scores":[{"value":"2.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-18T02:32:34Z/"}],"url":"https://github.com/libexpat/libexpat/issues/47"},{"reference_url":"https://blog.hartwork.org/posts/expat-2-8-0-released/","reference_id":"expat-2-8-0-released","reference_type":"","scores":[{"value":"2.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-18T02:32:34Z/"}],"url":"https://blog.hartwork.org/posts/expat-2-8-0-released/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11004","reference_id":"RHSA-2026:11004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11004"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1077817?format=json","purl":"pkg:deb/debian/expat@2.8.0-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-z7ne-wvmz-ykbz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/expat@2.8.0-1"}],"aliases":["CVE-2026-41080"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-292c-g8n3-cyfn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62712?format=json","vulnerability_id":"VCID-77y6-jskt-qucb","summary":"libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-59375.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-59375.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-59375","reference_id":"","reference_type":"","scores":[{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12206","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12038","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15123","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15245","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14998","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15184","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15188","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15202","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15218","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15748","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15811","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15871","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15663","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15808","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18215","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18262","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18121","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18108","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18164","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23052","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-59375"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59375"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/libexpat/libexpat/issues/1018","reference_id":"1018","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:T/RC:C"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-15T20:22:58Z/"}],"url":"https://github.com/libexpat/libexpat/issues/1018"},{"reference_url":"https://github.com/libexpat/libexpat/pull/1034","reference_id":"1034","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:T/RC:C"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-15T20:22:58Z/"}],"url":"https://github.com/libexpat/libexpat/pull/1034"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1115298","reference_id":"1115298","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1115298"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395108","reference_id":"2395108","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395108"},{"reference_url":"https://issues.oss-fuzz.com/issues/439133977","reference_id":"439133977","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:T/RC:C"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-15T20:22:58Z/"}],"url":"https://issues.oss-fuzz.com/issues/439133977"},{"reference_url":"https://github.com/libexpat/libexpat/blob/R_2_7_2/expat/Changes","reference_id":"Changes","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:T/RC:C"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-15T20:22:58Z/"}],"url":"https://github.com/libexpat/libexpat/blob/R_2_7_2/expat/Changes"},{"reference_url":"https://github.com/libexpat/libexpat/blob/676a4c531ec768732fac215da9730b5f50fbd2bf/expat/Changes#L45-L74","reference_id":"Changes#L45-L74","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:T/RC:C"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-15T20:22:58Z/"}],"url":"https://github.com/libexpat/libexpat/blob/676a4c531ec768732fac215da9730b5f50fbd2bf/expat/Changes#L45-L74"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2026-20","reference_id":"mfsa2026-20","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2026-20"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2026-22","reference_id":"mfsa2026-22","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2026-22"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2026-23","reference_id":"mfsa2026-23","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2026-23"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2026-24","reference_id":"mfsa2026-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2026-24"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19020","reference_id":"RHSA-2025:19020","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19020"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19403","reference_id":"RHSA-2025:19403","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19403"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21030","reference_id":"RHSA-2025:21030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21030"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21773","reference_id":"RHSA-2025:21773","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21773"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21776","reference_id":"RHSA-2025:21776","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21776"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21974","reference_id":"RHSA-2025:21974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22033","reference_id":"RHSA-2025:22033","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22033"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22034","reference_id":"RHSA-2025:22034","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22034"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22035","reference_id":"RHSA-2025:22035","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22035"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22175","reference_id":"RHSA-2025:22175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22175"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22607","reference_id":"RHSA-2025:22607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22618","reference_id":"RHSA-2025:22618","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22618"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22785","reference_id":"RHSA-2025:22785","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22785"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22842","reference_id":"RHSA-2025:22842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22871","reference_id":"RHSA-2025:22871","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22871"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22935","reference_id":"RHSA-2025:22935","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22935"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23078","reference_id":"RHSA-2025:23078","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23078"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23079","reference_id":"RHSA-2025:23079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23079"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23080","reference_id":"RHSA-2025:23080","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23080"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23202","reference_id":"RHSA-2025:23202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23204","reference_id":"RHSA-2025:23204","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23204"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23205","reference_id":"RHSA-2025:23205","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23205"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23209","reference_id":"RHSA-2025:23209","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23209"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23227","reference_id":"RHSA-2025:23227","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23227"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23248","reference_id":"RHSA-2025:23248","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23248"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23449","reference_id":"RHSA-2025:23449","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23449"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23550","reference_id":"RHSA-2025:23550","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23550"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0001","reference_id":"RHSA-2026:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0076","reference_id":"RHSA-2026:0076","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0076"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0077","reference_id":"RHSA-2026:0077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0078","reference_id":"RHSA-2026:0078","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0078"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0326","reference_id":"RHSA-2026:0326","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0326"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0332","reference_id":"RHSA-2026:0332","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0332"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0414","reference_id":"RHSA-2026:0414","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0414"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0420","reference_id":"RHSA-2026:0420","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0420"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0518","reference_id":"RHSA-2026:0518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0674","reference_id":"RHSA-2026:0674","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0674"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0677","reference_id":"RHSA-2026:0677","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0677"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0702","reference_id":"RHSA-2026:0702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0934","reference_id":"RHSA-2026:0934","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0934"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0996","reference_id":"RHSA-2026:0996","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0996"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10950","reference_id":"RHSA-2026:10950","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10950"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1541","reference_id":"RHSA-2026:1541","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1541"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1652","reference_id":"RHSA-2026:1652","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1652"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3407","reference_id":"RHSA-2026:3407","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3407"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3461","reference_id":"RHSA-2026:3461","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3461"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3462","reference_id":"RHSA-2026:3462","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3462"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:5396","reference_id":"RHSA-2026:5396","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:5396"},{"reference_url":"https://usn.ubuntu.com/8022-1/","reference_id":"USN-8022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8022-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583460?format=json","purl":"pkg:deb/debian/expat@2.7.5-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-292c-g8n3-cyfn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/expat@2.7.5-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1077817?format=json","purl":"pkg:deb/debian/expat@2.8.0-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-z7ne-wvmz-ykbz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/expat@2.8.0-1"}],"aliases":["CVE-2025-59375"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-77y6-jskt-qucb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64254?format=json","vulnerability_id":"VCID-jqe4-44gw-wbhu","summary":"libexpat: libexpat: Denial of Service via infinite loop in DTD content parsing","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-32777.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-32777.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-32777","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01681","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01691","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0169","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01689","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01698","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01684","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01674","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01673","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01662","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02463","published_at":"2026-04-18T12:55:00Z"},{"value":"5e-05","scoring_system":"epss","scoring_elements":"0.00231","published_at":"2026-04-26T12:55:00Z"},{"value":"5e-05","scoring_system":"epss","scoring_elements":"0.00232","published_at":"2026-04-24T12:55:00Z"},{"value":"5e-05","scoring_system":"epss","scoring_elements":"0.00228","published_at":"2026-04-29T12:55:00Z"},{"value":"5e-05","scoring_system":"epss","scoring_elements":"0.00229","published_at":"2026-05-07T12:55:00Z"},{"value":"5e-05","scoring_system":"epss","scoring_elements":"0.0023","published_at":"2026-05-09T12:55:00Z"},{"value":"5e-05","scoring_system":"epss","scoring_elements":"0.00227","published_at":"2026-05-11T12:55:00Z"},{"value":"5e-05","scoring_system":"epss","scoring_elements":"0.00224","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-32777"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32777","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32777"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1131118","reference_id":"1131118","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1131118"},{"reference_url":"https://github.com/libexpat/libexpat/pull/1159","reference_id":"1159","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-16T14:55:22Z/"}],"url":"https://github.com/libexpat/libexpat/pull/1159"},{"reference_url":"https://github.com/libexpat/libexpat/issues/1161","reference_id":"1161","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-16T14:55:22Z/"}],"url":"https://github.com/libexpat/libexpat/issues/1161"},{"reference_url":"https://github.com/libexpat/libexpat/pull/1162","reference_id":"1162","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-16T14:55:22Z/"}],"url":"https://github.com/libexpat/libexpat/pull/1162"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2447890","reference_id":"2447890","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2447890"},{"reference_url":"https://issues.oss-fuzz.com/issues/486993411","reference_id":"486993411","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-16T14:55:22Z/"}],"url":"https://issues.oss-fuzz.com/issues/486993411"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583460?format=json","purl":"pkg:deb/debian/expat@2.7.5-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-292c-g8n3-cyfn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/expat@2.7.5-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1077817?format=json","purl":"pkg:deb/debian/expat@2.8.0-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-z7ne-wvmz-ykbz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/expat@2.8.0-1"}],"aliases":["CVE-2026-32777"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jqe4-44gw-wbhu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64253?format=json","vulnerability_id":"VCID-nktd-7gph-kkb1","summary":"libexpat: libexpat: Denial of Service via NULL pointer dereference after out-of-memory condition","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-32778.json","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-32778.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-32778","reference_id":"","reference_type":"","scores":[{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02312","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02307","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02317","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02314","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02338","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02321","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02305","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02289","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03293","published_at":"2026-04-18T12:55:00Z"},{"value":"5e-05","scoring_system":"epss","scoring_elements":"0.00276","published_at":"2026-05-11T12:55:00Z"},{"value":"5e-05","scoring_system":"epss","scoring_elements":"0.00273","published_at":"2026-05-12T12:55:00Z"},{"value":"5e-05","scoring_system":"epss","scoring_elements":"0.00272","published_at":"2026-05-14T12:55:00Z"},{"value":"5e-05","scoring_system":"epss","scoring_elements":"0.00279","published_at":"2026-05-07T12:55:00Z"},{"value":"5e-05","scoring_system":"epss","scoring_elements":"0.00284","published_at":"2026-04-24T12:55:00Z"},{"value":"5e-05","scoring_system":"epss","scoring_elements":"0.00282","published_at":"2026-04-26T12:55:00Z"},{"value":"5e-05","scoring_system":"epss","scoring_elements":"0.00277","published_at":"2026-05-05T12:55:00Z"},{"value":"5e-05","scoring_system":"epss","scoring_elements":"0.0028","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-32778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32778"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1131119","reference_id":"1131119","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1131119"},{"reference_url":"https://github.com/libexpat/libexpat/pull/1159","reference_id":"1159","reference_type":"","scores":[{"value":"2.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-17T14:38:41Z/"}],"url":"https://github.com/libexpat/libexpat/pull/1159"},{"reference_url":"https://github.com/libexpat/libexpat/pull/1163","reference_id":"1163","reference_type":"","scores":[{"value":"2.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-17T14:38:41Z/"}],"url":"https://github.com/libexpat/libexpat/pull/1163"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2447885","reference_id":"2447885","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2447885"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583460?format=json","purl":"pkg:deb/debian/expat@2.7.5-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-292c-g8n3-cyfn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/expat@2.7.5-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1077817?format=json","purl":"pkg:deb/debian/expat@2.8.0-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-z7ne-wvmz-ykbz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/expat@2.8.0-1"}],"aliases":["CVE-2026-32778"],"risk_score":2.3,"exploitability":"0.5","weighted_severity":"4.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nktd-7gph-kkb1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77771?format=json","vulnerability_id":"VCID-qmx9-wkj4-67h3","summary":"expat: recursive XML entity expansion vulnerability","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52426.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52426.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-52426","reference_id":"","reference_type":"","scores":[{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05799","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06279","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05867","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.0586","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05824","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05834","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05986","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06016","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06052","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06058","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06079","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06178","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06253","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.0627","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06272","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05835","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05829","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05869","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05895","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05876","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-52426"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52426","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52426"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/libexpat/libexpat/commit/0f075ec8ecb5e43f8fdca5182f8cca4703da0404","reference_id":"0f075ec8ecb5e43f8fdca5182f8cca4703da0404","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T15:54:28Z/"}],"url":"https://github.com/libexpat/libexpat/commit/0f075ec8ecb5e43f8fdca5182f8cca4703da0404"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1063240","reference_id":"1063240","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1063240"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2262879","reference_id":"2262879","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2262879"},{"reference_url":"https://cwe.mitre.org/data/definitions/776.html","reference_id":"776.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T15:54:28Z/"}],"url":"https://cwe.mitre.org/data/definitions/776.html"},{"reference_url":"https://github.com/libexpat/libexpat/pull/777","reference_id":"777","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T15:54:28Z/"}],"url":"https://github.com/libexpat/libexpat/pull/777"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240307-0005/","reference_id":"ntap-20240307-0005","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T15:54:28Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240307-0005/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNRIHC7DVVRAIWFRGV23Y6UZXFBXSQDB/","reference_id":"PNRIHC7DVVRAIWFRGV23Y6UZXFBXSQDB","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T15:54:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNRIHC7DVVRAIWFRGV23Y6UZXFBXSQDB/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNUBSGZFEZOBHJFTAD42SAN4ATW2VEMV/","reference_id":"WNUBSGZFEZOBHJFTAD42SAN4ATW2VEMV","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T15:54:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNUBSGZFEZOBHJFTAD42SAN4ATW2VEMV/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583459?format=json","purl":"pkg:deb/debian/expat@2.7.1-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-292c-g8n3-cyfn"},{"vulnerability":"VCID-77y6-jskt-qucb"},{"vulnerability":"VCID-jqe4-44gw-wbhu"},{"vulnerability":"VCID-nktd-7gph-kkb1"},{"vulnerability":"VCID-utz3-ytaf-cbht"},{"vulnerability":"VCID-v41j-xj8s-m7ar"},{"vulnerability":"VCID-yw8s-ezc7-6ub8"},{"vulnerability":"VCID-z7ne-wvmz-ykbz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/expat@2.7.1-2"}],"aliases":["CVE-2023-52426"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qmx9-wkj4-67h3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77272?format=json","vulnerability_id":"VCID-u5pr-wheu-h7c6","summary":"expat: XML Entity Expansion","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28757.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28757.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-28757","reference_id":"","reference_type":"","scores":[{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.79056","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78879","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78902","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78887","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78877","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78906","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78903","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78991","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.79005","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.79002","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.79018","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01209","scoring_system":"epss","scoring_elements":"0.79008","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79227","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79204","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79211","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79241","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79104","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.7913","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79115","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.7914","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-28757"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28757"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/03/15/1","reference_id":"1","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-11T13:15:18Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/03/15/1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1065868","reference_id":"1065868","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1065868"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2268766","reference_id":"2268766","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2268766"},{"reference_url":"https://github.com/libexpat/libexpat/issues/839","reference_id":"839","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-11T13:15:18Z/"}],"url":"https://github.com/libexpat/libexpat/issues/839"},{"reference_url":"https://github.com/libexpat/libexpat/pull/842","reference_id":"842","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-11T13:15:18Z/"}],"url":"https://github.com/libexpat/libexpat/pull/842"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPLC6WDSRDUYS7F7JWAOVOHFNOUQ43DD/","reference_id":"FPLC6WDSRDUYS7F7JWAOVOHFNOUQ43DD","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-11T13:15:18Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPLC6WDSRDUYS7F7JWAOVOHFNOUQ43DD/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKJ7V5F6LJCEQJXDBWGT27J7NAP3E3N7/","reference_id":"LKJ7V5F6LJCEQJXDBWGT27J7NAP3E3N7","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-11T13:15:18Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKJ7V5F6LJCEQJXDBWGT27J7NAP3E3N7/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240322-0001/","reference_id":"ntap-20240322-0001","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-11T13:15:18Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240322-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1530","reference_id":"RHSA-2024:1530","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1530"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3926","reference_id":"RHSA-2024:3926","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3926"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21776","reference_id":"RHSA-2025:21776","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21776"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3876","reference_id":"RHSA-2026:3876","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3876"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4419","reference_id":"RHSA-2026:4419","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4419"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4465","reference_id":"RHSA-2026:4465","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4465"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4480","reference_id":"RHSA-2026:4480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:5087","reference_id":"RHSA-2026:5087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:5087"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7239","reference_id":"RHSA-2026:7239","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7239"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7243","reference_id":"RHSA-2026:7243","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7243"},{"reference_url":"https://usn.ubuntu.com/6694-1/","reference_id":"USN-6694-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6694-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VK2O34GH43NTHBZBN7G5Y6YKJKPUCTBE/","reference_id":"VK2O34GH43NTHBZBN7G5Y6YKJKPUCTBE","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-11T13:15:18Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VK2O34GH43NTHBZBN7G5Y6YKJKPUCTBE/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583459?format=json","purl":"pkg:deb/debian/expat@2.7.1-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-292c-g8n3-cyfn"},{"vulnerability":"VCID-77y6-jskt-qucb"},{"vulnerability":"VCID-jqe4-44gw-wbhu"},{"vulnerability":"VCID-nktd-7gph-kkb1"},{"vulnerability":"VCID-utz3-ytaf-cbht"},{"vulnerability":"VCID-v41j-xj8s-m7ar"},{"vulnerability":"VCID-yw8s-ezc7-6ub8"},{"vulnerability":"VCID-z7ne-wvmz-ykbz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/expat@2.7.1-2"}],"aliases":["CVE-2024-28757"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u5pr-wheu-h7c6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64825?format=json","vulnerability_id":"VCID-utz3-ytaf-cbht","summary":"libexpat: libexpat: Information disclosure and data integrity issues due to integer overflow in buffer reallocation","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-25210.json","reference_id":"","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-25210.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-25210","reference_id":"","reference_type":"","scores":[{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00357","published_at":"2026-04-04T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00355","published_at":"2026-04-02T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00345","published_at":"2026-04-07T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00509","published_at":"2026-05-14T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00516","published_at":"2026-04-29T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00521","published_at":"2026-05-05T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.0052","published_at":"2026-05-07T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00508","published_at":"2026-05-11T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00506","published_at":"2026-05-12T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00489","published_at":"2026-04-08T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00487","published_at":"2026-04-18T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00483","published_at":"2026-04-16T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00486","published_at":"2026-04-13T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00518","published_at":"2026-04-21T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00514","published_at":"2026-05-09T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00515","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-25210"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25210","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25210"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/libexpat/libexpat/pull/1075","reference_id":"1075","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-03T15:53:34Z/"}],"url":"https://github.com/libexpat/libexpat/pull/1075"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126697","reference_id":"1126697","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126697"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2435454","reference_id":"2435454","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2435454"},{"reference_url":"https://github.com/libexpat/libexpat/pull/1075/commits/9c2d990389e6abe2e44527eeaa8b39f16fe859c7","reference_id":"9c2d990389e6abe2e44527eeaa8b39f16fe859c7","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-03T15:53:34Z/"}],"url":"https://github.com/libexpat/libexpat/pull/1075/commits/9c2d990389e6abe2e44527eeaa8b39f16fe859c7"},{"reference_url":"https://usn.ubuntu.com/8022-1/","reference_id":"USN-8022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8022-1/"},{"reference_url":"https://usn.ubuntu.com/8022-2/","reference_id":"USN-8022-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8022-2/"},{"reference_url":"https://usn.ubuntu.com/8023-1/","reference_id":"USN-8023-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8023-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583460?format=json","purl":"pkg:deb/debian/expat@2.7.5-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-292c-g8n3-cyfn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/expat@2.7.5-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1077817?format=json","purl":"pkg:deb/debian/expat@2.8.0-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-z7ne-wvmz-ykbz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/expat@2.8.0-1"}],"aliases":["CVE-2026-25210"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-utz3-ytaf-cbht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64255?format=json","vulnerability_id":"VCID-v41j-xj8s-m7ar","summary":"libexpat: libexpat: Denial of Service due to NULL pointer dereference","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-32776.json","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-32776.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-32776","reference_id":"","reference_type":"","scores":[{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02312","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02307","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02317","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02314","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02338","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02321","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02305","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02289","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03293","published_at":"2026-04-18T12:55:00Z"},{"value":"5e-05","scoring_system":"epss","scoring_elements":"0.00276","published_at":"2026-05-11T12:55:00Z"},{"value":"5e-05","scoring_system":"epss","scoring_elements":"0.00273","published_at":"2026-05-12T12:55:00Z"},{"value":"5e-05","scoring_system":"epss","scoring_elements":"0.00272","published_at":"2026-05-14T12:55:00Z"},{"value":"5e-05","scoring_system":"epss","scoring_elements":"0.00279","published_at":"2026-05-07T12:55:00Z"},{"value":"5e-05","scoring_system":"epss","scoring_elements":"0.00284","published_at":"2026-04-24T12:55:00Z"},{"value":"5e-05","scoring_system":"epss","scoring_elements":"0.00282","published_at":"2026-04-26T12:55:00Z"},{"value":"5e-05","scoring_system":"epss","scoring_elements":"0.00277","published_at":"2026-05-05T12:55:00Z"},{"value":"5e-05","scoring_system":"epss","scoring_elements":"0.0028","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-32776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32776"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1131117","reference_id":"1131117","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1131117"},{"reference_url":"https://github.com/libexpat/libexpat/pull/1158","reference_id":"1158","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-16T14:58:32Z/"}],"url":"https://github.com/libexpat/libexpat/pull/1158"},{"reference_url":"https://github.com/libexpat/libexpat/pull/1159","reference_id":"1159","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-16T14:58:32Z/"}],"url":"https://github.com/libexpat/libexpat/pull/1159"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2447888","reference_id":"2447888","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2447888"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583460?format=json","purl":"pkg:deb/debian/expat@2.7.5-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-292c-g8n3-cyfn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/expat@2.7.5-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1077817?format=json","purl":"pkg:deb/debian/expat@2.8.0-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-z7ne-wvmz-ykbz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/expat@2.8.0-1"}],"aliases":["CVE-2026-32776"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v41j-xj8s-m7ar"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64890?format=json","vulnerability_id":"VCID-yw8s-ezc7-6ub8","summary":"libexpat: libexpat null pointer dereference","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-24515.json","reference_id":"","reference_type":"","scores":[{"value":"2.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-24515.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-24515","reference_id":"","reference_type":"","scores":[{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00366","published_at":"2026-05-07T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00352","published_at":"2026-05-12T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00368","published_at":"2026-04-26T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00363","published_at":"2026-05-05T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00361","published_at":"2026-05-09T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00369","published_at":"2026-04-21T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00357","published_at":"2026-05-14T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00354","published_at":"2026-04-08T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00355","published_at":"2026-05-11T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00351","published_at":"2026-04-11T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00348","published_at":"2026-04-12T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00346","published_at":"2026-04-13T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00341","published_at":"2026-04-16T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00345","published_at":"2026-04-18T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00367","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-24515"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24515","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24515"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126277","reference_id":"1126277","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126277"},{"reference_url":"https://github.com/libexpat/libexpat/pull/1131","reference_id":"1131","reference_type":"","scores":[{"value":"2.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-23T15:31:37Z/"}],"url":"https://github.com/libexpat/libexpat/pull/1131"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2432312","reference_id":"2432312","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2432312"},{"reference_url":"https://usn.ubuntu.com/8022-1/","reference_id":"USN-8022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8022-1/"},{"reference_url":"https://usn.ubuntu.com/8022-2/","reference_id":"USN-8022-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8022-2/"},{"reference_url":"https://usn.ubuntu.com/8023-1/","reference_id":"USN-8023-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8023-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583460?format=json","purl":"pkg:deb/debian/expat@2.7.5-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-292c-g8n3-cyfn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/expat@2.7.5-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1077817?format=json","purl":"pkg:deb/debian/expat@2.8.0-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-z7ne-wvmz-ykbz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/expat@2.8.0-1"}],"aliases":["CVE-2026-24515"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yw8s-ezc7-6ub8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/357900?format=json","vulnerability_id":"VCID-z7ne-wvmz-ykbz","summary":"","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-45186","reference_id":"","reference_type":"","scores":[{"value":"4e-05","scoring_system":"epss","scoring_elements":"0.0019","published_at":"2026-05-11T12:55:00Z"},{"value":"4e-05","scoring_system":"epss","scoring_elements":"0.00188","published_at":"2026-05-12T12:55:00Z"},{"value":"4e-05","scoring_system":"epss","scoring_elements":"0.00187","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-45186"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-45186","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-45186"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1136164","reference_id":"1136164","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1136164"},{"reference_url":"https://github.com/libexpat/libexpat/pull/1216","reference_id":"1216","reference_type":"","scores":[{"value":"2.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-05-11T15:01:28Z/"}],"url":"https://github.com/libexpat/libexpat/pull/1216"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1112937?format=json","purl":"pkg:deb/debian/expat@2.8.0-2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/expat@2.8.0-2"}],"aliases":["CVE-2026-45186"],"risk_score":1.3,"exploitability":"0.5","weighted_severity":"2.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z7ne-wvmz-ykbz"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48158?format=json","vulnerability_id":"VCID-1fms-7y9v-dfc5","summary":"Multiple vulnerabilities have been found in Expat, the worst of\n    which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0340.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0340.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-0340","reference_id":"","reference_type":"","scores":[{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17249","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.1867","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18724","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18439","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18519","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18572","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18575","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18477","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.1842","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18433","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18455","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18357","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18341","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18298","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18158","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18528","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19622","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19584","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19612","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19706","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-0340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0340"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1000109","reference_id":"1000109","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1000109"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1001864","reference_id":"1001864","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1001864"},{"reference_url":"https://security.gentoo.org/glsa/201701-21","reference_id":"GLSA-201701-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21776","reference_id":"RHSA-2025:21776","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21776"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22035","reference_id":"RHSA-2025:22035","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22035"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22607","reference_id":"RHSA-2025:22607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22785","reference_id":"RHSA-2025:22785","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22785"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22842","reference_id":"RHSA-2025:22842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22871","reference_id":"RHSA-2025:22871","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22871"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583458?format=json","purl":"pkg:deb/debian/expat@2.5.0-1%2Bdeb12u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-292c-g8n3-cyfn"},{"vulnerability":"VCID-77y6-jskt-qucb"},{"vulnerability":"VCID-jqe4-44gw-wbhu"},{"vulnerability":"VCID-nktd-7gph-kkb1"},{"vulnerability":"VCID-qmx9-wkj4-67h3"},{"vulnerability":"VCID-u5pr-wheu-h7c6"},{"vulnerability":"VCID-utz3-ytaf-cbht"},{"vulnerability":"VCID-v41j-xj8s-m7ar"},{"vulnerability":"VCID-yw8s-ezc7-6ub8"},{"vulnerability":"VCID-z7ne-wvmz-ykbz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/expat@2.5.0-1%252Bdeb12u2"}],"aliases":["CVE-2013-0340"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1fms-7y9v-dfc5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77770?format=json","vulnerability_id":"VCID-7ndj-4zn8-cqa4","summary":"expat: parsing large tokens can trigger a denial of service","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52425.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52425.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-52425","reference_id":"","reference_type":"","scores":[{"value":"0.01401","scoring_system":"epss","scoring_elements":"0.80484","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01401","scoring_system":"epss","scoring_elements":"0.80459","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01401","scoring_system":"epss","scoring_elements":"0.80507","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01401","scoring_system":"epss","scoring_elements":"0.8049","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01552","scoring_system":"epss","scoring_elements":"0.81607","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01552","scoring_system":"epss","scoring_elements":"0.81365","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01552","scoring_system":"epss","scoring_elements":"0.81386","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01552","scoring_system":"epss","scoring_elements":"0.81414","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01552","scoring_system":"epss","scoring_elements":"0.81419","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01552","scoring_system":"epss","scoring_elements":"0.81441","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01552","scoring_system":"epss","scoring_elements":"0.81429","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01552","scoring_system":"epss","scoring_elements":"0.81421","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01552","scoring_system":"epss","scoring_elements":"0.81459","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01552","scoring_system":"epss","scoring_elements":"0.8146","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01552","scoring_system":"epss","scoring_elements":"0.81513","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01552","scoring_system":"epss","scoring_elements":"0.81532","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01552","scoring_system":"epss","scoring_elements":"0.81555","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01552","scoring_system":"epss","scoring_elements":"0.81551","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01552","scoring_system":"epss","scoring_elements":"0.81569","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01552","scoring_system":"epss","scoring_elements":"0.81388","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-52425"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52425","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52425"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1063238","reference_id":"1063238","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1063238"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2262877","reference_id":"2262877","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2262877"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/03/20/5","reference_id":"5","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-26T19:20:56Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/03/20/5"},{"reference_url":"https://github.com/libexpat/libexpat/pull/789","reference_id":"789","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-26T19:20:56Z/"}],"url":"https://github.com/libexpat/libexpat/pull/789"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-26T19:20:56Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00006.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240614-0003/","reference_id":"ntap-20240614-0003","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-26T19:20:56Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240614-0003/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNRIHC7DVVRAIWFRGV23Y6UZXFBXSQDB/","reference_id":"PNRIHC7DVVRAIWFRGV23Y6UZXFBXSQDB","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-26T19:20:56Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNRIHC7DVVRAIWFRGV23Y6UZXFBXSQDB/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1530","reference_id":"RHSA-2024:1530","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1530"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1615","reference_id":"RHSA-2024:1615","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1615"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2575","reference_id":"RHSA-2024:2575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2839","reference_id":"RHSA-2024:2839","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2839"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3926","reference_id":"RHSA-2024:3926","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3926"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4259","reference_id":"RHSA-2024:4259","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4259"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22035","reference_id":"RHSA-2025:22035","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22035"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22785","reference_id":"RHSA-2025:22785","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22785"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22871","reference_id":"RHSA-2025:22871","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22871"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3453","reference_id":"RHSA-2025:3453","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3453"},{"reference_url":"https://usn.ubuntu.com/6694-1/","reference_id":"USN-6694-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6694-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNUBSGZFEZOBHJFTAD42SAN4ATW2VEMV/","reference_id":"WNUBSGZFEZOBHJFTAD42SAN4ATW2VEMV","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-26T19:20:56Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNUBSGZFEZOBHJFTAD42SAN4ATW2VEMV/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583458?format=json","purl":"pkg:deb/debian/expat@2.5.0-1%2Bdeb12u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-292c-g8n3-cyfn"},{"vulnerability":"VCID-77y6-jskt-qucb"},{"vulnerability":"VCID-jqe4-44gw-wbhu"},{"vulnerability":"VCID-nktd-7gph-kkb1"},{"vulnerability":"VCID-qmx9-wkj4-67h3"},{"vulnerability":"VCID-u5pr-wheu-h7c6"},{"vulnerability":"VCID-utz3-ytaf-cbht"},{"vulnerability":"VCID-v41j-xj8s-m7ar"},{"vulnerability":"VCID-yw8s-ezc7-6ub8"},{"vulnerability":"VCID-z7ne-wvmz-ykbz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/expat@2.5.0-1%252Bdeb12u2"}],"aliases":["CVE-2023-52425"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7ndj-4zn8-cqa4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47563?format=json","vulnerability_id":"VCID-d26t-ex9d-x3ev","summary":"Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45491.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45491.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-45491","reference_id":"","reference_type":"","scores":[{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69364","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69432","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69439","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69443","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69421","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69464","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69498","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69467","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69293","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69311","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69291","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69341","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69358","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.6938","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69351","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69389","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.694","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01143","scoring_system":"epss","scoring_elements":"0.78584","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01143","scoring_system":"epss","scoring_elements":"0.78621","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-45491"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45491","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45491"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1080150","reference_id":"1080150","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1080150"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2308616","reference_id":"2308616","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2308616"},{"reference_url":"https://github.com/libexpat/libexpat/issues/888","reference_id":"888","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-30T13:53:48Z/"}],"url":"https://github.com/libexpat/libexpat/issues/888"},{"reference_url":"https://github.com/libexpat/libexpat/pull/891","reference_id":"891","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-30T13:53:48Z/"}],"url":"https://github.com/libexpat/libexpat/pull/891"},{"reference_url":"https://security.gentoo.org/glsa/202501-09","reference_id":"GLSA-202501-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10135","reference_id":"RHSA-2024:10135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11109","reference_id":"RHSA-2024:11109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6754","reference_id":"RHSA-2024:6754","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6754"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6989","reference_id":"RHSA-2024:6989","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6989"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7213","reference_id":"RHSA-2024:7213","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7213"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7599","reference_id":"RHSA-2024:7599","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7599"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8859","reference_id":"RHSA-2024:8859","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8859"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9610","reference_id":"RHSA-2024:9610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9610"},{"reference_url":"https://usn.ubuntu.com/7000-1/","reference_id":"USN-7000-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7000-1/"},{"reference_url":"https://usn.ubuntu.com/7000-2/","reference_id":"USN-7000-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7000-2/"},{"reference_url":"https://usn.ubuntu.com/7001-1/","reference_id":"USN-7001-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7001-1/"},{"reference_url":"https://usn.ubuntu.com/7001-2/","reference_id":"USN-7001-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7001-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583458?format=json","purl":"pkg:deb/debian/expat@2.5.0-1%2Bdeb12u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-292c-g8n3-cyfn"},{"vulnerability":"VCID-77y6-jskt-qucb"},{"vulnerability":"VCID-jqe4-44gw-wbhu"},{"vulnerability":"VCID-nktd-7gph-kkb1"},{"vulnerability":"VCID-qmx9-wkj4-67h3"},{"vulnerability":"VCID-u5pr-wheu-h7c6"},{"vulnerability":"VCID-utz3-ytaf-cbht"},{"vulnerability":"VCID-v41j-xj8s-m7ar"},{"vulnerability":"VCID-yw8s-ezc7-6ub8"},{"vulnerability":"VCID-z7ne-wvmz-ykbz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/expat@2.5.0-1%252Bdeb12u2"}],"aliases":["CVE-2024-45491"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d26t-ex9d-x3ev"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47562?format=json","vulnerability_id":"VCID-gtcn-kyd2-xqdk","summary":"Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45490.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45490.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-45490","reference_id":"","reference_type":"","scores":[{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67048","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67006","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.6698","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.6703","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67042","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67062","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67016","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67049","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67064","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67044","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67065","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67078","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.66982","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69968","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69973","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69941","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.70017","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.699","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69943","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-45490"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45490","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45490"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1080149","reference_id":"1080149","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1080149"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2308615","reference_id":"2308615","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2308615"},{"reference_url":"https://github.com/libexpat/libexpat/issues/887","reference_id":"887","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-30T18:17:03Z/"}],"url":"https://github.com/libexpat/libexpat/issues/887"},{"reference_url":"https://github.com/libexpat/libexpat/pull/890","reference_id":"890","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-30T18:17:03Z/"}],"url":"https://github.com/libexpat/libexpat/pull/890"},{"reference_url":"https://security.gentoo.org/glsa/202501-09","reference_id":"GLSA-202501-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10135","reference_id":"RHSA-2024:10135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11109","reference_id":"RHSA-2024:11109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6754","reference_id":"RHSA-2024:6754","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6754"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6989","reference_id":"RHSA-2024:6989","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6989"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7213","reference_id":"RHSA-2024:7213","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7213"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7599","reference_id":"RHSA-2024:7599","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7599"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9610","reference_id":"RHSA-2024:9610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3453","reference_id":"RHSA-2025:3453","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3453"},{"reference_url":"https://usn.ubuntu.com/7000-1/","reference_id":"USN-7000-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7000-1/"},{"reference_url":"https://usn.ubuntu.com/7000-2/","reference_id":"USN-7000-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7000-2/"},{"reference_url":"https://usn.ubuntu.com/7001-1/","reference_id":"USN-7001-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7001-1/"},{"reference_url":"https://usn.ubuntu.com/7001-2/","reference_id":"USN-7001-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7001-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583458?format=json","purl":"pkg:deb/debian/expat@2.5.0-1%2Bdeb12u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-292c-g8n3-cyfn"},{"vulnerability":"VCID-77y6-jskt-qucb"},{"vulnerability":"VCID-jqe4-44gw-wbhu"},{"vulnerability":"VCID-nktd-7gph-kkb1"},{"vulnerability":"VCID-qmx9-wkj4-67h3"},{"vulnerability":"VCID-u5pr-wheu-h7c6"},{"vulnerability":"VCID-utz3-ytaf-cbht"},{"vulnerability":"VCID-v41j-xj8s-m7ar"},{"vulnerability":"VCID-yw8s-ezc7-6ub8"},{"vulnerability":"VCID-z7ne-wvmz-ykbz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/expat@2.5.0-1%252Bdeb12u2"}],"aliases":["CVE-2024-45490"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gtcn-kyd2-xqdk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73066?format=json","vulnerability_id":"VCID-k2kp-fv3q-vyh2","summary":"libexpat: expat: DoS via XML_ResumeParser","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-50602.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-50602.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-50602","reference_id":"","reference_type":"","scores":[{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31415","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31474","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31483","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31391","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32074","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32114","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31936","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31987","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32016","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32019","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.3198","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31946","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31958","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31932","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31763","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31637","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31554","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31402","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-50602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50602"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086134","reference_id":"1086134","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086134"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2321987","reference_id":"2321987","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2321987"},{"reference_url":"https://github.com/libexpat/libexpat/pull/915","reference_id":"915","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T18:00:51Z/"}],"url":"https://github.com/libexpat/libexpat/pull/915"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11200","reference_id":"RHSA-2024:11200","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11200"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9502","reference_id":"RHSA-2024:9502","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9541","reference_id":"RHSA-2024:9541","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9541"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3350","reference_id":"RHSA-2025:3350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3350"},{"reference_url":"https://usn.ubuntu.com/7145-1/","reference_id":"USN-7145-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7145-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583458?format=json","purl":"pkg:deb/debian/expat@2.5.0-1%2Bdeb12u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-292c-g8n3-cyfn"},{"vulnerability":"VCID-77y6-jskt-qucb"},{"vulnerability":"VCID-jqe4-44gw-wbhu"},{"vulnerability":"VCID-nktd-7gph-kkb1"},{"vulnerability":"VCID-qmx9-wkj4-67h3"},{"vulnerability":"VCID-u5pr-wheu-h7c6"},{"vulnerability":"VCID-utz3-ytaf-cbht"},{"vulnerability":"VCID-v41j-xj8s-m7ar"},{"vulnerability":"VCID-yw8s-ezc7-6ub8"},{"vulnerability":"VCID-z7ne-wvmz-ykbz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/expat@2.5.0-1%252Bdeb12u2"}],"aliases":["CVE-2024-50602"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k2kp-fv3q-vyh2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70786?format=json","vulnerability_id":"VCID-nguf-68jf-ryaz","summary":"libexpat: expat: Improper Restriction of XML Entity Expansion Depth in libexpat","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8176.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8176.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-8176","reference_id":"","reference_type":"","scores":[{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61757","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61707","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61737","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61708","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61773","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61793","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61781","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61762","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61805","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.6181","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00623","scoring_system":"epss","scoring_elements":"0.70223","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00623","scoring_system":"epss","scoring_elements":"0.7023","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72672","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72696","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.7265","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72641","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0073","scoring_system":"epss","scoring_elements":"0.72716","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00803","scoring_system":"epss","scoring_elements":"0.74272","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00803","scoring_system":"epss","scoring_elements":"0.74192","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00803","scoring_system":"epss","scoring_elements":"0.74216","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-8176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8176"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2310137","reference_id":"2310137","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T13:13:22Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2310137"},{"reference_url":"https://github.com/libexpat/libexpat/issues/893","reference_id":"893","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T13:13:22Z/"}],"url":"https://github.com/libexpat/libexpat/issues/893"},{"reference_url":"https://github.com/libexpat/libexpat/pull/973","reference_id":"973","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T13:13:22Z/"}],"url":"https://github.com/libexpat/libexpat/pull/973"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:devworkspace:0.33::el9","reference_id":"cpe:/a:redhat:devworkspace:0.33::el9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:devworkspace:0.33::el9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:1.14::el9","reference_id":"cpe:/a:redhat:discovery:1.14::el9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:1.14::el9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:jboss_core_services:1","reference_id":"cpe:/a:redhat:jboss_core_services:1","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:jboss_core_services:1"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4","reference_id":"cpe:/a:redhat:openshift:4","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb","reference_id":"cpe:/a:redhat:rhel_eus:8.8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0","reference_id":"cpe:/o:redhat:enterprise_linux:10.0","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:8::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:9::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos","reference_id":"cpe:/o:redhat:rhel_aus:8.2::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos","reference_id":"cpe:/o:redhat:rhel_aus:8.4::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos","reference_id":"cpe:/o:redhat:rhel_aus:8.6::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.4::baseos","reference_id":"cpe:/o:redhat:rhel_e4s:8.4::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.4::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos","reference_id":"cpe:/o:redhat:rhel_e4s:8.6::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos","reference_id":"cpe:/o:redhat:rhel_e4s:8.8::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.0::baseos","reference_id":"cpe:/o:redhat:rhel_e4s:9.0::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.0::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos","reference_id":"cpe:/o:redhat:rhel_e4s:9.2::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos","reference_id":"cpe:/o:redhat:rhel_eus:8.8::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos","reference_id":"cpe:/o:redhat:rhel_eus:9.4::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos","reference_id":"cpe:/o:redhat:rhel_eus_long_life:8.4::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.4::baseos","reference_id":"cpe:/o:redhat:rhel_tus:8.4::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.4::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos","reference_id":"cpe:/o:redhat:rhel_tus:8.6::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.8::baseos","reference_id":"cpe:/o:redhat:rhel_tus:8.8::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.8::baseos"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2024-8176","reference_id":"CVE-2024-8176","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T13:13:22Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2024-8176"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13681","reference_id":"RHSA-2025:13681","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T13:13:22Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:13681"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22033","reference_id":"RHSA-2025:22033","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T13:13:22Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22033"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22034","reference_id":"RHSA-2025:22034","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T13:13:22Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22034"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22035","reference_id":"RHSA-2025:22035","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T13:13:22Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22035"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22607","reference_id":"RHSA-2025:22607","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T13:13:22Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22785","reference_id":"RHSA-2025:22785","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T13:13:22Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22785"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22842","reference_id":"RHSA-2025:22842","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T13:13:22Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22871","reference_id":"RHSA-2025:22871","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T13:13:22Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22871"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3531","reference_id":"RHSA-2025:3531","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T13:13:22Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:3531"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3734","reference_id":"RHSA-2025:3734","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T13:13:22Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:3734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3913","reference_id":"RHSA-2025:3913","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T13:13:22Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:3913"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4048","reference_id":"RHSA-2025:4048","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T13:13:22Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:4048"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4446","reference_id":"RHSA-2025:4446","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T13:13:22Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:4446"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4447","reference_id":"RHSA-2025:4447","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T13:13:22Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:4447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4448","reference_id":"RHSA-2025:4448","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T13:13:22Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:4448"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4449","reference_id":"RHSA-2025:4449","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T13:13:22Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:4449"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7444","reference_id":"RHSA-2025:7444","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T13:13:22Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7444"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7512","reference_id":"RHSA-2025:7512","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T13:13:22Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8385","reference_id":"RHSA-2025:8385","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T13:13:22Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:8385"},{"reference_url":"https://usn.ubuntu.com/7424-1/","reference_id":"USN-7424-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7424-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583458?format=json","purl":"pkg:deb/debian/expat@2.5.0-1%2Bdeb12u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-292c-g8n3-cyfn"},{"vulnerability":"VCID-77y6-jskt-qucb"},{"vulnerability":"VCID-jqe4-44gw-wbhu"},{"vulnerability":"VCID-nktd-7gph-kkb1"},{"vulnerability":"VCID-qmx9-wkj4-67h3"},{"vulnerability":"VCID-u5pr-wheu-h7c6"},{"vulnerability":"VCID-utz3-ytaf-cbht"},{"vulnerability":"VCID-v41j-xj8s-m7ar"},{"vulnerability":"VCID-yw8s-ezc7-6ub8"},{"vulnerability":"VCID-z7ne-wvmz-ykbz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/expat@2.5.0-1%252Bdeb12u2"}],"aliases":["CVE-2024-8176"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nguf-68jf-ryaz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47564?format=json","vulnerability_id":"VCID-nw3z-nwyg-87e5","summary":"Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45492.json","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45492.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-45492","reference_id":"","reference_type":"","scores":[{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78883","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78862","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78845","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.7887","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78876","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.789","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78874","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78902","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78897","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78927","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78934","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.7895","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78833","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0139","scoring_system":"epss","scoring_elements":"0.8045","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0139","scoring_system":"epss","scoring_elements":"0.80485","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0139","scoring_system":"epss","scoring_elements":"0.80491","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0139","scoring_system":"epss","scoring_elements":"0.80472","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02269","scoring_system":"epss","scoring_elements":"0.84769","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02269","scoring_system":"epss","scoring_elements":"0.84801","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-45492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45492"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1080152","reference_id":"1080152","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1080152"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2308617","reference_id":"2308617","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2308617"},{"reference_url":"https://github.com/libexpat/libexpat/issues/889","reference_id":"889","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-30T13:53:05Z/"}],"url":"https://github.com/libexpat/libexpat/issues/889"},{"reference_url":"https://github.com/libexpat/libexpat/pull/892","reference_id":"892","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-30T13:53:05Z/"}],"url":"https://github.com/libexpat/libexpat/pull/892"},{"reference_url":"https://security.gentoo.org/glsa/202501-09","reference_id":"GLSA-202501-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10135","reference_id":"RHSA-2024:10135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11109","reference_id":"RHSA-2024:11109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6754","reference_id":"RHSA-2024:6754","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6754"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6989","reference_id":"RHSA-2024:6989","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6989"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7213","reference_id":"RHSA-2024:7213","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7213"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7599","reference_id":"RHSA-2024:7599","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7599"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9610","reference_id":"RHSA-2024:9610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9610"},{"reference_url":"https://usn.ubuntu.com/7000-1/","reference_id":"USN-7000-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7000-1/"},{"reference_url":"https://usn.ubuntu.com/7000-2/","reference_id":"USN-7000-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7000-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583458?format=json","purl":"pkg:deb/debian/expat@2.5.0-1%2Bdeb12u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-292c-g8n3-cyfn"},{"vulnerability":"VCID-77y6-jskt-qucb"},{"vulnerability":"VCID-jqe4-44gw-wbhu"},{"vulnerability":"VCID-nktd-7gph-kkb1"},{"vulnerability":"VCID-qmx9-wkj4-67h3"},{"vulnerability":"VCID-u5pr-wheu-h7c6"},{"vulnerability":"VCID-utz3-ytaf-cbht"},{"vulnerability":"VCID-v41j-xj8s-m7ar"},{"vulnerability":"VCID-yw8s-ezc7-6ub8"},{"vulnerability":"VCID-z7ne-wvmz-ykbz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/expat@2.5.0-1%252Bdeb12u2"}],"aliases":["CVE-2024-45492"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nw3z-nwyg-87e5"}],"risk_score":"4.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/expat@2.5.0-1%252Bdeb12u2"}