Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/89650?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/89650?format=api", "purl": "pkg:rpm/redhat/acm-must-gather@container-v2.13?arch=4-13", "type": "rpm", "namespace": "redhat", "name": "acm-must-gather", "version": "container-v2.13", "qualifiers": { "arch": "4-13" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/29826?format=api", "vulnerability_id": "VCID-4pq8-1dxx-37gj", "summary": "form-data uses unsafe random function in form-data for choosing boundary\n### Summary\n\nform-data uses `Math.random()` to select a boundary value for multipart form-encoded data. This can lead to a security issue if an attacker:\n1. can observe other values produced by Math.random in the target application, and\n2. can control one field of a request made using form-data\n\nBecause the values of Math.random() are pseudo-random and predictable (see: https://blog.securityevaluators.com/hacking-the-javascript-lottery-80cc437e3b7f) an attacker who can observe a few sequential values can determine the state of the PRNG and predict future values, includes those used to generate form-data's boundary value. The allows the attacker to craft a value that contains a boundary value, allowing them to inject additional parameters into the request.\n\nThis is largely the same vulnerability as was [recently found in `undici`](https://hackerone.com/reports/2913312) by [`parrot409`](https://hackerone.com/parrot409?type=user) -- I'm not affiliated with that researcher but want to give credit where credit is due! My PoC is largely based on their work.\n\n### Details\n\nThe culprit is this line here: https://github.com/form-data/form-data/blob/426ba9ac440f95d1998dac9a5cd8d738043b048f/lib/form_data.js#L347\n\nAn attacker who is able to predict the output of Math.random() can predict this boundary value, and craft a payload that contains the boundary value, followed by another, fully attacker-controlled field. This is roughly equivalent to any sort of improper escaping vulnerability, with the caveat that the attacker must find a way to observe other Math.random() values generated by the application to solve for the state of the PRNG. However, Math.random() is used in all sorts of places that might be visible to an attacker (including by form-data itself, if the attacker can arrange for the vulnerable application to make a request to an attacker-controlled server using form-data, such as a user-controlled webhook -- the attacker could observe the boundary values from those requests to observe the Math.random() outputs). A common example would be a `x-request-id` header added by the server. These sorts of headers are often used for distributed tracing, to correlate errors across the frontend and backend. `Math.random()` is a fine place to get these sorts of IDs (in fact, [opentelemetry uses Math.random for this purpose](https://github.com/open-telemetry/opentelemetry-js/blob/2053f0d3a44631ade77ea04f656056a2c8a2ae76/packages/opentelemetry-sdk-trace-base/src/platform/node/RandomIdGenerator.ts#L22))\n\n### PoC\n\nPoC here: https://github.com/benweissmann/CVE-2025-7783-poc\n\nInstructions are in that repo. It's based on the PoC from https://hackerone.com/reports/2913312 but simplified somewhat; the vulnerable application has a more direct side-channel from which to observe Math.random() values (a separate endpoint that happens to include a randomly-generated request ID). \n\n### Impact\n\nFor an application to be vulnerable, it must:\n- Use `form-data` to send data including user-controlled data to some other system. The attacker must be able to do something malicious by adding extra parameters (that were not intended to be user-controlled) to this request. Depending on the target system's handling of repeated parameters, the attacker might be able to overwrite values in addition to appending values (some multipart form handlers deal with repeats by overwriting values instead of representing them as an array)\n- Reveal values of Math.random(). It's easiest if the attacker can observe multiple sequential values, but more complex math could recover the PRNG state to some degree of confidence with non-sequential values. \n\nIf an application is vulnerable, this allows an attacker to make arbitrary requests to internal systems.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-7783.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-7783.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-7783", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22976", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31742", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31712", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31661", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.3184", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00313", "scoring_system": "epss", "scoring_elements": "0.54458", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00313", "scoring_system": "epss", "scoring_elements": "0.54442", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61585", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.6158", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61595", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.6159", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61569", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61548", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-7783" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7783", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7783" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/benweissmann/CVE-2025-7783-poc", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.4", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/benweissmann/CVE-2025-7783-poc" }, { "reference_url": "https://github.com/form-data/form-data", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.4", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/form-data/form-data" }, { "reference_url": "https://github.com/form-data/form-data/commit/3d1723080e6577a66f17f163ecd345a21d8d0fd0", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.4", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-07-22T14:54:27Z/" } ], "url": "https://github.com/form-data/form-data/commit/3d1723080e6577a66f17f163ecd345a21d8d0fd0" }, { "reference_url": "https://github.com/form-data/form-data/security/advisories/GHSA-fjxv-7rqg-78g4", "reference_id": "", "reference_type": "", "scores": [ { "value": "CRITICAL", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "9.4", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-07-22T14:54:27Z/" } ], "url": "https://github.com/form-data/form-data/security/advisories/GHSA-fjxv-7rqg-78g4" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2025/07/msg00023.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.4", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.debian.org/debian-lts-announce/2025/07/msg00023.html" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7783", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.4", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7783" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109551", "reference_id": "1109551", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109551" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2381959", "reference_id": "2381959", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2381959" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14886", "reference_id": "RHSA-2025:14886", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14886" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14919", "reference_id": "RHSA-2025:14919", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14919" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15771", "reference_id": "RHSA-2025:15771", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15771" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16101", "reference_id": "RHSA-2025:16101", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16101" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16113", "reference_id": "RHSA-2025:16113", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16113" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16918", "reference_id": "RHSA-2025:16918", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16918" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17501", "reference_id": "RHSA-2025:17501", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17501" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:18278", "reference_id": "RHSA-2025:18278", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:18278" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:18744", "reference_id": "RHSA-2025:18744", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:18744" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:20047", "reference_id": "RHSA-2025:20047", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:20047" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21704", "reference_id": "RHSA-2025:21704", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21704" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2737", "reference_id": "RHSA-2026:2737", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2737" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2800", "reference_id": "RHSA-2026:2800", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2800" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3406", "reference_id": "RHSA-2026:3406", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3406" }, { "reference_url": "https://usn.ubuntu.com/7976-1/", "reference_id": "USN-7976-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7976-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2025-7783", "GHSA-fjxv-7rqg-78g4" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4pq8-1dxx-37gj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/29834?format=api", "vulnerability_id": "VCID-fr74-wcxv-quam", "summary": "Helm vulnerable to Code Injection through malicious chart.yaml content\nA Helm contributor discovered that a specially crafted `Chart.yaml` file along with a specially linked `Chart.lock` file can lead to local code execution when dependencies are updated.\n\n### Impact\n\nFields in a `Chart.yaml` file, that are carried over to a `Chart.lock` file when dependencies are updated and this file is written, can be crafted in a way that can cause execution if that same content were in a file that is executed (e.g., a `bash.rc` file or shell script). If the `Chart.lock` file is symlinked to one of these files updating dependencies will write the lock file content to the symlinked file. This can lead to unwanted execution. Helm warns of the symlinked file but did not stop execution due to symlinking.\n\nThis affects when dependencies are updated. When using the `helm` command this happens when `helm dependency update` is run. `helm dependency build` can write a lock file when one does not exist but this vector requires one to already exist. This affects the Helm SDK when the downloader `Manager` performs an update.\n\n### Patches\n\nThis issue has been resolved in Helm v3.18.4\n\n### Workarounds\n\nEnsure the `Chart.lock` file in a chart is not a symlink prior to updating dependencies.\n\n### For more information\n\nHelm's security policy is spelled out in detail in our [SECURITY](https://github.com/helm/community/blob/master/SECURITY.md) document.\n\n### Credits\n\nDisclosed by Jakub Ciolek at AlphaSense.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53547.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53547.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-53547", "reference_id": "", "reference_type": "", "scores": [ { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00728", "published_at": "2026-04-02T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00903", "published_at": "2026-04-26T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00853", "published_at": "2026-04-04T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00856", "published_at": "2026-04-07T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00859", "published_at": "2026-04-08T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00857", "published_at": "2026-04-09T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00847", "published_at": "2026-04-18T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00841", "published_at": "2026-04-16T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00842", "published_at": "2026-04-13T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00894", "published_at": "2026-04-21T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00899", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-53547" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/helm/helm", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/helm/helm" }, { "reference_url": "https://github.com/helm/helm/commit/4b8e61093d8f579f1165cdc6bd4b43fa5455f571", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:26:40Z/" } ], "url": "https://github.com/helm/helm/commit/4b8e61093d8f579f1165cdc6bd4b43fa5455f571" }, { "reference_url": "https://github.com/helm/helm/security/advisories/GHSA-557j-xg8c-q2mm", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:26:40Z/" } ], "url": "https://github.com/helm/helm/security/advisories/GHSA-557j-xg8c-q2mm" }, { "reference_url": "https://news.ycombinator.com/item?id=44506696", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://news.ycombinator.com/item?id=44506696" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53547", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53547" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2378905", "reference_id": "2378905", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2378905" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14821", "reference_id": "RHSA-2025:14821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14821" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15345", "reference_id": "RHSA-2025:15345", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15345" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15681", "reference_id": "RHSA-2025:15681", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15681" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16113", "reference_id": "RHSA-2025:16113", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16113" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16161", "reference_id": "RHSA-2025:16161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16166", "reference_id": "RHSA-2025:16166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16526", "reference_id": "RHSA-2025:16526", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16526" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16527", "reference_id": "RHSA-2025:16527", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16527" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16529", "reference_id": "RHSA-2025:16529", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16529" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16530", "reference_id": "RHSA-2025:16530", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16530" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16535", "reference_id": "RHSA-2025:16535", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16535" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17672", "reference_id": "RHSA-2025:17672", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17672" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:18242", "reference_id": "RHSA-2025:18242", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:18242" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:18278", "reference_id": "RHSA-2025:18278", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:18278" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:18744", "reference_id": "RHSA-2025:18744", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:18744" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:9562", "reference_id": "RHSA-2025:9562", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:9562" } ], "fixed_packages": [], "aliases": [ "CVE-2025-53547", "GHSA-557j-xg8c-q2mm" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fr74-wcxv-quam" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71913?format=api", "vulnerability_id": "VCID-tnrm-85fu-ufhb", "summary": "crypto/internal/nistec: golang: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-22866.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-22866.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-22866", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05855", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.06106", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05957", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05937", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05928", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.0592", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05885", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05897", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.06048", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.06069", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.061", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05888", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.0588", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05918", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-22866" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22866", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22866" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344219", "reference_id": "2344219", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344219" }, { "reference_url": "https://go.dev/cl/643735", "reference_id": "643735", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T20:40:17Z/" } ], "url": "https://go.dev/cl/643735" }, { "reference_url": "https://go.dev/issue/71383", "reference_id": "71383", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T20:40:17Z/" } ], "url": "https://go.dev/issue/71383" }, { "reference_url": "https://pkg.go.dev/vuln/GO-2025-3447", "reference_id": "GO-2025-3447", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T20:40:17Z/" } ], "url": "https://pkg.go.dev/vuln/GO-2025-3447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16113", "reference_id": "RHSA-2025:16113", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16113" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:2789", "reference_id": "RHSA-2025:2789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:2789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3773", "reference_id": "RHSA-2025:3773", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3773" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3922", "reference_id": "RHSA-2025:3922", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3922" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4666", "reference_id": "RHSA-2025:4666", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4666" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4667", "reference_id": "RHSA-2025:4667", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4667" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4810", "reference_id": "RHSA-2025:4810", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4810" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7326", "reference_id": "RHSA-2025:7326", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7326" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7466", "reference_id": "RHSA-2025:7466", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7466" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8670", "reference_id": "RHSA-2025:8670", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8670" }, { "reference_url": "https://usn.ubuntu.com/7574-1/", "reference_id": "USN-7574-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7574-1/" }, { "reference_url": "https://groups.google.com/g/golang-announce/c/xU1ZCHUZw3k", "reference_id": "xU1ZCHUZw3k", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T20:40:17Z/" } ], "url": "https://groups.google.com/g/golang-announce/c/xU1ZCHUZw3k" } ], "fixed_packages": [], "aliases": [ "CVE-2025-22866" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tnrm-85fu-ufhb" } ], "fixing_vulnerabilities": [], "risk_score": "4.5", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/acm-must-gather@container-v2.13%3Farch=4-13" }