Lookup for vulnerabilities affecting packages.

GET /api/vulnerabilities/26046?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/vulnerabilities/26046?format=api",
    "vulnerability_id": "VCID-bq3a-psx3-5kh8",
    "summary": "Logrus is vulnerable to DoS when using Entry.Writer()\nA denial-of-service vulnerability exists in github.com/sirupsen/logrus when using Entry.Writer() to log a single-line payload larger than 64KB without newline characters. Due to limitations in the internal bufio.Scanner, the read fails with \"token too long\" and the writer pipe is closed, leaving Writer() unusable and causing application unavailability (DoS). This affects versions < 1.8.3, 1.9.0, and 1.9.2. The issue is fixed in 1.8.3, 1.9.1, and 1.9.3+, where the input is chunked and the writer continues to function even if an error is logged.",
    "aliases": [
        {
            "alias": "CVE-2025-65637"
        },
        {
            "alias": "GHSA-4f99-4q7p-p3gh"
        }
    ],
    "fixed_packages": [
        {
            "url": "http://public2.vulnerablecode.io/api/packages/994571?format=api",
            "purl": "pkg:deb/debian/golang-logrus@1.9.3-1",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-logrus@1.9.3-1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/924212?format=api",
            "purl": "pkg:deb/debian/golang-logrus@1.9.3-1?distro=trixie",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-logrus@1.9.3-1%3Fdistro=trixie"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/69300?format=api",
            "purl": "pkg:golang/github.com/sirupsen/logrus@1.8.3",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:golang/github.com/sirupsen/logrus@1.8.3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/69302?format=api",
            "purl": "pkg:golang/github.com/sirupsen/logrus@1.9.1",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:golang/github.com/sirupsen/logrus@1.9.1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/69304?format=api",
            "purl": "pkg:golang/github.com/sirupsen/logrus@1.9.3",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:golang/github.com/sirupsen/logrus@1.9.3"
        }
    ],
    "affected_packages": [
        {
            "url": "http://public2.vulnerablecode.io/api/packages/994569?format=api",
            "purl": "pkg:deb/debian/golang-logrus@1.7.0-2",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-bq3a-psx3-5kh8"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-logrus@1.7.0-2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/924210?format=api",
            "purl": "pkg:deb/debian/golang-logrus@1.7.0-2?distro=trixie",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-bq3a-psx3-5kh8"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-logrus@1.7.0-2%3Fdistro=trixie"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/994570?format=api",
            "purl": "pkg:deb/debian/golang-logrus@1.9.0-1",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-bq3a-psx3-5kh8"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-logrus@1.9.0-1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/924211?format=api",
            "purl": "pkg:deb/debian/golang-logrus@1.9.0-1?distro=trixie",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-bq3a-psx3-5kh8"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-logrus@1.9.0-1%3Fdistro=trixie"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/69301?format=api",
            "purl": "pkg:golang/github.com/sirupsen/logrus@1.9.0",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-bq3a-psx3-5kh8"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:golang/github.com/sirupsen/logrus@1.9.0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/69303?format=api",
            "purl": "pkg:golang/github.com/sirupsen/logrus@1.9.2",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-bq3a-psx3-5kh8"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:golang/github.com/sirupsen/logrus@1.9.2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1067305?format=api",
            "purl": "pkg:rpm/redhat/buildah@1:1.26.9-1.el9_0?arch=3",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-bq3a-psx3-5kh8"
                },
                {
                    "vulnerability": "VCID-mvsr-c2yh-mbdq"
                },
                {
                    "vulnerability": "VCID-wxsf-mu1t-aqa4"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/buildah@1:1.26.9-1.el9_0%3Farch=3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/87939?format=api",
            "purl": "pkg:rpm/redhat/buildah@1:1.29.5-1.el9_2?arch=2",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-bq3a-psx3-5kh8"
                },
                {
                    "vulnerability": "VCID-mvsr-c2yh-mbdq"
                },
                {
                    "vulnerability": "VCID-sty6-gwh1-hbcy"
                },
                {
                    "vulnerability": "VCID-wxsf-mu1t-aqa4"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/buildah@1:1.29.5-1.el9_2%3Farch=2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1082050?format=api",
            "purl": "pkg:rpm/redhat/golang-github-openstack-k8s-operators-os-diff@0.1.1-18.0.20260225161428.32d52e7?arch=el9ost",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-bq3a-psx3-5kh8"
                },
                {
                    "vulnerability": "VCID-dp1t-v58b-43du"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/golang-github-openstack-k8s-operators-os-diff@0.1.1-18.0.20260225161428.32d52e7%3Farch=el9ost"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/87931?format=api",
            "purl": "pkg:rpm/redhat/microshift@4.16.58-202603160404.p0.gb9661ec.assembly.4.16.58?arch=el9",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-bq3a-psx3-5kh8"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/microshift@4.16.58-202603160404.p0.gb9661ec.assembly.4.16.58%3Farch=el9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/87930?format=api",
            "purl": "pkg:rpm/redhat/microshift@4.17.49-202602161401.p0.g708a69a.assembly.4.17.49?arch=el9",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-bq3a-psx3-5kh8"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/microshift@4.17.49-202602161401.p0.g708a69a.assembly.4.17.49%3Farch=el9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1109303?format=api",
            "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.10-1?arch=el9_0",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-bq3a-psx3-5kh8"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.10-1%3Farch=el9_0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1089112?format=api",
            "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.10-1?arch=el9_2",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-bq3a-psx3-5kh8"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.10-1%3Farch=el9_2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1105436?format=api",
            "purl": "pkg:rpm/redhat/openshift@4.12.0-202604271501.p2.gedc7ba9.assembly.stream?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-bq3a-psx3-5kh8"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openshift@4.12.0-202604271501.p2.gedc7ba9.assembly.stream%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1068172?format=api",
            "purl": "pkg:rpm/redhat/openshift@4.13.0-202603240119.p2.g7aa9360.assembly.stream?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-bq3a-psx3-5kh8"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openshift@4.13.0-202603240119.p2.g7aa9360.assembly.stream%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/87943?format=api",
            "purl": "pkg:rpm/redhat/openshift@4.14.0-202602170118.p2.ga3faddd.assembly.stream?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-bq3a-psx3-5kh8"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openshift@4.14.0-202602170118.p2.ga3faddd.assembly.stream%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/87941?format=api",
            "purl": "pkg:rpm/redhat/openshift@4.15.0-202602130120.p2.g5cb2ef4.assembly.stream?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-bq3a-psx3-5kh8"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openshift@4.15.0-202602130120.p2.g5cb2ef4.assembly.stream%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/87933?format=api",
            "purl": "pkg:rpm/redhat/openshift@4.16.0-202602100409.p2.g41c4e9b.assembly.stream?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-bq3a-psx3-5kh8"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openshift@4.16.0-202602100409.p2.g41c4e9b.assembly.stream%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/87936?format=api",
            "purl": "pkg:rpm/redhat/openshift@4.17.0-202602031716.p2.g4e295fa.assembly.stream?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-bq3a-psx3-5kh8"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openshift@4.17.0-202602031716.p2.g4e295fa.assembly.stream%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/87940?format=api",
            "purl": "pkg:rpm/redhat/osbuild-composer@46.3-5?arch=el8_6",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-bq3a-psx3-5kh8"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/osbuild-composer@46.3-5%3Farch=el8_6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/87938?format=api",
            "purl": "pkg:rpm/redhat/osbuild-composer@46.3-6?arch=el9_0",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-bq3a-psx3-5kh8"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/osbuild-composer@46.3-6%3Farch=el9_0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/87937?format=api",
            "purl": "pkg:rpm/redhat/osbuild-composer@75-6?arch=el8_8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-bq3a-psx3-5kh8"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/osbuild-composer@75-6%3Farch=el8_8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/87934?format=api",
            "purl": "pkg:rpm/redhat/osbuild-composer@76.1-4?arch=el9_2",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-bq3a-psx3-5kh8"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/osbuild-composer@76.1-4%3Farch=el9_2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1067306?format=api",
            "purl": "pkg:rpm/redhat/podman@2:4.2.0-6.el9_0?arch=6",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-bq3a-psx3-5kh8"
                },
                {
                    "vulnerability": "VCID-mvsr-c2yh-mbdq"
                },
                {
                    "vulnerability": "VCID-sty6-gwh1-hbcy"
                },
                {
                    "vulnerability": "VCID-wxsf-mu1t-aqa4"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@2:4.2.0-6.el9_0%3Farch=6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/87942?format=api",
            "purl": "pkg:rpm/redhat/podman@2:4.4.1-22.el9_2?arch=5",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-bq3a-psx3-5kh8"
                },
                {
                    "vulnerability": "VCID-mvsr-c2yh-mbdq"
                },
                {
                    "vulnerability": "VCID-wxsf-mu1t-aqa4"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@2:4.4.1-22.el9_2%3Farch=5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1067304?format=api",
            "purl": "pkg:rpm/redhat/runc@4:1.2.9-1?arch=el9_0",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-bq3a-psx3-5kh8"
                },
                {
                    "vulnerability": "VCID-mt76-ah1b-s3gc"
                },
                {
                    "vulnerability": "VCID-vk37-s4p6-fufm"
                },
                {
                    "vulnerability": "VCID-wxsf-mu1t-aqa4"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/runc@4:1.2.9-1%3Farch=el9_0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/87928?format=api",
            "purl": "pkg:rpm/redhat/runc@4:1.2.9-1?arch=el9_4",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-bq3a-psx3-5kh8"
                },
                {
                    "vulnerability": "VCID-mt76-ah1b-s3gc"
                },
                {
                    "vulnerability": "VCID-vk37-s4p6-fufm"
                },
                {
                    "vulnerability": "VCID-wxsf-mu1t-aqa4"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/runc@4:1.2.9-1%3Farch=el9_4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/87935?format=api",
            "purl": "pkg:rpm/redhat/runc@4:1.2.9-1.el9_2?arch=1",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-bq3a-psx3-5kh8"
                },
                {
                    "vulnerability": "VCID-mt76-ah1b-s3gc"
                },
                {
                    "vulnerability": "VCID-vk37-s4p6-fufm"
                },
                {
                    "vulnerability": "VCID-wxsf-mu1t-aqa4"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/runc@4:1.2.9-1.el9_2%3Farch=1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1109302?format=api",
            "purl": "pkg:rpm/redhat/skopeo@2:1.8.0-4.1.el9_0?arch=3",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-bq3a-psx3-5kh8"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/skopeo@2:1.8.0-4.1.el9_0%3Farch=3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1103622?format=api",
            "purl": "pkg:rpm/redhat/skopeo@2:1.11.4-0.1.el9_2?arch=5",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-bq3a-psx3-5kh8"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/skopeo@2:1.11.4-0.1.el9_2%3Farch=5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/87932?format=api",
            "purl": "pkg:rpm/redhat/toolbox@0.0.99.4.1-1?arch=el9_2",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-bq3a-psx3-5kh8"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/toolbox@0.0.99.4.1-1%3Farch=el9_2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/87929?format=api",
            "purl": "pkg:rpm/redhat/toolbox@0.0.99.5.1-2?arch=el9_4",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-bq3a-psx3-5kh8"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/toolbox@0.0.99.5.1-2%3Farch=el9_4"
        }
    ],
    "references": [
        {
            "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-65637.json",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                }
            ],
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-65637.json"
        },
        {
            "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-65637",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "0.00035",
                    "scoring_system": "epss",
                    "scoring_elements": "0.10226",
                    "published_at": "2026-04-04T12:55:00Z"
                },
                {
                    "value": "0.00035",
                    "scoring_system": "epss",
                    "scoring_elements": "0.1016",
                    "published_at": "2026-04-02T12:55:00Z"
                },
                {
                    "value": "0.00039",
                    "scoring_system": "epss",
                    "scoring_elements": "0.11567",
                    "published_at": "2026-05-09T12:55:00Z"
                },
                {
                    "value": "0.00039",
                    "scoring_system": "epss",
                    "scoring_elements": "0.11578",
                    "published_at": "2026-05-12T12:55:00Z"
                },
                {
                    "value": "0.00039",
                    "scoring_system": "epss",
                    "scoring_elements": "0.11537",
                    "published_at": "2026-05-11T12:55:00Z"
                },
                {
                    "value": "0.00039",
                    "scoring_system": "epss",
                    "scoring_elements": "0.11381",
                    "published_at": "2026-05-05T12:55:00Z"
                },
                {
                    "value": "0.00039",
                    "scoring_system": "epss",
                    "scoring_elements": "0.11516",
                    "published_at": "2026-05-07T12:55:00Z"
                },
                {
                    "value": "0.0004",
                    "scoring_system": "epss",
                    "scoring_elements": "0.12265",
                    "published_at": "2026-04-26T12:55:00Z"
                },
                {
                    "value": "0.0004",
                    "scoring_system": "epss",
                    "scoring_elements": "0.12157",
                    "published_at": "2026-04-29T12:55:00Z"
                },
                {
                    "value": "0.0004",
                    "scoring_system": "epss",
                    "scoring_elements": "0.12299",
                    "published_at": "2026-04-24T12:55:00Z"
                },
                {
                    "value": "0.0004",
                    "scoring_system": "epss",
                    "scoring_elements": "0.12317",
                    "published_at": "2026-04-21T12:55:00Z"
                },
                {
                    "value": "0.0004",
                    "scoring_system": "epss",
                    "scoring_elements": "0.12215",
                    "published_at": "2026-04-18T12:55:00Z"
                },
                {
                    "value": "0.0004",
                    "scoring_system": "epss",
                    "scoring_elements": "0.12212",
                    "published_at": "2026-04-16T12:55:00Z"
                },
                {
                    "value": "0.0004",
                    "scoring_system": "epss",
                    "scoring_elements": "0.12313",
                    "published_at": "2026-04-13T12:55:00Z"
                },
                {
                    "value": "0.0004",
                    "scoring_system": "epss",
                    "scoring_elements": "0.12351",
                    "published_at": "2026-04-12T12:55:00Z"
                },
                {
                    "value": "0.0004",
                    "scoring_system": "epss",
                    "scoring_elements": "0.12389",
                    "published_at": "2026-04-11T12:55:00Z"
                },
                {
                    "value": "0.0004",
                    "scoring_system": "epss",
                    "scoring_elements": "0.12381",
                    "published_at": "2026-04-09T12:55:00Z"
                },
                {
                    "value": "0.0004",
                    "scoring_system": "epss",
                    "scoring_elements": "0.12331",
                    "published_at": "2026-04-08T12:55:00Z"
                },
                {
                    "value": "0.0004",
                    "scoring_system": "epss",
                    "scoring_elements": "0.12252",
                    "published_at": "2026-04-07T12:55:00Z"
                },
                {
                    "value": "0.00055",
                    "scoring_system": "epss",
                    "scoring_elements": "0.17108",
                    "published_at": "2026-05-14T12:55:00Z"
                }
            ],
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-65637"
        },
        {
            "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65637",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65637"
        },
        {
            "reference_url": "https://github.com/mjuanxd/logrus-dos-poc",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "8.7",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-05T21:52:30Z/"
                }
            ],
            "url": "https://github.com/mjuanxd/logrus-dos-poc"
        },
        {
            "reference_url": "https://github.com/mjuanxd/logrus-dos-poc/blob/main/README.md",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "8.7",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-05T21:52:30Z/"
                }
            ],
            "url": "https://github.com/mjuanxd/logrus-dos-poc/blob/main/README.md"
        },
        {
            "reference_url": "https://github.com/sirupsen/logrus",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.7",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://github.com/sirupsen/logrus"
        },
        {
            "reference_url": "https://github.com/sirupsen/logrus/commit/6acd903758687c4a3db3c11701e6c414fcf1c1f7",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.7",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://github.com/sirupsen/logrus/commit/6acd903758687c4a3db3c11701e6c414fcf1c1f7"
        },
        {
            "reference_url": "https://github.com/sirupsen/logrus/issues/1370",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "8.7",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-05T21:52:30Z/"
                }
            ],
            "url": "https://github.com/sirupsen/logrus/issues/1370"
        },
        {
            "reference_url": "https://github.com/sirupsen/logrus/pull/1376",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "8.7",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-05T21:52:30Z/"
                }
            ],
            "url": "https://github.com/sirupsen/logrus/pull/1376"
        },
        {
            "reference_url": "https://github.com/sirupsen/logrus/releases/tag/v1.8.3",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "8.7",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-05T21:52:30Z/"
                }
            ],
            "url": "https://github.com/sirupsen/logrus/releases/tag/v1.8.3"
        },
        {
            "reference_url": "https://github.com/sirupsen/logrus/releases/tag/v1.9.1",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "8.7",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-05T21:52:30Z/"
                }
            ],
            "url": "https://github.com/sirupsen/logrus/releases/tag/v1.9.1"
        },
        {
            "reference_url": "https://github.com/sirupsen/logrus/releases/tag/v1.9.3",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "8.7",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-05T21:52:30Z/"
                }
            ],
            "url": "https://github.com/sirupsen/logrus/releases/tag/v1.9.3"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-65637",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.7",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-65637"
        },
        {
            "reference_url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMSIRUPSENLOGRUS-5564391",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "8.7",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-05T21:52:30Z/"
                }
            ],
            "url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMSIRUPSENLOGRUS-5564391"
        },
        {
            "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418900",
            "reference_id": "2418900",
            "reference_type": "",
            "scores": [],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418900"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:0327",
            "reference_id": "RHSA-2026:0327",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:0327"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:0338",
            "reference_id": "RHSA-2026:0338",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:0338"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:0425",
            "reference_id": "RHSA-2026:0425",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:0425"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:0715",
            "reference_id": "RHSA-2026:0715",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:0715"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:1004",
            "reference_id": "RHSA-2026:1004",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:1004"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:1062",
            "reference_id": "RHSA-2026:1062",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:1062"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:10703",
            "reference_id": "RHSA-2026:10703",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:10703"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:11804",
            "reference_id": "RHSA-2026:11804",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:11804"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:12273",
            "reference_id": "RHSA-2026:12273",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:12273"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:12282",
            "reference_id": "RHSA-2026:12282",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:12282"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:13971",
            "reference_id": "RHSA-2026:13971",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:13971"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:1549",
            "reference_id": "RHSA-2026:1549",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:1549"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:1552",
            "reference_id": "RHSA-2026:1552",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:1552"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:1555",
            "reference_id": "RHSA-2026:1555",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:1555"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:1556",
            "reference_id": "RHSA-2026:1556",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:1556"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:1577",
            "reference_id": "RHSA-2026:1577",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:1577"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:15940",
            "reference_id": "RHSA-2026:15940",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:15940"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:15941",
            "reference_id": "RHSA-2026:15941",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:15941"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:2065",
            "reference_id": "RHSA-2026:2065",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:2065"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:2066",
            "reference_id": "RHSA-2026:2066",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:2066"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:2078",
            "reference_id": "RHSA-2026:2078",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:2078"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:2079",
            "reference_id": "RHSA-2026:2079",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:2079"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:2119",
            "reference_id": "RHSA-2026:2119",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:2119"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:2120",
            "reference_id": "RHSA-2026:2120",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:2120"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:2129",
            "reference_id": "RHSA-2026:2129",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:2129"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:2130",
            "reference_id": "RHSA-2026:2130",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:2130"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:2351",
            "reference_id": "RHSA-2026:2351",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:2351"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:2519",
            "reference_id": "RHSA-2026:2519",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:2519"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:2520",
            "reference_id": "RHSA-2026:2520",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:2520"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:2651",
            "reference_id": "RHSA-2026:2651",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:2651"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:2652",
            "reference_id": "RHSA-2026:2652",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:2652"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:2658",
            "reference_id": "RHSA-2026:2658",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:2658"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:2661",
            "reference_id": "RHSA-2026:2661",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:2661"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:2662",
            "reference_id": "RHSA-2026:2662",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:2662"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:2670",
            "reference_id": "RHSA-2026:2670",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:2670"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:2672",
            "reference_id": "RHSA-2026:2672",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:2672"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:2673",
            "reference_id": "RHSA-2026:2673",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:2673"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:2685",
            "reference_id": "RHSA-2026:2685",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:2685"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:2686",
            "reference_id": "RHSA-2026:2686",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:2686"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:2687",
            "reference_id": "RHSA-2026:2687",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:2687"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:2688",
            "reference_id": "RHSA-2026:2688",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:2688"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:2746",
            "reference_id": "RHSA-2026:2746",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:2746"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:2973",
            "reference_id": "RHSA-2026:2973",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:2973"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:2977",
            "reference_id": "RHSA-2026:2977",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:2977"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:2978",
            "reference_id": "RHSA-2026:2978",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:2978"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:2990",
            "reference_id": "RHSA-2026:2990",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:2990"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:2991",
            "reference_id": "RHSA-2026:2991",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:2991"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:3099",
            "reference_id": "RHSA-2026:3099",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:3099"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:3418",
            "reference_id": "RHSA-2026:3418",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:3418"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:3419",
            "reference_id": "RHSA-2026:3419",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:3419"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:3422",
            "reference_id": "RHSA-2026:3422",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:3422"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:3423",
            "reference_id": "RHSA-2026:3423",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:3423"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:3428",
            "reference_id": "RHSA-2026:3428",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:3428"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:3855",
            "reference_id": "RHSA-2026:3855",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:3855"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:3870",
            "reference_id": "RHSA-2026:3870",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:3870"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:3871",
            "reference_id": "RHSA-2026:3871",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:3871"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:4418",
            "reference_id": "RHSA-2026:4418",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:4418"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:4423",
            "reference_id": "RHSA-2026:4423",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:4423"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:4424",
            "reference_id": "RHSA-2026:4424",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:4424"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:4434",
            "reference_id": "RHSA-2026:4434",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:4434"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:4482",
            "reference_id": "RHSA-2026:4482",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:4482"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:4483",
            "reference_id": "RHSA-2026:4483",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:4483"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:4510",
            "reference_id": "RHSA-2026:4510",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:4510"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:4531",
            "reference_id": "RHSA-2026:4531",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:4531"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:4532",
            "reference_id": "RHSA-2026:4532",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:4532"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:4533",
            "reference_id": "RHSA-2026:4533",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:4533"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:4580",
            "reference_id": "RHSA-2026:4580",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:4580"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:4693",
            "reference_id": "RHSA-2026:4693",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:4693"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:5107",
            "reference_id": "RHSA-2026:5107",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:5107"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:5108",
            "reference_id": "RHSA-2026:5108",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:5108"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:5133",
            "reference_id": "RHSA-2026:5133",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:5133"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:5907",
            "reference_id": "RHSA-2026:5907",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:5907"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:6191",
            "reference_id": "RHSA-2026:6191",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:6191"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:6493",
            "reference_id": "RHSA-2026:6493",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:6493"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:6911",
            "reference_id": "RHSA-2026:6911",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:6911"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:7238",
            "reference_id": "RHSA-2026:7238",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:7238"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:7252",
            "reference_id": "RHSA-2026:7252",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:7252"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:7253",
            "reference_id": "RHSA-2026:7253",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:7253"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:7885",
            "reference_id": "RHSA-2026:7885",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:7885"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:8325",
            "reference_id": "RHSA-2026:8325",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:8325"
        }
    ],
    "weaknesses": [
        {
            "cwe_id": 400,
            "name": "Uncontrolled Resource Consumption",
            "description": "The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources."
        }
    ],
    "exploits": [],
    "severity_range_score": "7.0 - 8.9",
    "exploitability": "0.5",
    "weighted_severity": "8.0",
    "risk_score": 4.0,
    "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bq3a-psx3-5kh8"
}