Lookup for vulnerabilities affecting packages.

GET /api/vulnerabilities/27215?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/vulnerabilities/27215?format=api",
    "vulnerability_id": "VCID-rbtx-222u-zudf",
    "summary": "DoS in go-jose Parsing\n### Impact\nWhen parsing compact JWS or JWE input, go-jose could use excessive memory. The code used strings.Split(token, \".\") to split JWT tokens, which is vulnerable to excessive memory consumption when processing maliciously crafted tokens with a large number of '.' characters.  An attacker could exploit this by sending numerous malformed tokens, leading to memory exhaustion and a Denial of Service.\n\n### Patches\nVersion 4.0.5 fixes this issue\n\n### Workarounds\nApplications could pre-validate payloads passed to go-jose do not contain an excessive number of '.' characters.\n\n### References\nThis is the same sort of issue as in the golang.org/x/oauth2/jws package as CVE-2025-22868 and Go issue https://go.dev/issue/71490.",
    "aliases": [
        {
            "alias": "CVE-2025-27144"
        },
        {
            "alias": "GHSA-c6gw-w398-hv78"
        }
    ],
    "fixed_packages": [
        {
            "url": "http://public2.vulnerablecode.io/api/packages/923953?format=api",
            "purl": "pkg:deb/debian/golang-github-go-jose-go-jose@4.0.5-1?distro=trixie",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-r5yf-qtqg-93cs"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-github-go-jose-go-jose@4.0.5-1%3Fdistro=trixie"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1041954?format=api",
            "purl": "pkg:deb/debian/golang-github-go-jose-go-jose@4.1.4-1?distro=trixie",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-github-go-jose-go-jose@4.1.4-1%3Fdistro=trixie"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/69564?format=api",
            "purl": "pkg:golang/github.com/go-jose/go-jose/v3@3.0.4",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:golang/github.com/go-jose/go-jose/v3@3.0.4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/69563?format=api",
            "purl": "pkg:golang/github.com/go-jose/go-jose/v4@4.0.5",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:golang/github.com/go-jose/go-jose/v4@4.0.5"
        }
    ],
    "affected_packages": [
        {
            "url": "http://public2.vulnerablecode.io/api/packages/91240?format=api",
            "purl": "pkg:rpm/redhat/buildah@2:1.39.4-1?arch=el10_0",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-rbtx-222u-zudf"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/buildah@2:1.39.4-1%3Farch=el10_0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/91242?format=api",
            "purl": "pkg:rpm/redhat/buildah@2:1.39.4-1?arch=el9_6",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-rbtx-222u-zudf"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/buildah@2:1.39.4-1%3Farch=el9_6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/91025?format=api",
            "purl": "pkg:rpm/redhat/opentelemetry-collector@0.107.0-7?arch=el9_4",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-chwd-qyet-4qbz"
                },
                {
                    "vulnerability": "VCID-fk74-ghxp-w3g9"
                },
                {
                    "vulnerability": "VCID-nrrp-y243-bfa1"
                },
                {
                    "vulnerability": "VCID-rbtx-222u-zudf"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/opentelemetry-collector@0.107.0-7%3Farch=el9_4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/91024?format=api",
            "purl": "pkg:rpm/redhat/opentelemetry-collector@0.107.0-8?arch=el9_5",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-chwd-qyet-4qbz"
                },
                {
                    "vulnerability": "VCID-fk74-ghxp-w3g9"
                },
                {
                    "vulnerability": "VCID-nrrp-y243-bfa1"
                },
                {
                    "vulnerability": "VCID-rbtx-222u-zudf"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/opentelemetry-collector@0.107.0-8%3Farch=el9_5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/90978?format=api",
            "purl": "pkg:rpm/redhat/opentelemetry-collector@0.107.0-8?arch=el9_6",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-chwd-qyet-4qbz"
                },
                {
                    "vulnerability": "VCID-nrrp-y243-bfa1"
                },
                {
                    "vulnerability": "VCID-rbtx-222u-zudf"
                },
                {
                    "vulnerability": "VCID-s5gr-zsbz-xkbe"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/opentelemetry-collector@0.107.0-8%3Farch=el9_6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/90984?format=api",
            "purl": "pkg:rpm/redhat/opentelemetry-collector@0.107.0-9?arch=el10_0",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-chwd-qyet-4qbz"
                },
                {
                    "vulnerability": "VCID-nrrp-y243-bfa1"
                },
                {
                    "vulnerability": "VCID-rbtx-222u-zudf"
                },
                {
                    "vulnerability": "VCID-s5gr-zsbz-xkbe"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/opentelemetry-collector@0.107.0-9%3Farch=el10_0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/91241?format=api",
            "purl": "pkg:rpm/redhat/osbuild-composer@132.2-3?arch=el9_6",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-rbtx-222u-zudf"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/osbuild-composer@132.2-3%3Farch=el9_6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/91245?format=api",
            "purl": "pkg:rpm/redhat/osbuild-composer@134.1-3?arch=el10_0",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-rbtx-222u-zudf"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/osbuild-composer@134.1-3%3Farch=el10_0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/91248?format=api",
            "purl": "pkg:rpm/redhat/podman@5:5.2.2-4.rhaos4.17?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-rbtx-222u-zudf"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@5:5.2.2-4.rhaos4.17%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/91243?format=api",
            "purl": "pkg:rpm/redhat/podman@5:5.2.2-6.rhaos4.18?arch=el9",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-rbtx-222u-zudf"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@5:5.2.2-6.rhaos4.18%3Farch=el9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/91196?format=api",
            "purl": "pkg:rpm/redhat/podman@5:5.4.0-9?arch=el9_6",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-cmts-6kz4-zkh8"
                },
                {
                    "vulnerability": "VCID-rbtx-222u-zudf"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@5:5.4.0-9%3Farch=el9_6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/91194?format=api",
            "purl": "pkg:rpm/redhat/podman@6:5.4.0-9?arch=el10_0",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-cmts-6kz4-zkh8"
                },
                {
                    "vulnerability": "VCID-rbtx-222u-zudf"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@6:5.4.0-9%3Farch=el10_0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/91244?format=api",
            "purl": "pkg:rpm/redhat/skopeo@2:1.16.1-1.rhaos4.17?arch=el8",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-rbtx-222u-zudf"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/skopeo@2:1.16.1-1.rhaos4.17%3Farch=el8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/91247?format=api",
            "purl": "pkg:rpm/redhat/skopeo@2:1.16.1-1.rhaos4.18?arch=el9",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-rbtx-222u-zudf"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/skopeo@2:1.16.1-1.rhaos4.18%3Farch=el9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/91246?format=api",
            "purl": "pkg:rpm/redhat/skopeo@2:1.18.1-1?arch=el10_0",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-rbtx-222u-zudf"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/skopeo@2:1.18.1-1%3Farch=el10_0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/91249?format=api",
            "purl": "pkg:rpm/redhat/skopeo@2:1.18.1-1?arch=el9_6",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-rbtx-222u-zudf"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/skopeo@2:1.18.1-1%3Farch=el9_6"
        }
    ],
    "references": [
        {
            "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27144.json",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                }
            ],
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27144.json"
        },
        {
            "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-27144",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "0.00078",
                    "scoring_system": "epss",
                    "scoring_elements": "0.23266",
                    "published_at": "2026-04-02T12:55:00Z"
                },
                {
                    "value": "0.00101",
                    "scoring_system": "epss",
                    "scoring_elements": "0.27366",
                    "published_at": "2026-05-09T12:55:00Z"
                },
                {
                    "value": "0.00101",
                    "scoring_system": "epss",
                    "scoring_elements": "0.27344",
                    "published_at": "2026-05-07T12:55:00Z"
                },
                {
                    "value": "0.00101",
                    "scoring_system": "epss",
                    "scoring_elements": "0.27283",
                    "published_at": "2026-05-05T12:55:00Z"
                },
                {
                    "value": "0.00101",
                    "scoring_system": "epss",
                    "scoring_elements": "0.27456",
                    "published_at": "2026-04-29T12:55:00Z"
                },
                {
                    "value": "0.00101",
                    "scoring_system": "epss",
                    "scoring_elements": "0.27281",
                    "published_at": "2026-05-11T12:55:00Z"
                },
                {
                    "value": "0.00109",
                    "scoring_system": "epss",
                    "scoring_elements": "0.29369",
                    "published_at": "2026-04-04T12:55:00Z"
                },
                {
                    "value": "0.00112",
                    "scoring_system": "epss",
                    "scoring_elements": "0.29632",
                    "published_at": "2026-04-12T12:55:00Z"
                },
                {
                    "value": "0.00112",
                    "scoring_system": "epss",
                    "scoring_elements": "0.29676",
                    "published_at": "2026-04-11T12:55:00Z"
                },
                {
                    "value": "0.00112",
                    "scoring_system": "epss",
                    "scoring_elements": "0.29673",
                    "published_at": "2026-04-09T12:55:00Z"
                },
                {
                    "value": "0.00112",
                    "scoring_system": "epss",
                    "scoring_elements": "0.29636",
                    "published_at": "2026-04-08T12:55:00Z"
                },
                {
                    "value": "0.00112",
                    "scoring_system": "epss",
                    "scoring_elements": "0.29574",
                    "published_at": "2026-04-18T12:55:00Z"
                },
                {
                    "value": "0.00112",
                    "scoring_system": "epss",
                    "scoring_elements": "0.29188",
                    "published_at": "2026-05-14T12:55:00Z"
                },
                {
                    "value": "0.00112",
                    "scoring_system": "epss",
                    "scoring_elements": "0.29107",
                    "published_at": "2026-05-12T12:55:00Z"
                },
                {
                    "value": "0.00112",
                    "scoring_system": "epss",
                    "scoring_elements": "0.29299",
                    "published_at": "2026-04-26T12:55:00Z"
                },
                {
                    "value": "0.00112",
                    "scoring_system": "epss",
                    "scoring_elements": "0.29413",
                    "published_at": "2026-04-24T12:55:00Z"
                },
                {
                    "value": "0.00112",
                    "scoring_system": "epss",
                    "scoring_elements": "0.2953",
                    "published_at": "2026-04-21T12:55:00Z"
                },
                {
                    "value": "0.00112",
                    "scoring_system": "epss",
                    "scoring_elements": "0.296",
                    "published_at": "2026-04-16T12:55:00Z"
                },
                {
                    "value": "0.00112",
                    "scoring_system": "epss",
                    "scoring_elements": "0.29581",
                    "published_at": "2026-04-13T12:55:00Z"
                }
            ],
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-27144"
        },
        {
            "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                }
            ],
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
        },
        {
            "reference_url": "https://github.com/go-jose/go-jose",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "6.9",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://github.com/go-jose/go-jose"
        },
        {
            "reference_url": "https://github.com/go-jose/go-jose/commit/99b346cec4e86d102284642c5dcbe9bb0cacfc22",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "6.6",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U"
                },
                {
                    "value": "6.9",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-25T14:26:42Z/"
                }
            ],
            "url": "https://github.com/go-jose/go-jose/commit/99b346cec4e86d102284642c5dcbe9bb0cacfc22"
        },
        {
            "reference_url": "https://github.com/go-jose/go-jose/releases/tag/v4.0.5",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "6.6",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U"
                },
                {
                    "value": "6.9",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-25T14:26:42Z/"
                }
            ],
            "url": "https://github.com/go-jose/go-jose/releases/tag/v4.0.5"
        },
        {
            "reference_url": "https://github.com/go-jose/go-jose/security/advisories/GHSA-c6gw-w398-hv78",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "6.6",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U"
                },
                {
                    "value": "6.9",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-25T14:26:42Z/"
                }
            ],
            "url": "https://github.com/go-jose/go-jose/security/advisories/GHSA-c6gw-w398-hv78"
        },
        {
            "reference_url": "https://github.com/golang/go/issues/71490",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "6.9",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://github.com/golang/go/issues/71490"
        },
        {
            "reference_url": "https://go.dev/issue/71490",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "6.9",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://go.dev/issue/71490"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27144",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "6.9",
                    "scoring_system": "cvssv4",
                    "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27144"
        },
        {
            "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098908",
            "reference_id": "1098908",
            "reference_type": "",
            "scores": [],
            "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098908"
        },
        {
            "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347423",
            "reference_id": "2347423",
            "reference_type": "",
            "scores": [],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347423"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2024:11038",
            "reference_id": "RHSA-2024:11038",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2024:11038"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2025:11396",
            "reference_id": "RHSA-2025:11396",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2025:11396"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2025:19566",
            "reference_id": "RHSA-2025:19566",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2025:19566"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2025:19594",
            "reference_id": "RHSA-2025:19594",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2025:19594"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2025:22014",
            "reference_id": "RHSA-2025:22014",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2025:22014"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2025:3059",
            "reference_id": "RHSA-2025:3059",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2025:3059"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2025:3061",
            "reference_id": "RHSA-2025:3061",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2025:3061"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2025:3066",
            "reference_id": "RHSA-2025:3066",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2025:3066"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2025:3068",
            "reference_id": "RHSA-2025:3068",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2025:3068"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2025:3131",
            "reference_id": "RHSA-2025:3131",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2025:3131"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2025:3132",
            "reference_id": "RHSA-2025:3132",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2025:3132"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2025:3335",
            "reference_id": "RHSA-2025:3335",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2025:3335"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2025:3438",
            "reference_id": "RHSA-2025:3438",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2025:3438"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2025:3439",
            "reference_id": "RHSA-2025:3439",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2025:3439"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2025:3501",
            "reference_id": "RHSA-2025:3501",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2025:3501"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2025:3593",
            "reference_id": "RHSA-2025:3593",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2025:3593"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2025:3743",
            "reference_id": "RHSA-2025:3743",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2025:3743"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2025:3775",
            "reference_id": "RHSA-2025:3775",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2025:3775"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2025:3820",
            "reference_id": "RHSA-2025:3820",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2025:3820"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2025:3906",
            "reference_id": "RHSA-2025:3906",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2025:3906"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2025:4427",
            "reference_id": "RHSA-2025:4427",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2025:4427"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2025:4712",
            "reference_id": "RHSA-2025:4712",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2025:4712"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2025:7389",
            "reference_id": "RHSA-2025:7389",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2025:7389"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2025:7391",
            "reference_id": "RHSA-2025:7391",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2025:7391"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2025:7397",
            "reference_id": "RHSA-2025:7397",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2025:7397"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2025:7407",
            "reference_id": "RHSA-2025:7407",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2025:7407"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2025:7459",
            "reference_id": "RHSA-2025:7459",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2025:7459"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2025:7462",
            "reference_id": "RHSA-2025:7462",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2025:7462"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2025:7467",
            "reference_id": "RHSA-2025:7467",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2025:7467"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2025:7479",
            "reference_id": "RHSA-2025:7479",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2025:7479"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2025:7669",
            "reference_id": "RHSA-2025:7669",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2025:7669"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2025:9167",
            "reference_id": "RHSA-2025:9167",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2025:9167"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2026:3718",
            "reference_id": "RHSA-2026:3718",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2026:3718"
        }
    ],
    "weaknesses": [
        {
            "cwe_id": 400,
            "name": "Uncontrolled Resource Consumption",
            "description": "The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources."
        },
        {
            "cwe_id": 770,
            "name": "Allocation of Resources Without Limits or Throttling",
            "description": "The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor."
        }
    ],
    "exploits": [],
    "severity_range_score": "4.0 - 7.5",
    "exploitability": "0.5",
    "weighted_severity": "6.8",
    "risk_score": 3.4,
    "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rbtx-222u-zudf"
}