Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/64346?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64346?format=api", "vulnerability_id": "VCID-pcez-y67t-8yg3", "summary": "net/url: Incorrect parsing of IPv6 host literals in net/url", "aliases": [ { "alias": "CVE-2026-25679" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/419678?format=api", "purl": "pkg:apk/alpine/go@1.25.8-r0?arch=aarch64&distroversion=v3.23&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/go@1.25.8-r0%3Farch=aarch64&distroversion=v3.23&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/419680?format=api", "purl": "pkg:apk/alpine/go@1.25.8-r0?arch=armv7&distroversion=v3.23&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/go@1.25.8-r0%3Farch=armv7&distroversion=v3.23&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/419681?format=api", "purl": "pkg:apk/alpine/go@1.25.8-r0?arch=loongarch64&distroversion=v3.23&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/go@1.25.8-r0%3Farch=loongarch64&distroversion=v3.23&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/419682?format=api", "purl": "pkg:apk/alpine/go@1.25.8-r0?arch=ppc64le&distroversion=v3.23&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/go@1.25.8-r0%3Farch=ppc64le&distroversion=v3.23&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/419686?format=api", "purl": "pkg:apk/alpine/go@1.25.8-r0?arch=x86_64&distroversion=v3.23&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/go@1.25.8-r0%3Farch=x86_64&distroversion=v3.23&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/442131?format=api", "purl": "pkg:apk/alpine/go@1.25.8-r0?arch=aarch64&distroversion=edge&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/go@1.25.8-r0%3Farch=aarch64&distroversion=edge&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/442132?format=api", "purl": "pkg:apk/alpine/go@1.25.8-r0?arch=armhf&distroversion=edge&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/go@1.25.8-r0%3Farch=armhf&distroversion=edge&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/442133?format=api", "purl": "pkg:apk/alpine/go@1.25.8-r0?arch=armv7&distroversion=edge&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/go@1.25.8-r0%3Farch=armv7&distroversion=edge&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/442135?format=api", "purl": "pkg:apk/alpine/go@1.25.8-r0?arch=ppc64le&distroversion=edge&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/go@1.25.8-r0%3Farch=ppc64le&distroversion=edge&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/442139?format=api", "purl": "pkg:apk/alpine/go@1.25.8-r0?arch=x86_64&distroversion=edge&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/go@1.25.8-r0%3Farch=x86_64&distroversion=edge&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/419679?format=api", "purl": "pkg:apk/alpine/go@1.25.8-r0?arch=armhf&distroversion=v3.23&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/go@1.25.8-r0%3Farch=armhf&distroversion=v3.23&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/442136?format=api", "purl": "pkg:apk/alpine/go@1.25.8-r0?arch=riscv64&distroversion=edge&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/go@1.25.8-r0%3Farch=riscv64&distroversion=edge&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/442138?format=api", "purl": "pkg:apk/alpine/go@1.25.8-r0?arch=x86&distroversion=edge&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/go@1.25.8-r0%3Farch=x86&distroversion=edge&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/442137?format=api", "purl": "pkg:apk/alpine/go@1.25.8-r0?arch=s390x&distroversion=edge&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/go@1.25.8-r0%3Farch=s390x&distroversion=edge&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/442134?format=api", "purl": "pkg:apk/alpine/go@1.25.8-r0?arch=loongarch64&distroversion=edge&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/go@1.25.8-r0%3Farch=loongarch64&distroversion=edge&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/419684?format=api", "purl": "pkg:apk/alpine/go@1.25.8-r0?arch=s390x&distroversion=v3.23&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/go@1.25.8-r0%3Farch=s390x&distroversion=v3.23&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/419683?format=api", "purl": "pkg:apk/alpine/go@1.25.8-r0?arch=riscv64&distroversion=v3.23&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/go@1.25.8-r0%3Farch=riscv64&distroversion=v3.23&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/419685?format=api", "purl": "pkg:apk/alpine/go@1.25.8-r0?arch=x86&distroversion=v3.23&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/go@1.25.8-r0%3Farch=x86&distroversion=v3.23&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/1081590?format=api", "purl": "pkg:apk/alpine/rclone@1.73.5-r0?arch=aarch64&distroversion=edge&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/rclone@1.73.5-r0%3Farch=aarch64&distroversion=edge&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/1081591?format=api", "purl": "pkg:apk/alpine/rclone@1.73.5-r0?arch=armhf&distroversion=edge&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/rclone@1.73.5-r0%3Farch=armhf&distroversion=edge&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/1081592?format=api", "purl": "pkg:apk/alpine/rclone@1.73.5-r0?arch=armv7&distroversion=edge&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/rclone@1.73.5-r0%3Farch=armv7&distroversion=edge&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/1081593?format=api", "purl": "pkg:apk/alpine/rclone@1.73.5-r0?arch=loongarch64&distroversion=edge&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/rclone@1.73.5-r0%3Farch=loongarch64&distroversion=edge&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/1081594?format=api", "purl": "pkg:apk/alpine/rclone@1.73.5-r0?arch=ppc64le&distroversion=edge&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/rclone@1.73.5-r0%3Farch=ppc64le&distroversion=edge&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/1081595?format=api", "purl": "pkg:apk/alpine/rclone@1.73.5-r0?arch=riscv64&distroversion=edge&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/rclone@1.73.5-r0%3Farch=riscv64&distroversion=edge&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/1081596?format=api", "purl": "pkg:apk/alpine/rclone@1.73.5-r0?arch=s390x&distroversion=edge&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/rclone@1.73.5-r0%3Farch=s390x&distroversion=edge&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/1081597?format=api", "purl": "pkg:apk/alpine/rclone@1.73.5-r0?arch=x86&distroversion=edge&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/rclone@1.73.5-r0%3Farch=x86&distroversion=edge&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/1081598?format=api", "purl": "pkg:apk/alpine/rclone@1.73.5-r0?arch=x86_64&distroversion=edge&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/rclone@1.73.5-r0%3Farch=x86_64&distroversion=edge&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/923811?format=api", "purl": "pkg:deb/debian/golang-1.15@0?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@0%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923810?format=api", "purl": "pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.15@1.15.15-1~deb11u4%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/923834?format=api", "purl": "pkg:deb/debian/golang-1.19@0?distro=bookworm", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.19@0%3Fdistro=bookworm" }, { "url": "http://public2.vulnerablecode.io/api/packages/923825?format=api", "purl": "pkg:deb/debian/golang-1.19@1.19.8-2?distro=bookworm", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.19@1.19.8-2%3Fdistro=bookworm" }, { "url": "http://public2.vulnerablecode.io/api/packages/923838?format=api", "purl": "pkg:deb/debian/golang-1.24@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.24@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923837?format=api", "purl": "pkg:deb/debian/golang-1.24@1.24.4-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1aty-87pz-5yb8" }, { "vulnerability": "VCID-254d-pjst-c7hx" }, { "vulnerability": "VCID-3nqb-6mna-jyb4" }, { "vulnerability": "VCID-5n8q-zcds-gyen" }, { "vulnerability": "VCID-5q9b-a7c4-1yht" }, { "vulnerability": "VCID-7n3z-vwk2-3ydr" }, { "vulnerability": "VCID-9ky3-s2vk-cuge" }, { "vulnerability": "VCID-br2f-7ux9-hkhg" }, { "vulnerability": "VCID-bv1f-bee8-cbek" }, { "vulnerability": "VCID-csmt-e61b-tued" }, { "vulnerability": "VCID-dp1t-v58b-43du" }, { "vulnerability": "VCID-dtt9-gmqf-nbaf" }, { "vulnerability": "VCID-eyev-qpgs-hfbx" }, { "vulnerability": "VCID-hay4-q9m3-ekdj" }, { "vulnerability": "VCID-je6z-v5qw-ufew" }, { "vulnerability": "VCID-mvsr-c2yh-mbdq" }, { "vulnerability": "VCID-q9yj-ze4x-qyfr" }, { "vulnerability": "VCID-rvbr-nser-sfe7" }, { "vulnerability": "VCID-sb3w-x3yv-ffft" }, { "vulnerability": "VCID-t2dr-6dz3-7qgt" }, { "vulnerability": "VCID-usyf-s559-pkgx" }, { "vulnerability": "VCID-wchc-as62-1fae" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.24@1.24.4-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923835?format=api", "purl": "pkg:deb/debian/golang-1.24@1.24.13-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.24@1.24.13-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923846?format=api", "purl": "pkg:deb/debian/golang-1.25@1.25.8-1?distro=sid", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-245f-jhkn-w3ck" }, { "vulnerability": "VCID-91yp-p6st-8ucd" }, { "vulnerability": "VCID-ju53-xpej-3qca" }, { "vulnerability": "VCID-s176-xcrb-e3ea" }, { "vulnerability": "VCID-svbs-h3y5-wfbn" }, { "vulnerability": "VCID-t19m-gs1u-rbfp" }, { "vulnerability": "VCID-tf52-aa91-4kf3" }, { "vulnerability": "VCID-tmb1-tq9e-puhd" }, { "vulnerability": "VCID-vw1r-8zev-ykf4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.25@1.25.8-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059618?format=api", "purl": "pkg:deb/debian/golang-1.25@1.25.9-1?distro=sid", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1642-htyj-kubr" }, { "vulnerability": "VCID-6b34-5hez-8yf2" }, { "vulnerability": "VCID-ant6-bm7n-c3hm" }, { "vulnerability": "VCID-fhzp-yggw-s7au" }, { "vulnerability": "VCID-hast-jk42-g3da" }, { "vulnerability": "VCID-juan-6myp-7ydh" }, { "vulnerability": "VCID-m44c-grtm-kkfk" }, { "vulnerability": "VCID-r36g-6m47-g3f3" }, { "vulnerability": "VCID-s3z8-q5kr-yfe7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.25@1.25.9-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1105250?format=api", "purl": "pkg:deb/debian/golang-1.25@1.25.10-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.25@1.25.10-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/923852?format=api", "purl": "pkg:deb/debian/golang-1.26@1.26.1-1?distro=sid", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-245f-jhkn-w3ck" }, { "vulnerability": "VCID-91yp-p6st-8ucd" }, { "vulnerability": "VCID-gtys-5r5h-p7ht" }, { "vulnerability": "VCID-ju53-xpej-3qca" }, { "vulnerability": "VCID-s176-xcrb-e3ea" }, { "vulnerability": "VCID-svbs-h3y5-wfbn" }, { "vulnerability": "VCID-t19m-gs1u-rbfp" }, { "vulnerability": "VCID-tf52-aa91-4kf3" }, { "vulnerability": "VCID-tmb1-tq9e-puhd" }, { "vulnerability": "VCID-vw1r-8zev-ykf4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.26@1.26.1-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059619?format=api", "purl": "pkg:deb/debian/golang-1.26@1.26.2-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.26@1.26.2-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1077439?format=api", "purl": "pkg:deb/debian/golang-1.26@1.26.2-2?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.26@1.26.2-2%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1081519?format=api", "purl": "pkg:deb/debian/golang-1.26@1.26.2-3?distro=sid", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1642-htyj-kubr" }, { "vulnerability": "VCID-6b34-5hez-8yf2" }, { "vulnerability": "VCID-ant6-bm7n-c3hm" }, { "vulnerability": "VCID-fhzp-yggw-s7au" }, { "vulnerability": "VCID-hast-jk42-g3da" }, { "vulnerability": "VCID-juan-6myp-7ydh" }, { "vulnerability": "VCID-m44c-grtm-kkfk" }, { "vulnerability": "VCID-r36g-6m47-g3f3" }, { "vulnerability": "VCID-s3z8-q5kr-yfe7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.26@1.26.2-3%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1105251?format=api", "purl": "pkg:deb/debian/golang-1.26@1.26.3-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.26@1.26.3-1%3Fdistro=sid" } ], "affected_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1089546?format=api", "purl": "pkg:rpm/redhat/automation-gateway-proxy@2.5.10-5?arch=el8ap", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/automation-gateway-proxy@2.5.10-5%3Farch=el8ap" }, { "url": "http://public2.vulnerablecode.io/api/packages/1089543?format=api", "purl": "pkg:rpm/redhat/automation-gateway-proxy@2.6.14-2?arch=el9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/automation-gateway-proxy@2.6.14-2%3Farch=el9" }, { "url": "http://public2.vulnerablecode.io/api/packages/1111924?format=api", "purl": "pkg:rpm/redhat/buildah@1:1.26.11-1?arch=el9_0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dp1t-v58b-43du" }, { "vulnerability": "VCID-dtt9-gmqf-nbaf" }, { "vulnerability": "VCID-hay4-q9m3-ekdj" }, { "vulnerability": "VCID-pcez-y67t-8yg3" }, { "vulnerability": "VCID-sty6-gwh1-hbcy" }, { "vulnerability": "VCID-vw1r-8zev-ykf4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/buildah@1:1.26.11-1%3Farch=el9_0" }, { "url": "http://public2.vulnerablecode.io/api/packages/1089100?format=api", "purl": "pkg:rpm/redhat/buildah@2:1.33.13-3.el9_4?arch=1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dp1t-v58b-43du" }, { "vulnerability": "VCID-dtt9-gmqf-nbaf" }, { "vulnerability": "VCID-hay4-q9m3-ekdj" }, { "vulnerability": "VCID-pcez-y67t-8yg3" }, { "vulnerability": "VCID-sty6-gwh1-hbcy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/buildah@2:1.33.13-3.el9_4%3Farch=1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1089101?format=api", "purl": "pkg:rpm/redhat/buildah@2:1.39.6-2?arch=el9_6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dp1t-v58b-43du" }, { "vulnerability": "VCID-dtt9-gmqf-nbaf" }, { "vulnerability": "VCID-hay4-q9m3-ekdj" }, { "vulnerability": "VCID-pcez-y67t-8yg3" }, { "vulnerability": "VCID-sty6-gwh1-hbcy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/buildah@2:1.39.6-2%3Farch=el9_6" }, { "url": "http://public2.vulnerablecode.io/api/packages/1104455?format=api", "purl": "pkg:rpm/redhat/buildah@2:1.39.8-1?arch=el10_0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dp1t-v58b-43du" }, { "vulnerability": "VCID-dtt9-gmqf-nbaf" }, { "vulnerability": "VCID-hay4-q9m3-ekdj" }, { "vulnerability": "VCID-pcez-y67t-8yg3" }, { "vulnerability": "VCID-sty6-gwh1-hbcy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/buildah@2:1.39.8-1%3Farch=el10_0" }, { "url": "http://public2.vulnerablecode.io/api/packages/1089098?format=api", "purl": "pkg:rpm/redhat/containernetworking-plugins@1:1.4.0-6.el9_4?arch=3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dp1t-v58b-43du" }, { "vulnerability": "VCID-dtt9-gmqf-nbaf" }, { "vulnerability": "VCID-hay4-q9m3-ekdj" }, { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/containernetworking-plugins@1:1.4.0-6.el9_4%3Farch=3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1073051?format=api", "purl": "pkg:rpm/redhat/containernetworking-plugins@1:1.6.2-3?arch=el9_6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dp1t-v58b-43du" }, { "vulnerability": "VCID-dtt9-gmqf-nbaf" }, { "vulnerability": "VCID-hay4-q9m3-ekdj" }, { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/containernetworking-plugins@1:1.6.2-3%3Farch=el9_6" }, { "url": "http://public2.vulnerablecode.io/api/packages/1073049?format=api", "purl": "pkg:rpm/redhat/delve@1.25.2-3?arch=el10_1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" }, { "vulnerability": "VCID-x5ub-bfb7-nbbr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/delve@1.25.2-3%3Farch=el10_1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067301?format=api", "purl": "pkg:rpm/redhat/delve@1.25.2-3?arch=el10_0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/delve@1.25.2-3%3Farch=el10_0" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076607?format=api", "purl": "pkg:rpm/redhat/git-lfs@2.13.3-5.el9_0?arch=7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/git-lfs@2.13.3-5.el9_0%3Farch=7" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076603?format=api", "purl": "pkg:rpm/redhat/git-lfs@3.2.0-2.el9_2?arch=6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/git-lfs@3.2.0-2.el9_2%3Farch=6" }, { "url": "http://public2.vulnerablecode.io/api/packages/1082042?format=api", "purl": "pkg:rpm/redhat/git-lfs@3.4.1-4.el9_4?arch=5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/git-lfs@3.4.1-4.el9_4%3Farch=5" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076609?format=api", "purl": "pkg:rpm/redhat/git-lfs@3.6.1-2.el9_6?arch=3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/git-lfs@3.6.1-2.el9_6%3Farch=3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076606?format=api", "purl": "pkg:rpm/redhat/git-lfs@3.6.1-2.el10_0?arch=3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/git-lfs@3.6.1-2.el10_0%3Farch=3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1056158?format=api", "purl": "pkg:rpm/redhat/git-lfs@3.6.1-8?arch=el10_1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/git-lfs@3.6.1-8%3Farch=el10_1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1060014?format=api", "purl": "pkg:rpm/redhat/git-lfs@3.6.1-8?arch=el9_7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/git-lfs@3.6.1-8%3Farch=el9_7" }, { "url": "http://public2.vulnerablecode.io/api/packages/1066741?format=api", "purl": "pkg:rpm/redhat/golang@1.17.13-11?arch=el9_0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-csmt-e61b-tued" }, { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/golang@1.17.13-11%3Farch=el9_0" }, { "url": "http://public2.vulnerablecode.io/api/packages/1066744?format=api", "purl": "pkg:rpm/redhat/golang@1.19.13-24?arch=el9_2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-csmt-e61b-tued" }, { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/golang@1.19.13-24%3Farch=el9_2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1066739?format=api", "purl": "pkg:rpm/redhat/golang@1.21.13-15?arch=el9_4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-csmt-e61b-tued" }, { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/golang@1.21.13-15%3Farch=el9_4" }, { "url": "http://public2.vulnerablecode.io/api/packages/86928?format=api", "purl": "pkg:rpm/redhat/golang@1.25.8-1?arch=el9_7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-csmt-e61b-tued" }, { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/golang@1.25.8-1%3Farch=el9_7" }, { "url": "http://public2.vulnerablecode.io/api/packages/86926?format=api", "purl": "pkg:rpm/redhat/golang@1.25.8-1?arch=el9_6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-csmt-e61b-tued" }, { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/golang@1.25.8-1%3Farch=el9_6" }, { "url": "http://public2.vulnerablecode.io/api/packages/86927?format=api", "purl": "pkg:rpm/redhat/golang@1.25.8-1?arch=el10_0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-csmt-e61b-tued" }, { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/golang@1.25.8-1%3Farch=el10_0" }, { "url": "http://public2.vulnerablecode.io/api/packages/86925?format=api", "purl": "pkg:rpm/redhat/golang@1.25.8-1?arch=el10_1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-csmt-e61b-tued" }, { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/golang@1.25.8-1%3Farch=el10_1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076608?format=api", "purl": "pkg:rpm/redhat/golang-github-openprinting-ipp-usb@0.9.27-3.el10_0?arch=3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/golang-github-openprinting-ipp-usb@0.9.27-3.el10_0%3Farch=3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067299?format=api", "purl": "pkg:rpm/redhat/golang-github-openprinting-ipp-usb@0.9.27-5.el10_1?arch=1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/golang-github-openprinting-ipp-usb@0.9.27-5.el10_1%3Farch=1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1073059?format=api", "purl": "pkg:rpm/redhat/go-rpm-macros@3.6.0-6?arch=el10_0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/go-rpm-macros@3.6.0-6%3Farch=el10_0" }, { "url": "http://public2.vulnerablecode.io/api/packages/1073071?format=api", "purl": "pkg:rpm/redhat/go-rpm-macros@3.6.0-8?arch=el10_1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/go-rpm-macros@3.6.0-8%3Farch=el10_1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1073058?format=api", "purl": "pkg:rpm/redhat/go-rpm-macros@3.6.0-13?arch=el9_6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/go-rpm-macros@3.6.0-13%3Farch=el9_6" }, { "url": "http://public2.vulnerablecode.io/api/packages/1073066?format=api", "purl": "pkg:rpm/redhat/go-rpm-macros@3.6.0-14?arch=el9_7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/go-rpm-macros@3.6.0-14%3Farch=el9_7" }, { "url": "http://public2.vulnerablecode.io/api/packages/1073052?format=api", "purl": "pkg:rpm/redhat/grafana@6.3.6-11?arch=el8_2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/grafana@6.3.6-11%3Farch=el8_2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1073055?format=api", "purl": "pkg:rpm/redhat/grafana@7.3.6-13?arch=el8_4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/grafana@7.3.6-13%3Farch=el8_4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1073069?format=api", "purl": "pkg:rpm/redhat/grafana@7.5.11-10?arch=el8_6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/grafana@7.5.11-10%3Farch=el8_6" }, { "url": "http://public2.vulnerablecode.io/api/packages/1073065?format=api", "purl": "pkg:rpm/redhat/grafana@7.5.11-14?arch=el9_0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/grafana@7.5.11-14%3Farch=el9_0" }, { "url": "http://public2.vulnerablecode.io/api/packages/1073063?format=api", "purl": "pkg:rpm/redhat/grafana@7.5.15-10?arch=el8_8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/grafana@7.5.15-10%3Farch=el8_8" }, { "url": "http://public2.vulnerablecode.io/api/packages/1073048?format=api", "purl": "pkg:rpm/redhat/grafana@9.0.9-11?arch=el9_2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/grafana@9.0.9-11%3Farch=el9_2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1073054?format=api", "purl": "pkg:rpm/redhat/grafana@9.2.10-26?arch=el9_4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/grafana@9.2.10-26%3Farch=el9_4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1060012?format=api", "purl": "pkg:rpm/redhat/grafana@9.2.10-29?arch=el8_10", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/grafana@9.2.10-29%3Farch=el8_10" }, { "url": "http://public2.vulnerablecode.io/api/packages/587047?format=api", "purl": "pkg:rpm/redhat/grafana@10.2.6-19?arch=el9_7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/grafana@10.2.6-19%3Farch=el9_7" }, { "url": "http://public2.vulnerablecode.io/api/packages/1073060?format=api", "purl": "pkg:rpm/redhat/grafana@10.2.6-19?arch=el9_6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/grafana@10.2.6-19%3Farch=el9_6" }, { "url": "http://public2.vulnerablecode.io/api/packages/1073056?format=api", "purl": "pkg:rpm/redhat/grafana@10.2.6-22?arch=el10_0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/grafana@10.2.6-22%3Farch=el10_0" }, { "url": "http://public2.vulnerablecode.io/api/packages/587045?format=api", "purl": "pkg:rpm/redhat/grafana@10.2.6-23?arch=el10_1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/grafana@10.2.6-23%3Farch=el10_1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1073047?format=api", "purl": "pkg:rpm/redhat/grafana-pcp@3.0.2-4?arch=el8_4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/grafana-pcp@3.0.2-4%3Farch=el8_4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1073044?format=api", "purl": "pkg:rpm/redhat/grafana-pcp@3.2.0-4?arch=el8_6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/grafana-pcp@3.2.0-4%3Farch=el8_6" }, { "url": "http://public2.vulnerablecode.io/api/packages/1073050?format=api", "purl": "pkg:rpm/redhat/grafana-pcp@3.2.0-6?arch=el9_0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/grafana-pcp@3.2.0-6%3Farch=el9_0" }, { "url": "http://public2.vulnerablecode.io/api/packages/1073064?format=api", "purl": "pkg:rpm/redhat/grafana-pcp@3.2.0-6?arch=el8_8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/grafana-pcp@3.2.0-6%3Farch=el8_8" }, { "url": "http://public2.vulnerablecode.io/api/packages/1073057?format=api", "purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-5?arch=el9_2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/grafana-pcp@5.1.1-5%3Farch=el9_2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1073053?format=api", "purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-7?arch=el9_4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/grafana-pcp@5.1.1-7%3Farch=el9_4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1073070?format=api", "purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-13?arch=el9_6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/grafana-pcp@5.1.1-13%3Farch=el9_6" }, { "url": "http://public2.vulnerablecode.io/api/packages/1060015?format=api", "purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-13?arch=el8_10", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/grafana-pcp@5.1.1-13%3Farch=el8_10" }, { "url": "http://public2.vulnerablecode.io/api/packages/587048?format=api", "purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-13?arch=el9_7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/grafana-pcp@5.1.1-13%3Farch=el9_7" }, { "url": "http://public2.vulnerablecode.io/api/packages/1073046?format=api", "purl": "pkg:rpm/redhat/grafana-pcp@5.2.2-5?arch=el10_0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/grafana-pcp@5.2.2-5%3Farch=el10_0" }, { "url": "http://public2.vulnerablecode.io/api/packages/587046?format=api", "purl": "pkg:rpm/redhat/grafana-pcp@5.3.0-3?arch=el10_1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/grafana-pcp@5.3.0-3%3Farch=el10_1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1089099?format=api", "purl": "pkg:rpm/redhat/gvisor-tap-vsock@6:0.7.3-5.el9_4?arch=3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dp1t-v58b-43du" }, { "vulnerability": "VCID-dtt9-gmqf-nbaf" }, { "vulnerability": "VCID-hay4-q9m3-ekdj" }, { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/gvisor-tap-vsock@6:0.7.3-5.el9_4%3Farch=3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1073067?format=api", "purl": "pkg:rpm/redhat/gvisor-tap-vsock@6:0.8.5-2.el9_6?arch=1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dp1t-v58b-43du" }, { "vulnerability": "VCID-dtt9-gmqf-nbaf" }, { "vulnerability": "VCID-hay4-q9m3-ekdj" }, { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/gvisor-tap-vsock@6:0.8.5-2.el9_6%3Farch=1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1089545?format=api", "purl": "pkg:rpm/redhat/image-builder@31-4?arch=el9_7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/image-builder@31-4%3Farch=el9_7" }, { "url": "http://public2.vulnerablecode.io/api/packages/1089549?format=api", "purl": "pkg:rpm/redhat/image-builder@31-5?arch=el10_1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/image-builder@31-5%3Farch=el10_1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1068170?format=api", "purl": "pkg:rpm/redhat/osbuild-composer@101.4-5?arch=el8_10", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/osbuild-composer@101.4-5%3Farch=el8_10" }, { "url": "http://public2.vulnerablecode.io/api/packages/1073061?format=api", "purl": "pkg:rpm/redhat/osbuild-composer@149-5?arch=el9_7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/osbuild-composer@149-5%3Farch=el9_7" }, { "url": "http://public2.vulnerablecode.io/api/packages/1089542?format=api", "purl": "pkg:rpm/redhat/osbuild-composer@149-6?arch=el10_1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/osbuild-composer@149-6%3Farch=el10_1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1089095?format=api", "purl": "pkg:rpm/redhat/podman@4:4.9.4-20.el9_4?arch=2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5q9b-a7c4-1yht" }, { "vulnerability": "VCID-dp1t-v58b-43du" }, { "vulnerability": "VCID-dtt9-gmqf-nbaf" }, { "vulnerability": "VCID-hay4-q9m3-ekdj" }, { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@4:4.9.4-20.el9_4%3Farch=2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1089547?format=api", "purl": "pkg:rpm/redhat/receptor@1.6.4-2?arch=el9ap", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/receptor@1.6.4-2%3Farch=el9ap" }, { "url": "http://public2.vulnerablecode.io/api/packages/1089544?format=api", "purl": "pkg:rpm/redhat/receptor@1.6.4-2?arch=el8ap", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/receptor@1.6.4-2%3Farch=el8ap" }, { "url": "http://public2.vulnerablecode.io/api/packages/1089548?format=api", "purl": "pkg:rpm/redhat/receptor@1.6.4-3?arch=el10ap", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/receptor@1.6.4-3%3Farch=el10ap" }, { "url": "http://public2.vulnerablecode.io/api/packages/1068169?format=api", "purl": "pkg:rpm/redhat/rhc@1:0.2.0-6?arch=el8_4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rhc@1:0.2.0-6%3Farch=el8_4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1073073?format=api", "purl": "pkg:rpm/redhat/rhc@1:0.2.1-13?arch=el9_0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rhc@1:0.2.1-13%3Farch=el9_0" }, { "url": "http://public2.vulnerablecode.io/api/packages/1073045?format=api", "purl": "pkg:rpm/redhat/rhc@1:0.2.1-14?arch=el8_6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rhc@1:0.2.1-14%3Farch=el8_6" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076605?format=api", "purl": "pkg:rpm/redhat/rhc@1:0.2.2-1.el8_8?arch=2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rhc@1:0.2.2-1.el8_8%3Farch=2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067300?format=api", "purl": "pkg:rpm/redhat/rhc@1:0.2.2-1.el9_2?arch=2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-h7qt-3g1f-5ffr" }, { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rhc@1:0.2.2-1.el9_2%3Farch=2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1073068?format=api", "purl": "pkg:rpm/redhat/rhc@1:0.2.4-5?arch=el7_9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rhc@1:0.2.4-5%3Farch=el7_9" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067302?format=api", "purl": "pkg:rpm/redhat/rhc@1:0.2.4-7?arch=el9_4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rhc@1:0.2.4-7%3Farch=el9_4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1066742?format=api", "purl": "pkg:rpm/redhat/rhc@1:0.2.5-5?arch=el8_10", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rhc@1:0.2.5-5%3Farch=el8_10" }, { "url": "http://public2.vulnerablecode.io/api/packages/1066743?format=api", "purl": "pkg:rpm/redhat/rhc@1:0.2.7-1.el9_6?arch=2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rhc@1:0.2.7-1.el9_6%3Farch=2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1060011?format=api", "purl": "pkg:rpm/redhat/rhc@1:0.2.7-3?arch=el9_7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rhc@1:0.2.7-3%3Farch=el9_7" }, { "url": "http://public2.vulnerablecode.io/api/packages/1060013?format=api", "purl": "pkg:rpm/redhat/rhc@1:0.3.2-3?arch=el10_0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rhc@1:0.3.2-3%3Farch=el10_0" }, { "url": "http://public2.vulnerablecode.io/api/packages/1066740?format=api", "purl": "pkg:rpm/redhat/rhc@1:0.3.4-3?arch=el10_1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rhc@1:0.3.4-3%3Farch=el10_1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1082041?format=api", "purl": "pkg:rpm/redhat/rhc-worker-playbook@0.2.3-4?arch=el10_0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" }, { "vulnerability": "VCID-x5ub-bfb7-nbbr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rhc-worker-playbook@0.2.3-4%3Farch=el10_0" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076604?format=api", "purl": "pkg:rpm/redhat/rhc-worker-playbook@0.2.3-4?arch=el10_1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" }, { "vulnerability": "VCID-x5ub-bfb7-nbbr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rhc-worker-playbook@0.2.3-4%3Farch=el10_1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1089096?format=api", "purl": "pkg:rpm/redhat/runc@4:1.2.9-1.el9_4?arch=1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dp1t-v58b-43du" }, { "vulnerability": "VCID-dtt9-gmqf-nbaf" }, { "vulnerability": "VCID-hay4-q9m3-ekdj" }, { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/runc@4:1.2.9-1.el9_4%3Farch=1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1073072?format=api", "purl": "pkg:rpm/redhat/runc@4:1.2.9-3?arch=el9_6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dp1t-v58b-43du" }, { "vulnerability": "VCID-dtt9-gmqf-nbaf" }, { "vulnerability": "VCID-hay4-q9m3-ekdj" }, { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/runc@4:1.2.9-3%3Farch=el9_6" }, { "url": "http://public2.vulnerablecode.io/api/packages/1089097?format=api", "purl": "pkg:rpm/redhat/skopeo@2:1.14.5-2.el9_4?arch=4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dp1t-v58b-43du" }, { "vulnerability": "VCID-dtt9-gmqf-nbaf" }, { "vulnerability": "VCID-hay4-q9m3-ekdj" }, { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/skopeo@2:1.14.5-2.el9_4%3Farch=4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1073062?format=api", "purl": "pkg:rpm/redhat/skopeo@2:1.18.1-5?arch=el9_6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dp1t-v58b-43du" }, { "vulnerability": "VCID-dtt9-gmqf-nbaf" }, { "vulnerability": "VCID-hay4-q9m3-ekdj" }, { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/skopeo@2:1.18.1-5%3Farch=el9_6" }, { "url": "http://public2.vulnerablecode.io/api/packages/1082046?format=api", "purl": "pkg:rpm/redhat/yggdrasil@0.4.7-3?arch=el10_0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/yggdrasil@0.4.7-3%3Farch=el10_0" }, { "url": "http://public2.vulnerablecode.io/api/packages/1082043?format=api", "purl": "pkg:rpm/redhat/yggdrasil@0.4.8-4?arch=el10_1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/yggdrasil@0.4.8-4%3Farch=el10_1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1082044?format=api", "purl": "pkg:rpm/redhat/yggdrasil-worker-package-manager@0.2.3-5?arch=el10_1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/yggdrasil-worker-package-manager@0.2.3-5%3Farch=el10_1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1082045?format=api", "purl": "pkg:rpm/redhat/yggdrasil-worker-package-manager@0.2.3-5?arch=el10_0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pcez-y67t-8yg3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/yggdrasil-worker-package-manager@0.2.3-5%3Farch=el10_0" } ], "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-25679.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-25679.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-25679", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08816", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08768", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09793", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09672", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09743", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09802", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09771", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09754", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.0964", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09612", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15881", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16013", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.15973", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.15853", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16017", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16065", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16041", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16074", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.15964", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-25679" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445356", "reference_id": "2445356", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445356" }, { "reference_url": "https://go.dev/cl/752180", "reference_id": "752180", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-10T13:36:26Z/" } ], "url": "https://go.dev/cl/752180" }, { "reference_url": "https://go.dev/issue/77578", "reference_id": "77578", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-10T13:36:26Z/" } ], "url": "https://go.dev/issue/77578" }, { "reference_url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk", "reference_id": "EdhZqrQ98hk", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-10T13:36:26Z/" } ], "url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk" }, { "reference_url": "https://pkg.go.dev/vuln/GO-2026-4601", "reference_id": "GO-2026-4601", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-10T13:36:26Z/" } ], "url": "https://pkg.go.dev/vuln/GO-2026-4601" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:10065", "reference_id": "RHSA-2026:10065", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:10065" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:10125", "reference_id": "RHSA-2026:10125", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:10125" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:10133", "reference_id": "RHSA-2026:10133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:10133" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:10140", "reference_id": "RHSA-2026:10140", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:10140" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:10141", "reference_id": "RHSA-2026:10141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:10141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:10158", "reference_id": "RHSA-2026:10158", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:10158" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:10169", "reference_id": "RHSA-2026:10169", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:10169" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:10175", "reference_id": "RHSA-2026:10175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:10175" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:10184", "reference_id": "RHSA-2026:10184", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:10184" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:10225", "reference_id": "RHSA-2026:10225", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:10225" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:10250", "reference_id": "RHSA-2026:10250", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:10250" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:10701", "reference_id": "RHSA-2026:10701", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:10701" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:10712", "reference_id": "RHSA-2026:10712", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:10712" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:10929", "reference_id": "RHSA-2026:10929", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:10929" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:11331", "reference_id": "RHSA-2026:11331", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:11331" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:11375", "reference_id": "RHSA-2026:11375", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:11375" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:11412", "reference_id": "RHSA-2026:11412", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:11412" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:11413", "reference_id": "RHSA-2026:11413", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:11413" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:11686", "reference_id": "RHSA-2026:11686", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:11686" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:11688", "reference_id": "RHSA-2026:11688", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:11688" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:11747", "reference_id": "RHSA-2026:11747", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:11747" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:11749", "reference_id": "RHSA-2026:11749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:11749" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:11768", "reference_id": "RHSA-2026:11768", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:11768" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:11800", "reference_id": "RHSA-2026:11800", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:11800" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:11856", "reference_id": "RHSA-2026:11856", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:11856" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:11916", "reference_id": "RHSA-2026:11916", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:11916" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:11996", "reference_id": "RHSA-2026:11996", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:11996" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:12028", "reference_id": "RHSA-2026:12028", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:12028" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:12029", "reference_id": "RHSA-2026:12029", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:12029" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:12030", "reference_id": "RHSA-2026:12030", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:12030" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:12031", "reference_id": "RHSA-2026:12031", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:12031" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:12032", "reference_id": "RHSA-2026:12032", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:12032" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:12033", "reference_id": "RHSA-2026:12033", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:12033" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:12282", "reference_id": "RHSA-2026:12282", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:12282" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:13508", "reference_id": "RHSA-2026:13508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:13508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:13512", "reference_id": "RHSA-2026:13512", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:13512" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:13545", "reference_id": "RHSA-2026:13545", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:13545" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:13642", "reference_id": "RHSA-2026:13642", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:13642" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:13643", "reference_id": "RHSA-2026:13643", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:13643" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:13671", "reference_id": "RHSA-2026:13671", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:13671" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:14020", "reference_id": "RHSA-2026:14020", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:14020" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:14100", "reference_id": "RHSA-2026:14100", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:14100" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:14868", "reference_id": "RHSA-2026:14868", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:14868" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:14879", "reference_id": "RHSA-2026:14879", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:14879" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:16102", "reference_id": "RHSA-2026:16102", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:16102" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:5110", "reference_id": "RHSA-2026:5110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:5110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:5549", "reference_id": "RHSA-2026:5549", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:5549" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:5941", "reference_id": "RHSA-2026:5941", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:5941" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:5942", "reference_id": "RHSA-2026:5942", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:5942" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:5943", "reference_id": "RHSA-2026:5943", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:5943" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:5944", "reference_id": "RHSA-2026:5944", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:5944" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6341", "reference_id": "RHSA-2026:6341", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6341" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6344", "reference_id": "RHSA-2026:6344", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6344" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6382", "reference_id": "RHSA-2026:6382", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6382" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6383", "reference_id": "RHSA-2026:6383", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6383" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6388", "reference_id": "RHSA-2026:6388", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6388" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6564", "reference_id": "RHSA-2026:6564", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6564" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6720", "reference_id": "RHSA-2026:6720", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6720" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6802", "reference_id": "RHSA-2026:6802", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6802" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6949", "reference_id": "RHSA-2026:6949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7005", "reference_id": "RHSA-2026:7005", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7005" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7009", "reference_id": "RHSA-2026:7009", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7009" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7011", "reference_id": "RHSA-2026:7011", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7011" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7259", "reference_id": "RHSA-2026:7259", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7259" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7315", "reference_id": "RHSA-2026:7315", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7315" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7328", "reference_id": "RHSA-2026:7328", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7328" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7665", "reference_id": "RHSA-2026:7665", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7665" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7669", "reference_id": "RHSA-2026:7669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7674", "reference_id": "RHSA-2026:7674", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7674" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7833", "reference_id": "RHSA-2026:7833", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7833" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7834", "reference_id": "RHSA-2026:7834", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7834" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7876", "reference_id": "RHSA-2026:7876", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7876" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7877", "reference_id": "RHSA-2026:7877", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7877" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7878", "reference_id": "RHSA-2026:7878", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7878" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7879", "reference_id": "RHSA-2026:7879", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7879" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7883", "reference_id": "RHSA-2026:7883", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7883" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7992", "reference_id": "RHSA-2026:7992", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7992" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8151", "reference_id": "RHSA-2026:8151", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8151" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8167", "reference_id": "RHSA-2026:8167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8314", "reference_id": "RHSA-2026:8314", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8314" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8322", "reference_id": "RHSA-2026:8322", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8322" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8324", "reference_id": "RHSA-2026:8324", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8324" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8337", "reference_id": "RHSA-2026:8337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8337" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8338", "reference_id": "RHSA-2026:8338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8338" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8433", "reference_id": "RHSA-2026:8433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8434", "reference_id": "RHSA-2026:8434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8456", "reference_id": "RHSA-2026:8456", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8456" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8483", "reference_id": "RHSA-2026:8483", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8483" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8484", "reference_id": "RHSA-2026:8484", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8484" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8490", "reference_id": "RHSA-2026:8490", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8490" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8491", "reference_id": "RHSA-2026:8491", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8491" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8493", "reference_id": "RHSA-2026:8493", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8493" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8840", "reference_id": "RHSA-2026:8840", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8840" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8841", "reference_id": "RHSA-2026:8841", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8841" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8842", "reference_id": "RHSA-2026:8842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8845", "reference_id": "RHSA-2026:8845", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8845" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8847", "reference_id": "RHSA-2026:8847", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8847" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8848", "reference_id": "RHSA-2026:8848", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8848" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8849", "reference_id": "RHSA-2026:8849", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8849" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8851", "reference_id": "RHSA-2026:8851", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8851" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8852", "reference_id": "RHSA-2026:8852", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8852" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8853", "reference_id": "RHSA-2026:8853", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8853" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8855", "reference_id": "RHSA-2026:8855", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8855" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8856", "reference_id": "RHSA-2026:8856", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8856" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8860", "reference_id": "RHSA-2026:8860", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8860" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8877", "reference_id": "RHSA-2026:8877", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8877" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8878", "reference_id": "RHSA-2026:8878", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8878" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8879", "reference_id": "RHSA-2026:8879", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8879" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8881", "reference_id": "RHSA-2026:8881", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8881" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8882", "reference_id": "RHSA-2026:8882", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8882" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8930", "reference_id": "RHSA-2026:8930", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8930" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8931", "reference_id": "RHSA-2026:8931", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8931" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8949", "reference_id": "RHSA-2026:8949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9043", "reference_id": "RHSA-2026:9043", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9043" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9044", "reference_id": "RHSA-2026:9044", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9044" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9052", "reference_id": "RHSA-2026:9052", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9052" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9090", "reference_id": "RHSA-2026:9090", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9090" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9093", "reference_id": "RHSA-2026:9093", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9093" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9094", "reference_id": "RHSA-2026:9094", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9094" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9097", "reference_id": "RHSA-2026:9097", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9097" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9098", "reference_id": "RHSA-2026:9098", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9098" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9108", "reference_id": "RHSA-2026:9108", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9108" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9109", "reference_id": "RHSA-2026:9109", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9109" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9385", "reference_id": "RHSA-2026:9385", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9385" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9434", "reference_id": "RHSA-2026:9434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9435", "reference_id": "RHSA-2026:9435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9435" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9436", "reference_id": "RHSA-2026:9436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9436" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9439", "reference_id": "RHSA-2026:9439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9439" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9440", "reference_id": "RHSA-2026:9440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9448", "reference_id": "RHSA-2026:9448", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9448" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9453", "reference_id": "RHSA-2026:9453", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9453" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9461", "reference_id": "RHSA-2026:9461", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9461" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9695", "reference_id": "RHSA-2026:9695", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9695" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9742", "reference_id": "RHSA-2026:9742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9872", "reference_id": "RHSA-2026:9872", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9872" } ], "weaknesses": [ { "cwe_id": 1286, "name": "Improper Validation of Syntactic Correctness of Input", "description": "The product receives input that is expected to be well-formed - i.e., to comply with a certain syntax - but it does not validate or incorrectly validates that the input complies with the syntax." } ], "exploits": [], "severity_range_score": "3.3 - 7.5", "exploitability": "0.5", "weighted_severity": "6.8", "risk_score": 3.4, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pcez-y67t-8yg3" }