running acs-image-check Step: acs-image-check Results: /workspace/source/source/results/acs-image-check Custom root CA variable is not set. Make sure CA trust is established Using rox central endpoint central-rhacs-operator.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com:443 Download roxctl cli roxctl image check Running acs-image-check:report ACS_IMAGE_CHECK_EYECATCHER_BEGIN { "results": [ { "metadata": { "id": "quay.io/rhtap_qe/e2e-tests-nodejs-kkyenzls:on-pr-80f5ac828dd0753ff76184dd558737ea4620e126@sha256:47de1b4923ec9842eee23ecfbbebfc523f84e3560799b947dfc977699b61d918", "additionalInfo": { "name": "quay.io/rhtap_qe/e2e-tests-nodejs-kkyenzls:on-pr-80f5ac828dd0753ff76184dd558737ea4620e126@sha256:47de1b4923ec9842eee23ecfbbebfc523f84e3560799b947dfc977699b61d918", "type": "image" } }, "summary": { "CRITICAL": 0, "HIGH": 0, "LOW": 1, "MEDIUM": 0, "TOTAL": 1 }, "violatedPolicies": [ { "name": "Red Hat Package Manager in Image", "severity": "LOW", "description": "Alert on deployments with components of the Red Hat/Fedora/CentOS package management system.", "violation": [ "Image includes component 'microdnf' (version 3.9.1-3.el9)", "Image includes component 'rpm' (version 4.16.1.3-39.el9)" ], "remediation": "Run `rpm -e --nodeps $(rpm -qa '*rpm*' '*dnf*' '*libsolv*' '*hawkey*' 'yum*')` in the image build for production containers.", "failingCheck": false } ] } ], "summary": { "CRITICAL": 0, "HIGH": 0, "LOW": 1, "MEDIUM": 0, "TOTAL": 1 } } ACS_IMAGE_CHECK_EYECATCHER_END running acs-image-scan Step: acs-image-scan Results: /workspace/source/source/results/acs-image-scan Custom root CA variable is not set. Make sure CA trust is established Running acs-image-scan:rox-image-scan Using rox central endpoint central-rhacs-operator.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com:443 Download roxctl cli roxctl image scan {"vulnerabilities":{"critical":0,"high":4,"medium":56,"low":51}} {"result":"SUCCESS","timestamp":"1777937321","note":"Task completed: Refer to Tekton task result SCAN_OUTPUT for found vulnerabilities.","namespace":"default","successes":"0","failures":"0","warnings":"0"} Running acs-image-scan:report ACS_IMAGE_SCAN_EYECATCHER_BEGIN { "result": { "summary": { "CRITICAL": 0, "IMPORTANT": 4, "LOW": 51, "MODERATE": 56, "TOTAL-COMPONENTS": 40, "TOTAL-VULNERABILITIES": 111 }, "vulnerabilities": [ { "cveId": "CVE-2026-4046", "cveSeverity": "IMPORTANT", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4046", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4437", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4437", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5435", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5435", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5450", "cveSeverity": "MODERATE", "cveCVSS": 5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5450", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5928", "cveSeverity": "MODERATE", "cveCVSS": 5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5928", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4438", "cveSeverity": "LOW", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4438", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4046", "cveSeverity": "IMPORTANT", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4046", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-common", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4437", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4437", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-common", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5435", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5435", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-common", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5928", "cveSeverity": "MODERATE", "cveCVSS": 5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5928", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-common", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5450", "cveSeverity": "MODERATE", "cveCVSS": 5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5450", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-common", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4438", "cveSeverity": "LOW", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4438", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-common", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4046", "cveSeverity": "IMPORTANT", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4046", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-minimal-langpack", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4437", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4437", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-minimal-langpack", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5435", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5435", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-minimal-langpack", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5450", "cveSeverity": "MODERATE", "cveCVSS": 5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5450", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-minimal-langpack", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5928", "cveSeverity": "MODERATE", "cveCVSS": 5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5928", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-minimal-langpack", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4438", "cveSeverity": "LOW", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4438", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-minimal-langpack", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-33846", "cveSeverity": "IMPORTANT", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-33846", "advisoryId": "", "advisoryInfo": "", "componentName": "gnutls", "componentVersion": "3.8.3-10.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-33845", "cveSeverity": "IMPORTANT", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-33845", "advisoryId": "", "advisoryInfo": "", "componentName": "gnutls", "componentVersion": "3.8.3-10.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3833", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3833", "advisoryId": "", "advisoryInfo": "", "componentName": "gnutls", "componentVersion": "3.8.3-10.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3832", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3832", "advisoryId": "", "advisoryInfo": "", "componentName": "gnutls", "componentVersion": "3.8.3-10.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-40356", "cveSeverity": "IMPORTANT", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-40356", "advisoryId": "", "advisoryInfo": "", "componentName": "krb5-libs", "componentVersion": "1.21.1-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-40355", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-40355", "advisoryId": "", "advisoryInfo": "", "componentName": "krb5-libs", "componentVersion": "1.21.1-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5278", "cveSeverity": "MODERATE", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5278", "advisoryId": "", "advisoryInfo": "", "componentName": "coreutils-single", "componentVersion": "8.32-39.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-13034", "cveSeverity": "MODERATE", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-13034", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1965", "cveSeverity": "MODERATE", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1965", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5545", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5545", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3784", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3784", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5773", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5773", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-6429", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-6429", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3805", "cveSeverity": "MODERATE", "cveCVSS": 6.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3805", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3783", "cveSeverity": "MODERATE", "cveCVSS": 5.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3783", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4873", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4873", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-6253", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-6253", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-14017", "cveSeverity": "MODERATE", "cveCVSS": 4.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14017", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-15079", "cveSeverity": "LOW", "cveCVSS": 8.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-15079", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-14524", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14524", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2024-11053", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-11053", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2024-7264", "cveSeverity": "LOW", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-7264", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-15224", "cveSeverity": "LOW", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-15224", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2024-9681", "cveSeverity": "LOW", "cveCVSS": 3.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-9681", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-6276", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-6276", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-14512", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14512", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2", "componentVersion": "2.68.4-18.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-14087", "cveSeverity": "MODERATE", "cveCVSS": 5.6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14087", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2", "componentVersion": "2.68.4-18.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1489", "cveSeverity": "MODERATE", "cveCVSS": 5.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1489", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2", "componentVersion": "2.68.4-18.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1484", "cveSeverity": "MODERATE", "cveCVSS": 4.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1484", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2", "componentVersion": "2.68.4-18.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2023-32636", "cveSeverity": "LOW", "cveCVSS": 6.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-32636", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2", "componentVersion": "2.68.4-18.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-7039", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-7039", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2", "componentVersion": "2.68.4-18.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-3360", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-3360", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2", "componentVersion": "2.68.4-18.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0988", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0988", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2", "componentVersion": "2.68.4-18.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1485", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1485", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2", "componentVersion": "2.68.4-18.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-68972", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-68972", "advisoryId": "", "advisoryInfo": "", "componentName": "gnupg2", "componentVersion": "2.3.3-5.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3219", "cveSeverity": "LOW", "cveCVSS": 6.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3219", "advisoryId": "", "advisoryInfo": "", "componentName": "gnupg2", "componentVersion": "2.3.3-5.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-24883", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-24883", "advisoryId": "", "advisoryInfo": "", "componentName": "gnupg2", "componentVersion": "2.3.3-5.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-30258", "cveSeverity": "LOW", "cveCVSS": 2.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-30258", "advisoryId": "", "advisoryInfo": "", "componentName": "gnupg2", "componentVersion": "2.3.3-5.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4426", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4426", "advisoryId": "", "advisoryInfo": "", "componentName": "libarchive", "componentVersion": "3.5.3-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5745", "cveSeverity": "MODERATE", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5745", "advisoryId": "", "advisoryInfo": "", "componentName": "libarchive", "componentVersion": "3.5.3-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-60753", "cveSeverity": "MODERATE", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-60753", "advisoryId": "", "advisoryInfo": "", "componentName": "libarchive", "componentVersion": "3.5.3-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2023-30571", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-30571", "advisoryId": "", "advisoryInfo": "", "componentName": "libarchive", "componentVersion": "3.5.3-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5915", "cveSeverity": "LOW", "cveCVSS": 6.6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5915", "advisoryId": "", "advisoryInfo": "", "componentName": "libarchive", "componentVersion": "3.5.3-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5918", "cveSeverity": "LOW", "cveCVSS": 3.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5918", "advisoryId": "", "advisoryInfo": "", "componentName": "libarchive", "componentVersion": "3.5.3-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5916", "cveSeverity": "LOW", "cveCVSS": 3.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5916", "advisoryId": "", "advisoryInfo": "", "componentName": "libarchive", "componentVersion": "3.5.3-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1632", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1632", "advisoryId": "", "advisoryInfo": "", "componentName": "libarchive", "componentVersion": "3.5.3-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5917", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5917", "advisoryId": "", "advisoryInfo": "", "componentName": "libarchive", "componentVersion": "3.5.3-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-27456", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27456", "advisoryId": "", "advisoryInfo": "", "componentName": "libblkid", "componentVersion": "2.37.4-21.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1965", "cveSeverity": "MODERATE", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1965", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-13034", "cveSeverity": "MODERATE", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-13034", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-6429", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-6429", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5773", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5773", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5545", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5545", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3784", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3784", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3805", "cveSeverity": "MODERATE", "cveCVSS": 6.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3805", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3783", "cveSeverity": "MODERATE", "cveCVSS": 5.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3783", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4873", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4873", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-6253", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-6253", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-14017", "cveSeverity": "MODERATE", "cveCVSS": 4.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14017", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-15079", "cveSeverity": "LOW", "cveCVSS": 8.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-15079", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-14524", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14524", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2024-11053", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-11053", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2024-7264", "cveSeverity": "LOW", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-7264", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-15224", "cveSeverity": "LOW", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-15224", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2024-9681", "cveSeverity": "LOW", "cveCVSS": 3.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-9681", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-6276", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-6276", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-41989", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-41989", "advisoryId": "", "advisoryInfo": "", "componentName": "libgcrypt", "componentVersion": "1.10.0-11.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-41990", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-41990", "advisoryId": "", "advisoryInfo": "", "componentName": "libgcrypt", "componentVersion": "1.10.0-11.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-27456", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27456", "advisoryId": "", "advisoryInfo": "", "componentName": "libmount", "componentVersion": "2.37.4-21.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-27456", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27456", "advisoryId": "", "advisoryInfo": "", "componentName": "libsmartcols", "componentVersion": "2.37.4-21.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-27456", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27456", "advisoryId": "", "advisoryInfo": "", "componentName": "libuuid", "componentVersion": "2.37.4-21.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-6732", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-6732", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2", "componentVersion": "2.9.13-14.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1757", "cveSeverity": "MODERATE", "cveCVSS": 6.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1757", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2", "componentVersion": "2.9.13-14.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0990", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0990", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2", "componentVersion": "2.9.13-14.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2023-45322", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-45322", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2", "componentVersion": "2.9.13-14.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2024-34459", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-34459", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2", "componentVersion": "2.9.13-14.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0989", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0989", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2", "componentVersion": "2.9.13-14.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-27113", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-27113", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2", "componentVersion": "2.9.13-14.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0992", "cveSeverity": "LOW", "cveCVSS": 2.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0992", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2", "componentVersion": "2.9.13-14.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-6170", "cveSeverity": "LOW", "cveCVSS": 2.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-6170", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2", "componentVersion": "2.9.13-14.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-64756", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-64756", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21712", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21712", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-33671", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-33671", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-33750", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-33750", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1527", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1527", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-7458", "cveSeverity": "MODERATE", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-7458", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-62408", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-62408", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-27903", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27903", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21717", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21717", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21713", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21713", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-2581", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-2581", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-29087", "cveSeverity": "MODERATE", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-29087", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21714", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21714", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-33672", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-33672", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-64118", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-64118", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2024-21538", "cveSeverity": "LOW", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-21538", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21716", "cveSeverity": "LOW", "cveCVSS": 3.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21716", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-22036", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-22036", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21715", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21715", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-70873", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-70873", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-47279", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-47279", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5889", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5889", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-64756", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-64756", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-33750", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-33750", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-33671", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-33671", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21712", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21712", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1527", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1527", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-7458", "cveSeverity": "MODERATE", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-7458", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-2581", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-2581", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21713", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21713", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-27903", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27903", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-62408", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-62408", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21717", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21717", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-29087", "cveSeverity": "MODERATE", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-29087", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21714", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21714", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-33672", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-33672", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-64118", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-64118", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2024-21538", "cveSeverity": "LOW", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-21538", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21716", "cveSeverity": "LOW", "cveCVSS": 3.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21716", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-22036", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-22036", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-70873", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-70873", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21715", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21715", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5889", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5889", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-47279", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-47279", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-64756", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-64756", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-33750", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-33750", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21712", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21712", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-33671", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-33671", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1527", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1527", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-7458", "cveSeverity": "MODERATE", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-7458", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-62408", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-62408", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21713", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21713", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-2581", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-2581", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-27903", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27903", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21717", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21717", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-29087", "cveSeverity": "MODERATE", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-29087", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21714", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21714", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-33672", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-33672", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-64118", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-64118", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2024-21538", "cveSeverity": "LOW", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-21538", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21716", "cveSeverity": "LOW", "cveCVSS": 3.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21716", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-22036", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-22036", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-70873", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-70873", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21715", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21715", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-47279", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-47279", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5889", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5889", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2024-4068", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-4068", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-nodemon", "componentVersion": "3.0.1-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-33750", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-33750", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-nodemon", "componentVersion": "3.0.1-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-33671", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-33671", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-nodemon", "componentVersion": "3.0.1-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-27903", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27903", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-nodemon", "componentVersion": "3.0.1-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-33672", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-33672", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-nodemon", "componentVersion": "3.0.1-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5889", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5889", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-nodemon", "componentVersion": "3.0.1-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-64756", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-64756", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-33671", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-33671", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21712", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21712", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-33750", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-33750", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1527", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1527", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-7458", "cveSeverity": "MODERATE", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-7458", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-2581", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-2581", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21717", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21717", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-27903", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27903", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21713", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21713", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-62408", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-62408", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-29087", "cveSeverity": "MODERATE", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-29087", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-33672", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-33672", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21714", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21714", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-64118", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-64118", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2024-21538", "cveSeverity": "LOW", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-21538", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21716", "cveSeverity": "LOW", "cveCVSS": 3.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21716", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-22036", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-22036", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-70873", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-70873", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21715", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21715", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-47279", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-47279", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5889", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5889", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-22185", "cveSeverity": "MODERATE", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-22185", "advisoryId": "", "advisoryInfo": "", "componentName": "openldap", "componentVersion": "2.6.8-4.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28390", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28390", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-31790", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-31790", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28389", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28389", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2024-41996", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-41996", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28388", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28388", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-31789", "cveSeverity": "LOW", "cveCVSS": 5.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-31789", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2024-13176", "cveSeverity": "LOW", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-13176", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-9232", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-9232", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-2673", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-2673", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28390", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28390", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-31790", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-31790", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2024-41996", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-41996", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28388", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28388", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28389", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28389", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-31789", "cveSeverity": "LOW", "cveCVSS": 5.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-31789", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2024-13176", "cveSeverity": "LOW", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-13176", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-9232", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-9232", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-2673", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-2673", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-29111", "cveSeverity": "MODERATE", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-29111", "advisoryId": "", "advisoryInfo": "", "componentName": "systemd-libs", "componentVersion": "252-55.el9_7.8", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4105", "cveSeverity": "MODERATE", "cveCVSS": 6.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4105", "advisoryId": "", "advisoryInfo": "", "componentName": "systemd-libs", "componentVersion": "252-55.el9_7.8", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5704", "cveSeverity": "MODERATE", "cveCVSS": 5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5704", "advisoryId": "", "advisoryInfo": "", "componentName": "tar", "componentVersion": "2:1.34-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-64118", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-64118", "advisoryId": "", "advisoryInfo": "", "componentName": "tar", "componentVersion": "2:1.34-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-33056", "cveSeverity": "MODERATE", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-33056", "advisoryId": "", "advisoryInfo": "", "componentName": "tar", "componentVersion": "2:1.34-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2023-39804", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-39804", "advisoryId": "", "advisoryInfo": "", "componentName": "tar", "componentVersion": "2:1.34-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-34743", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-34743", "advisoryId": "", "advisoryInfo": "", "componentName": "xz-libs", "componentVersion": "5.2.5-8.el9_0", "componentFixedVersion": "" }, { "cveId": "CVE-2023-4156", "cveSeverity": "LOW", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-4156", "advisoryId": "", "advisoryInfo": "", "componentName": "gawk", "componentVersion": "5.1.0-6.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-27943", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-27943", "advisoryId": "", "advisoryInfo": "", "componentName": "libgcc", "componentVersion": "11.5.0-11.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-27943", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-27943", "advisoryId": "", "advisoryInfo": "", "componentName": "libstdc++", "componentVersion": "11.5.0-11.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-13151", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-13151", "advisoryId": "", "advisoryInfo": "", "componentName": "libtasn1", "componentVersion": "4.16.0-9.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2023-50495", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-50495", "advisoryId": "", "advisoryInfo": "", "componentName": "ncurses-base", "componentVersion": "6.2-12.20210508.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2023-50495", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-50495", "advisoryId": "", "advisoryInfo": "", "componentName": "ncurses-libs", "componentVersion": "6.2-12.20210508.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-2673", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-2673", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-fips-provider", "componentVersion": "3.0.7-8.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-2673", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-2673", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-fips-provider-so", "componentVersion": "3.0.7-8.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-41409", "cveSeverity": "LOW", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-41409", "advisoryId": "", "advisoryInfo": "", "componentName": "pcre2", "componentVersion": "10.40-6.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-41409", "cveSeverity": "LOW", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-41409", "advisoryId": "", "advisoryInfo": "", "componentName": "pcre2-syntax", "componentVersion": "10.40-6.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2024-0232", "cveSeverity": "LOW", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-0232", "advisoryId": "", "advisoryInfo": "", "componentName": "sqlite-libs", "componentVersion": "3.34.1-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-70873", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-70873", "advisoryId": "", "advisoryInfo": "", "componentName": "sqlite-libs", "componentVersion": "3.34.1-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-27171", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27171", "advisoryId": "", "advisoryInfo": "", "componentName": "zlib", "componentVersion": "1.2.11-40.el9", "componentFixedVersion": "" } ] } } ACS_IMAGE_SCAN_EYECATCHER_END