running acs-image-check Step: acs-image-check Results: /workspace/source/source/results/acs-image-check Custom root CA variable is not set. Make sure CA trust is established Using rox central endpoint central-rhacs-operator.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com:443 Download roxctl cli roxctl image check ERROR: checking image failed: failed policies found: 1 policies violated that are failing the check Note: Violations are reported for informational purposes only and do not cause the task to fail. Running acs-image-check:report ACS_IMAGE_CHECK_EYECATCHER_BEGIN { "results": [ { "metadata": { "id": "quay.io/rhtap_qe/e2e-tests-dotnet-basic-cjtpbege:on-pr-070ca695e4af8b31ca7814c40406d69328cf7ea5@sha256:a359552317c376c6d89fbf1ea6760fa31d5980fb23b84376337f65d66077d3d8", "additionalInfo": { "name": "quay.io/rhtap_qe/e2e-tests-dotnet-basic-cjtpbege:on-pr-070ca695e4af8b31ca7814c40406d69328cf7ea5@sha256:a359552317c376c6d89fbf1ea6760fa31d5980fb23b84376337f65d66077d3d8", "type": "image" } }, "summary": { "CRITICAL": 0, "HIGH": 1, "LOW": 1, "MEDIUM": 0, "TOTAL": 2 }, "violatedPolicies": [ { "name": "Fixable Severity at least Important", "severity": "HIGH", "description": "Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important", "violation": [ "Fixable CVE-2024-10963 (CVSS 7.4) (severity Important) found in component 'pam' (version 1.3.1-34.el8_10), resolved by version 0:1.3.1-36.el8_10", "Fixable CVE-2024-12718 (CVSS 7.6) (severity Important) found in component 'platform-python' (version 3.6.8-67.el8_10), resolved by version 0:3.6.8-70.el8_10", "Fixable CVE-2024-12718 (CVSS 7.6) (severity Important) found in component 'python3-libs' (version 3.6.8-67.el8_10), resolved by version 0:3.6.8-70.el8_10", "Fixable CVE-2024-56171 (CVSS 8.1) (severity Important) found in component 'libxml2' (version 2.9.7-18.el8_10.1), resolved by version 0:2.9.7-19.el8_10", "Fixable CVE-2025-21171 (CVSS 7.5) (severity Important) found in component 'dotnet-host' (version 9.0.0-1.el8_10), resolved by version 0:9.0.1-1.el8_10", "Fixable CVE-2025-21171 (CVSS 7.5) (severity Important) found in component 'netstandard-targeting-pack-2.1' (version 9.0.100-1.el8_10), resolved by version 0:9.0.102-1.el8_10", "Fixable CVE-2025-21172 (CVSS 7.5) (severity Important) found in component 'dotnet-host' (version 9.0.0-1.el8_10), resolved by version 0:9.0.1-1.el8_10", "Fixable CVE-2025-21172 (CVSS 7.5) (severity Important) found in component 'netstandard-targeting-pack-2.1' (version 9.0.100-1.el8_10), resolved by version 0:9.0.102-1.el8_10", "Fixable CVE-2025-21173 (CVSS 7.3) (severity Important) found in component 'dotnet-host' (version 9.0.0-1.el8_10), resolved by version 0:9.0.1-1.el8_10", "Fixable CVE-2025-21173 (CVSS 7.3) (severity Important) found in component 'netstandard-targeting-pack-2.1' (version 9.0.100-1.el8_10), resolved by version 0:9.0.102-1.el8_10", "Fixable CVE-2025-21176 (CVSS 8.8) (severity Important) found in component 'dotnet-host' (version 9.0.0-1.el8_10), resolved by version 0:9.0.1-1.el8_10", "Fixable CVE-2025-21176 (CVSS 8.8) (severity Important) found in component 'netstandard-targeting-pack-2.1' (version 9.0.100-1.el8_10), resolved by version 0:9.0.102-1.el8_10", "Fixable CVE-2025-24070 (CVSS 7.8) (severity Important) found in component 'dotnet-host' (version 9.0.0-1.el8_10), resolved by version 0:9.0.3-1.el8_10", "Fixable CVE-2025-24070 (CVSS 7.8) (severity Important) found in component 'netstandard-targeting-pack-2.1' (version 9.0.100-1.el8_10), resolved by version 0:9.0.104-1.el8_10", "Fixable CVE-2025-24928 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.7-18.el8_10.1), resolved by version 0:2.9.7-19.el8_10", "Fixable CVE-2025-26646 (CVSS 8) (severity Important) found in component 'dotnet-host' (version 9.0.0-1.el8_10), resolved by version 0:9.0.5-1.el8_10", "Fixable CVE-2025-26646 (CVSS 8) (severity Important) found in component 'netstandard-targeting-pack-2.1' (version 9.0.100-1.el8_10), resolved by version 0:9.0.106-1.el8_10", "Fixable CVE-2025-30399 (CVSS 7.5) (severity Important) found in component 'dotnet-host' (version 9.0.0-1.el8_10), resolved by version 0:9.0.6-1.el8_10", "Fixable CVE-2025-30399 (CVSS 7.5) (severity Important) found in component 'netstandard-targeting-pack-2.1' (version 9.0.100-1.el8_10), resolved by version 0:9.0.107-1.el8_10", "Fixable CVE-2025-4138 (CVSS 7.5) (severity Important) found in component 'platform-python' (version 3.6.8-67.el8_10), resolved by version 0:3.6.8-70.el8_10", "Fixable CVE-2025-4138 (CVSS 7.5) (severity Important) found in component 'python3-libs' (version 3.6.8-67.el8_10), resolved by version 0:3.6.8-70.el8_10", "Fixable CVE-2025-4517 (CVSS 7.6) (severity Important) found in component 'platform-python' (version 3.6.8-67.el8_10), resolved by version 0:3.6.8-70.el8_10", "Fixable CVE-2025-4517 (CVSS 7.6) (severity Important) found in component 'python3-libs' (version 3.6.8-67.el8_10), resolved by version 0:3.6.8-70.el8_10", "Fixable CVE-2025-49794 (CVSS 9.1) (severity Important) found in component 'libxml2' (version 2.9.7-18.el8_10.1), resolved by version 0:2.9.7-21.el8_10.1", "Fixable CVE-2025-49796 (CVSS 9.1) (severity Important) found in component 'libxml2' (version 2.9.7-18.el8_10.1), resolved by version 0:2.9.7-21.el8_10.1", "Fixable CVE-2025-55248 (CVSS 8.2) (severity Important) found in component 'dotnet-host' (version 9.0.0-1.el8_10), resolved by version 0:9.0.10-1.el8_10", "Fixable CVE-2025-55248 (CVSS 8.2) (severity Important) found in component 'netstandard-targeting-pack-2.1' (version 9.0.100-1.el8_10), resolved by version 0:9.0.111-1.el8_10", "Fixable CVE-2025-55315 (CVSS 8.5) (severity Important) found in component 'dotnet-host' (version 9.0.0-1.el8_10), resolved by version 0:9.0.10-1.el8_10", "Fixable CVE-2025-55315 (CVSS 8.5) (severity Important) found in component 'netstandard-targeting-pack-2.1' (version 9.0.100-1.el8_10), resolved by version 0:9.0.111-1.el8_10", "Fixable CVE-2025-5914 (CVSS 7.8) (severity Important) found in component 'libarchive' (version 3.3.3-5.el8), resolved by version 0:3.3.3-6.el8_10", "Fixable CVE-2025-59375 (CVSS 5.3) (severity Important) found in component 'expat' (version 2.2.5-15.el8_10), resolved by version 0:2.5.0-1.el8_10", "Fixable CVE-2025-6020 (CVSS 7.8) (severity Important) found in component 'pam' (version 1.3.1-34.el8_10), resolved by version 0:1.3.1-37.el8_10", "Fixable CVE-2025-6020 (CVSS 7.8) (severity Important) found in component 'pam' (version 1.3.1-34.el8_10), resolved by version 0:1.3.1-38.el8_10", "Fixable CVE-2025-6176 (CVSS 7.5) (severity Important) found in component 'brotli' (version 1.0.6-3.el8), resolved by version 0:1.0.6-4.el8_10", "Fixable CVE-2025-66418 (CVSS 7.5) (severity Important) found in component 'python3-urllib3' (version 1.24.2-8.el8_10), resolved by version 0:1.24.2-9.el8_10", "Fixable CVE-2025-66471 (CVSS 7.5) (severity Important) found in component 'python3-urllib3' (version 1.24.2-8.el8_10), resolved by version 0:1.24.2-9.el8_10", "Fixable CVE-2025-68973 (CVSS 7.8) (severity Important) found in component 'gnupg2' (version 2.2.20-3.el8_6), resolved by version 0:2.2.20-4.el8_10", "Fixable CVE-2025-6965 (CVSS 7.7) (severity Important) found in component 'sqlite-libs' (version 3.26.0-19.el8_9), resolved by version 0:3.26.0-20.el8_10", "Fixable CVE-2025-7425 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.7-18.el8_10.1), resolved by version 0:2.9.7-21.el8_10.2", "Fixable CVE-2025-8941 (CVSS 7.8) (severity Important) found in component 'pam' (version 1.3.1-34.el8_10), resolved by version 0:1.3.1-38.el8_10", "Fixable CVE-2026-21441 (CVSS 7.5) (severity Important) found in component 'python3-urllib3' (version 1.24.2-8.el8_10), resolved by version 0:1.24.2-9.el8_10", "Fixable CVE-2026-26130 (CVSS 7.5) (severity Important) found in component 'dotnet-host' (version 9.0.0-1.el8_10), resolved by version 0:10.0.4-1.el8_10", "Fixable CVE-2026-26130 (CVSS 7.5) (severity Important) found in component 'netstandard-targeting-pack-2.1' (version 9.0.100-1.el8_10), resolved by version 0:9.0.115-1.el8_10", "Fixable CVE-2026-26171 (CVSS 7.5) (severity Important) found in component 'dotnet-host' (version 9.0.0-1.el8_10), resolved by version 0:10.0.6-1.el8_10", "Fixable CVE-2026-26171 (CVSS 7.5) (severity Important) found in component 'netstandard-targeting-pack-2.1' (version 9.0.100-1.el8_10), resolved by version 0:9.0.116-1.el8_10", "Fixable CVE-2026-27135 (CVSS 7.5) (severity Important) found in component 'libnghttp2' (version 1.33.0-6.el8_10.1), resolved by version 0:1.33.0-6.el8_10.2", "Fixable CVE-2026-32178 (CVSS 7.5) (severity Important) found in component 'dotnet-host' (version 9.0.0-1.el8_10), resolved by version 0:10.0.6-1.el8_10", "Fixable CVE-2026-32178 (CVSS 7.5) (severity Important) found in component 'netstandard-targeting-pack-2.1' (version 9.0.100-1.el8_10), resolved by version 0:9.0.116-1.el8_10", "Fixable CVE-2026-32203 (CVSS 7.5) (severity Important) found in component 'dotnet-host' (version 9.0.0-1.el8_10), resolved by version 0:10.0.6-1.el8_10", "Fixable CVE-2026-32203 (CVSS 7.5) (severity Important) found in component 'netstandard-targeting-pack-2.1' (version 9.0.100-1.el8_10), resolved by version 0:9.0.116-1.el8_10", "Fixable CVE-2026-33116 (CVSS 7.5) (severity Important) found in component 'dotnet-host' (version 9.0.0-1.el8_10), resolved by version 0:10.0.6-1.el8_10", "Fixable CVE-2026-33116 (CVSS 7.5) (severity Important) found in component 'netstandard-targeting-pack-2.1' (version 9.0.100-1.el8_10), resolved by version 0:9.0.116-1.el8_10", "Fixable CVE-2026-4424 (CVSS 7.5) (severity Important) found in component 'libarchive' (version 3.3.3-5.el8), resolved by version 0:3.3.3-7.el8_10", "Fixable CVE-2026-4519 (CVSS 7.1) (severity Important) found in component 'platform-python' (version 3.6.8-67.el8_10), resolved by version 0:3.6.8-75.el8_10", "Fixable CVE-2026-4519 (CVSS 7.1) (severity Important) found in component 'python3-libs' (version 3.6.8-67.el8_10), resolved by version 0:3.6.8-75.el8_10" ], "remediation": "Use your package manager to update to a fixed version in future builds or speak with your security team to mitigate the vulnerabilities.", "failingCheck": true }, { "name": "Red Hat Package Manager in Image", "severity": "LOW", "description": "Alert on deployments with components of the Red Hat/Fedora/CentOS package management system.", "violation": [ "Image includes component 'dnf' (version 4.7.0-20.el8)", "Image includes component 'rpm' (version 4.14.3-31.el8)", "Image includes component 'yum' (version 4.7.0-20.el8)" ], "remediation": "Run `rpm -e --nodeps $(rpm -qa '*rpm*' '*dnf*' '*libsolv*' '*hawkey*' 'yum*')` in the image build for production containers.", "failingCheck": false } ] } ], "summary": { "CRITICAL": 0, "HIGH": 1, "LOW": 1, "MEDIUM": 0, "TOTAL": 2 } } ACS_IMAGE_CHECK_EYECATCHER_END running acs-image-scan Step: acs-image-scan Results: /workspace/source/source/results/acs-image-scan Custom root CA variable is not set. Make sure CA trust is established Running acs-image-scan:rox-image-scan Using rox central endpoint central-rhacs-operator.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com:443 Download roxctl cli roxctl image scan {"vulnerabilities":{"critical":0,"high":43,"medium":134,"low":225}} {"result":"SUCCESS","timestamp":"1777044245","note":"Task completed: Refer to Tekton task result SCAN_OUTPUT for found vulnerabilities.","namespace":"default","successes":"0","failures":"0","warnings":"0"} Running acs-image-scan:report ACS_IMAGE_SCAN_EYECATCHER_BEGIN { "result": { "summary": { "CRITICAL": 0, "IMPORTANT": 43, "LOW": 225, "MODERATE": 134, "TOTAL-COMPONENTS": 101, "TOTAL-VULNERABILITIES": 402 }, "vulnerabilities": [ { "cveId": "CVE-2024-38229", "cveSeverity": "IMPORTANT", "cveCVSS": 8.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-38229", "advisoryId": "", "advisoryInfo": "", "componentName": "aspnetcore-runtime-6.0", "componentVersion": "6.0.36-1.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2024-35264", "cveSeverity": "IMPORTANT", "cveCVSS": 8.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-35264", "advisoryId": "", "advisoryInfo": "", "componentName": "aspnetcore-runtime-6.0", "componentVersion": "6.0.36-1.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2022-25881", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-25881", "advisoryId": "", "advisoryInfo": "", "componentName": "aspnetcore-runtime-6.0", "componentVersion": "6.0.36-1.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2024-11831", "cveSeverity": "MODERATE", "cveCVSS": 5.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-11831", "advisoryId": "", "advisoryInfo": "", "componentName": "aspnetcore-runtime-6.0", "componentVersion": "6.0.36-1.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2024-35264", "cveSeverity": "IMPORTANT", "cveCVSS": 8.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-35264", "advisoryId": "", "advisoryInfo": "", "componentName": "aspnetcore-targeting-pack-6.0", "componentVersion": "6.0.36-1.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2024-38229", "cveSeverity": "IMPORTANT", "cveCVSS": 8.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-38229", "advisoryId": "", "advisoryInfo": "", "componentName": "aspnetcore-targeting-pack-6.0", "componentVersion": "6.0.36-1.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2022-25881", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-25881", "advisoryId": "", "advisoryInfo": "", "componentName": "aspnetcore-targeting-pack-6.0", "componentVersion": "6.0.36-1.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2024-11831", "cveSeverity": "MODERATE", "cveCVSS": 5.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-11831", "advisoryId": "", "advisoryInfo": "", "componentName": "aspnetcore-targeting-pack-6.0", "componentVersion": "6.0.36-1.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2025-6176", "cveSeverity": "IMPORTANT", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-6176", "advisoryId": "RHSA-2026:2389", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:2389", "componentName": "brotli", "componentVersion": "1.0.6-3.el8", "componentFixedVersion": "0:1.0.6-4.el8_10" }, { "cveId": "CVE-2024-35264", "cveSeverity": "IMPORTANT", "cveCVSS": 8.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-35264", "advisoryId": "", "advisoryInfo": "", "componentName": "dotnet-apphost-pack-6.0", "componentVersion": "6.0.36-1.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2024-38229", "cveSeverity": "IMPORTANT", "cveCVSS": 8.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-38229", "advisoryId": "", "advisoryInfo": "", "componentName": "dotnet-apphost-pack-6.0", "componentVersion": "6.0.36-1.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2022-25881", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-25881", "advisoryId": "", "advisoryInfo": "", "componentName": "dotnet-apphost-pack-6.0", "componentVersion": "6.0.36-1.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2024-11831", "cveSeverity": "MODERATE", "cveCVSS": 5.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-11831", "advisoryId": "", "advisoryInfo": "", "componentName": "dotnet-apphost-pack-6.0", "componentVersion": "6.0.36-1.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2025-21176", "cveSeverity": "IMPORTANT", "cveCVSS": 8.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-21176", "advisoryId": "RHSA-2025:0382", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:0382", "componentName": "dotnet-host", "componentVersion": "9.0.0-1.el8_10", "componentFixedVersion": "0:9.0.1-1.el8_10" }, { "cveId": "CVE-2025-55315", "cveSeverity": "IMPORTANT", "cveCVSS": 8.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-55315", "advisoryId": "RHSA-2025:18150", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:18150", "componentName": "dotnet-host", "componentVersion": "9.0.0-1.el8_10", "componentFixedVersion": "0:9.0.10-1.el8_10" }, { "cveId": "CVE-2025-55248", "cveSeverity": "IMPORTANT", "cveCVSS": 8.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-55248", "advisoryId": "RHSA-2025:18150", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:18150", "componentName": "dotnet-host", "componentVersion": "9.0.0-1.el8_10", "componentFixedVersion": "0:9.0.10-1.el8_10" }, { "cveId": "CVE-2025-26646", "cveSeverity": "IMPORTANT", "cveCVSS": 8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-26646", "advisoryId": "RHSA-2025:7571", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:7571", "componentName": "dotnet-host", "componentVersion": "9.0.0-1.el8_10", "componentFixedVersion": "0:9.0.5-1.el8_10" }, { "cveId": "CVE-2025-24070", "cveSeverity": "IMPORTANT", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-24070", "advisoryId": "RHSA-2025:2667", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:2667", "componentName": "dotnet-host", "componentVersion": "9.0.0-1.el8_10", "componentFixedVersion": "0:9.0.3-1.el8_10" }, { "cveId": "CVE-2026-32178", "cveSeverity": "IMPORTANT", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-32178", "advisoryId": "RHSA-2026:8473", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:8473", "componentName": "dotnet-host", "componentVersion": "9.0.0-1.el8_10", "componentFixedVersion": "0:10.0.6-1.el8_10" }, { "cveId": "CVE-2026-26171", "cveSeverity": "IMPORTANT", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-26171", "advisoryId": "RHSA-2026:8473", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:8473", "componentName": "dotnet-host", "componentVersion": "9.0.0-1.el8_10", "componentFixedVersion": "0:10.0.6-1.el8_10" }, { "cveId": "CVE-2026-33116", "cveSeverity": "IMPORTANT", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-33116", "advisoryId": "RHSA-2026:8473", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:8473", "componentName": "dotnet-host", "componentVersion": "9.0.0-1.el8_10", "componentFixedVersion": "0:10.0.6-1.el8_10" }, { "cveId": "CVE-2025-21172", "cveSeverity": "IMPORTANT", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-21172", "advisoryId": "RHSA-2025:0382", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:0382", "componentName": "dotnet-host", "componentVersion": "9.0.0-1.el8_10", "componentFixedVersion": "0:9.0.1-1.el8_10" }, { "cveId": "CVE-2025-30399", "cveSeverity": "IMPORTANT", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-30399", "advisoryId": "RHSA-2025:8815", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:8815", "componentName": "dotnet-host", "componentVersion": "9.0.0-1.el8_10", "componentFixedVersion": "0:9.0.6-1.el8_10" }, { "cveId": "CVE-2026-32203", "cveSeverity": "IMPORTANT", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-32203", "advisoryId": "RHSA-2026:8473", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:8473", "componentName": "dotnet-host", "componentVersion": "9.0.0-1.el8_10", "componentFixedVersion": "0:10.0.6-1.el8_10" }, { "cveId": "CVE-2026-26130", "cveSeverity": "IMPORTANT", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-26130", "advisoryId": "RHSA-2026:4458", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:4458", "componentName": "dotnet-host", "componentVersion": "9.0.0-1.el8_10", "componentFixedVersion": "0:10.0.4-1.el8_10" }, { "cveId": "CVE-2025-21171", "cveSeverity": "IMPORTANT", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-21171", "advisoryId": "RHSA-2025:0382", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:0382", "componentName": "dotnet-host", "componentVersion": "9.0.0-1.el8_10", "componentFixedVersion": "0:9.0.1-1.el8_10" }, { "cveId": "CVE-2025-21173", "cveSeverity": "IMPORTANT", "cveCVSS": 7.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-21173", "advisoryId": "RHSA-2025:0382", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:0382", "componentName": "dotnet-host", "componentVersion": "9.0.0-1.el8_10", "componentFixedVersion": "0:9.0.1-1.el8_10" }, { "cveId": "CVE-2026-26127", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-26127", "advisoryId": "RHSA-2026:4458", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:4458", "componentName": "dotnet-host", "componentVersion": "9.0.0-1.el8_10", "componentFixedVersion": "0:10.0.4-1.el8_10" }, { "cveId": "CVE-2025-55247", "cveSeverity": "MODERATE", "cveCVSS": 7.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-55247", "advisoryId": "RHSA-2025:18150", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:18150", "componentName": "dotnet-host", "componentVersion": "9.0.0-1.el8_10", "componentFixedVersion": "0:9.0.10-1.el8_10" }, { "cveId": "CVE-2025-3573", "cveSeverity": "MODERATE", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-3573", "advisoryId": "", "advisoryInfo": "", "componentName": "dotnet-host", "componentVersion": "9.0.0-1.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1647", "cveSeverity": "MODERATE", "cveCVSS": 5.6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1647", "advisoryId": "", "advisoryInfo": "", "componentName": "dotnet-host", "componentVersion": "9.0.0-1.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2024-35264", "cveSeverity": "IMPORTANT", "cveCVSS": 8.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-35264", "advisoryId": "", "advisoryInfo": "", "componentName": "dotnet-hostfxr-6.0", "componentVersion": "6.0.36-1.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2024-38229", "cveSeverity": "IMPORTANT", "cveCVSS": 8.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-38229", "advisoryId": "", "advisoryInfo": "", "componentName": "dotnet-hostfxr-6.0", "componentVersion": "6.0.36-1.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2022-25881", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-25881", "advisoryId": "", "advisoryInfo": "", "componentName": "dotnet-hostfxr-6.0", "componentVersion": "6.0.36-1.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2024-11831", "cveSeverity": "MODERATE", "cveCVSS": 5.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-11831", "advisoryId": "", "advisoryInfo": "", "componentName": "dotnet-hostfxr-6.0", "componentVersion": "6.0.36-1.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2024-35264", "cveSeverity": "IMPORTANT", "cveCVSS": 8.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-35264", "advisoryId": "", "advisoryInfo": "", "componentName": "dotnet-runtime-6.0", "componentVersion": "6.0.36-1.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2024-38229", "cveSeverity": "IMPORTANT", "cveCVSS": 8.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-38229", "advisoryId": "", "advisoryInfo": "", "componentName": "dotnet-runtime-6.0", "componentVersion": "6.0.36-1.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2022-25881", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-25881", "advisoryId": "", "advisoryInfo": "", "componentName": "dotnet-runtime-6.0", "componentVersion": "6.0.36-1.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2024-11831", "cveSeverity": "MODERATE", "cveCVSS": 5.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-11831", "advisoryId": "", "advisoryInfo": "", "componentName": "dotnet-runtime-6.0", "componentVersion": "6.0.36-1.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2024-35264", "cveSeverity": "IMPORTANT", "cveCVSS": 8.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-35264", "advisoryId": "", "advisoryInfo": "", "componentName": "dotnet-sdk-6.0", "componentVersion": "6.0.136-1.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2024-38229", "cveSeverity": "IMPORTANT", "cveCVSS": 8.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-38229", "advisoryId": "", "advisoryInfo": "", "componentName": "dotnet-sdk-6.0", "componentVersion": "6.0.136-1.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2022-25881", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-25881", "advisoryId": "", "advisoryInfo": "", "componentName": "dotnet-sdk-6.0", "componentVersion": "6.0.136-1.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2024-11831", "cveSeverity": "MODERATE", "cveCVSS": 5.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-11831", "advisoryId": "", "advisoryInfo": "", "componentName": "dotnet-sdk-6.0", "componentVersion": "6.0.136-1.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2024-35264", "cveSeverity": "IMPORTANT", "cveCVSS": 8.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-35264", "advisoryId": "", "advisoryInfo": "", "componentName": "dotnet-targeting-pack-6.0", "componentVersion": "6.0.36-1.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2024-38229", "cveSeverity": "IMPORTANT", "cveCVSS": 8.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-38229", "advisoryId": "", "advisoryInfo": "", "componentName": "dotnet-targeting-pack-6.0", "componentVersion": "6.0.36-1.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2022-25881", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-25881", "advisoryId": "", "advisoryInfo": "", "componentName": "dotnet-targeting-pack-6.0", "componentVersion": "6.0.36-1.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2024-11831", "cveSeverity": "MODERATE", "cveCVSS": 5.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-11831", "advisoryId": "", "advisoryInfo": "", "componentName": "dotnet-targeting-pack-6.0", "componentVersion": "6.0.36-1.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2024-35264", "cveSeverity": "IMPORTANT", "cveCVSS": 8.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-35264", "advisoryId": "", "advisoryInfo": "", "componentName": "dotnet-templates-6.0", "componentVersion": "6.0.136-1.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2024-38229", "cveSeverity": "IMPORTANT", "cveCVSS": 8.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-38229", "advisoryId": "", "advisoryInfo": "", "componentName": "dotnet-templates-6.0", "componentVersion": "6.0.136-1.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2022-25881", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-25881", "advisoryId": "", "advisoryInfo": "", "componentName": "dotnet-templates-6.0", "componentVersion": "6.0.136-1.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2024-11831", "cveSeverity": "MODERATE", "cveCVSS": 5.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-11831", "advisoryId": "", "advisoryInfo": "", "componentName": "dotnet-templates-6.0", "componentVersion": "6.0.136-1.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2025-59375", "cveSeverity": "IMPORTANT", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-59375", "advisoryId": "RHSA-2025:21776", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:21776", "componentName": "expat", "componentVersion": "2.2.5-15.el8_10", "componentFixedVersion": "0:2.5.0-1.el8_10" }, { "cveId": "CVE-2024-8176", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-8176", "advisoryId": "RHSA-2025:3913", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:3913", "componentName": "expat", "componentVersion": "2.2.5-15.el8_10", "componentFixedVersion": "0:2.2.5-17.el8_10" }, { "cveId": "CVE-2024-28757", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-28757", "advisoryId": "RHSA-2025:21776", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:21776", "componentName": "expat", "componentVersion": "2.2.5-15.el8_10", "componentFixedVersion": "0:2.5.0-1.el8_10" }, { "cveId": "CVE-2022-23990", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-23990", "advisoryId": "RHSA-2025:21776", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:21776", "componentName": "expat", "componentVersion": "2.2.5-15.el8_10", "componentFixedVersion": "0:2.5.0-1.el8_10" }, { "cveId": "CVE-2026-32776", "cveSeverity": "MODERATE", "cveCVSS": 6.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-32776", "advisoryId": "", "advisoryInfo": "", "componentName": "expat", "componentVersion": "2.2.5-15.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2024-50602", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-50602", "advisoryId": "RHSA-2024:9502", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2024:9502", "componentName": "expat", "componentVersion": "2.2.5-15.el8_10", "componentFixedVersion": "0:2.2.5-16.el8_10" }, { "cveId": "CVE-2026-32778", "cveSeverity": "MODERATE", "cveCVSS": 5.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-32778", "advisoryId": "", "advisoryInfo": "", "componentName": "expat", "componentVersion": "2.2.5-15.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-32777", "cveSeverity": "MODERATE", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-32777", "advisoryId": "", "advisoryInfo": "", "componentName": "expat", "componentVersion": "2.2.5-15.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-41080", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-41080", "advisoryId": "", "advisoryInfo": "", "componentName": "expat", "componentVersion": "2.2.5-15.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66382", "cveSeverity": "LOW", "cveCVSS": 2.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66382", "advisoryId": "", "advisoryInfo": "", "componentName": "expat", "componentVersion": "2.2.5-15.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-24515", "cveSeverity": "LOW", "cveCVSS": 2.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-24515", "advisoryId": "", "advisoryInfo": "", "componentName": "expat", "componentVersion": "2.2.5-15.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4046", "cveSeverity": "IMPORTANT", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4046", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc", "componentVersion": "2.28-251.el8_10.5", "componentFixedVersion": "" }, { "cveId": "CVE-2025-4802", "cveSeverity": "MODERATE", "cveCVSS": 7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-4802", "advisoryId": "RHSA-2025:8686", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:8686", "componentName": "glibc", "componentVersion": "2.28-251.el8_10.5", "componentFixedVersion": "0:2.28-251.el8_10.22" }, { "cveId": "CVE-2026-4437", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4437", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc", "componentVersion": "2.28-251.el8_10.5", "componentFixedVersion": "" }, { "cveId": "CVE-2025-0395", "cveSeverity": "MODERATE", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-0395", "advisoryId": "RHSA-2025:3828", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:3828", "componentName": "glibc", "componentVersion": "2.28-251.el8_10.5", "componentFixedVersion": "0:2.28-251.el8_10.16" }, { "cveId": "CVE-2026-0915", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0915", "advisoryId": "RHSA-2026:4772", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:4772", "componentName": "glibc", "componentVersion": "2.28-251.el8_10.5", "componentFixedVersion": "0:2.28-251.el8_10.31" }, { "cveId": "CVE-2025-8058", "cveSeverity": "MODERATE", "cveCVSS": 4.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-8058", "advisoryId": "RHSA-2025:12980", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:12980", "componentName": "glibc", "componentVersion": "2.28-251.el8_10.5", "componentFixedVersion": "0:2.28-251.el8_10.25" }, { "cveId": "CVE-2025-15281", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-15281", "advisoryId": "RHSA-2026:4772", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:4772", "componentName": "glibc", "componentVersion": "2.28-251.el8_10.5", "componentFixedVersion": "0:2.28-251.el8_10.31" }, { "cveId": "CVE-2026-4438", "cveSeverity": "LOW", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4438", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc", "componentVersion": "2.28-251.el8_10.5", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4046", "cveSeverity": "IMPORTANT", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4046", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-common", "componentVersion": "2.28-251.el8_10.5", "componentFixedVersion": "" }, { "cveId": "CVE-2025-4802", "cveSeverity": "MODERATE", "cveCVSS": 7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-4802", "advisoryId": "RHSA-2025:8686", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:8686", "componentName": "glibc-common", "componentVersion": "2.28-251.el8_10.5", "componentFixedVersion": "0:2.28-251.el8_10.22" }, { "cveId": "CVE-2026-4437", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4437", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-common", "componentVersion": "2.28-251.el8_10.5", "componentFixedVersion": "" }, { "cveId": "CVE-2025-0395", "cveSeverity": "MODERATE", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-0395", "advisoryId": "RHSA-2025:3828", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:3828", "componentName": "glibc-common", "componentVersion": "2.28-251.el8_10.5", "componentFixedVersion": "0:2.28-251.el8_10.16" }, { "cveId": "CVE-2026-0915", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0915", "advisoryId": "RHSA-2026:4772", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:4772", "componentName": "glibc-common", "componentVersion": "2.28-251.el8_10.5", "componentFixedVersion": "0:2.28-251.el8_10.31" }, { "cveId": "CVE-2025-8058", "cveSeverity": "MODERATE", "cveCVSS": 4.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-8058", "advisoryId": "RHSA-2025:12980", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:12980", "componentName": "glibc-common", "componentVersion": "2.28-251.el8_10.5", "componentFixedVersion": "0:2.28-251.el8_10.25" }, { "cveId": "CVE-2025-15281", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-15281", "advisoryId": "RHSA-2026:4772", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:4772", "componentName": "glibc-common", "componentVersion": "2.28-251.el8_10.5", "componentFixedVersion": "0:2.28-251.el8_10.31" }, { "cveId": "CVE-2026-4438", "cveSeverity": "LOW", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4438", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-common", "componentVersion": "2.28-251.el8_10.5", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4046", "cveSeverity": "IMPORTANT", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4046", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-langpack-en", "componentVersion": "2.28-251.el8_10.5", "componentFixedVersion": "" }, { "cveId": "CVE-2025-4802", "cveSeverity": "MODERATE", "cveCVSS": 7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-4802", "advisoryId": "RHSA-2025:8686", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:8686", "componentName": "glibc-langpack-en", "componentVersion": "2.28-251.el8_10.5", "componentFixedVersion": "0:2.28-251.el8_10.22" }, { "cveId": "CVE-2026-4437", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4437", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-langpack-en", "componentVersion": "2.28-251.el8_10.5", "componentFixedVersion": "" }, { "cveId": "CVE-2025-0395", "cveSeverity": "MODERATE", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-0395", "advisoryId": "RHSA-2025:3828", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:3828", "componentName": "glibc-langpack-en", "componentVersion": "2.28-251.el8_10.5", "componentFixedVersion": "0:2.28-251.el8_10.16" }, { "cveId": "CVE-2026-0915", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0915", "advisoryId": "RHSA-2026:4772", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:4772", "componentName": "glibc-langpack-en", "componentVersion": "2.28-251.el8_10.5", "componentFixedVersion": "0:2.28-251.el8_10.31" }, { "cveId": "CVE-2025-8058", "cveSeverity": "MODERATE", "cveCVSS": 4.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-8058", "advisoryId": "RHSA-2025:12980", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:12980", "componentName": "glibc-langpack-en", "componentVersion": "2.28-251.el8_10.5", "componentFixedVersion": "0:2.28-251.el8_10.25" }, { "cveId": "CVE-2025-15281", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-15281", "advisoryId": "RHSA-2026:4772", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:4772", "componentName": "glibc-langpack-en", "componentVersion": "2.28-251.el8_10.5", "componentFixedVersion": "0:2.28-251.el8_10.31" }, { "cveId": "CVE-2026-4438", "cveSeverity": "LOW", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4438", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-langpack-en", "componentVersion": "2.28-251.el8_10.5", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4046", "cveSeverity": "IMPORTANT", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4046", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-minimal-langpack", "componentVersion": "2.28-251.el8_10.5", "componentFixedVersion": "" }, { "cveId": "CVE-2025-4802", "cveSeverity": "MODERATE", "cveCVSS": 7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-4802", "advisoryId": "RHSA-2025:8686", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:8686", "componentName": "glibc-minimal-langpack", "componentVersion": "2.28-251.el8_10.5", "componentFixedVersion": "0:2.28-251.el8_10.22" }, { "cveId": "CVE-2026-4437", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4437", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-minimal-langpack", "componentVersion": "2.28-251.el8_10.5", "componentFixedVersion": "" }, { "cveId": "CVE-2025-0395", "cveSeverity": "MODERATE", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-0395", "advisoryId": "RHSA-2025:3828", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:3828", "componentName": "glibc-minimal-langpack", "componentVersion": "2.28-251.el8_10.5", "componentFixedVersion": "0:2.28-251.el8_10.16" }, { "cveId": "CVE-2026-0915", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0915", "advisoryId": "RHSA-2026:4772", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:4772", "componentName": "glibc-minimal-langpack", "componentVersion": "2.28-251.el8_10.5", "componentFixedVersion": "0:2.28-251.el8_10.31" }, { "cveId": "CVE-2025-8058", "cveSeverity": "MODERATE", "cveCVSS": 4.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-8058", "advisoryId": "RHSA-2025:12980", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:12980", "componentName": "glibc-minimal-langpack", "componentVersion": "2.28-251.el8_10.5", "componentFixedVersion": "0:2.28-251.el8_10.25" }, { "cveId": "CVE-2025-15281", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-15281", "advisoryId": "RHSA-2026:4772", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:4772", "componentName": "glibc-minimal-langpack", "componentVersion": "2.28-251.el8_10.5", "componentFixedVersion": "0:2.28-251.el8_10.31" }, { "cveId": "CVE-2026-4438", "cveSeverity": "LOW", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4438", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-minimal-langpack", "componentVersion": "2.28-251.el8_10.5", "componentFixedVersion": "" }, { "cveId": "CVE-2025-68973", "cveSeverity": "IMPORTANT", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-68973", "advisoryId": "RHSA-2026:0728", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:0728", "componentName": "gnupg2", "componentVersion": "2.2.20-3.el8_6", "componentFixedVersion": "0:2.2.20-4.el8_10" }, { "cveId": "CVE-2025-68972", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-68972", "advisoryId": "", "advisoryInfo": "", "componentName": "gnupg2", "componentVersion": "2.2.20-3.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3219", "cveSeverity": "LOW", "cveCVSS": 6.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3219", "advisoryId": "", "advisoryInfo": "", "componentName": "gnupg2", "componentVersion": "2.2.20-3.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2026-24883", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-24883", "advisoryId": "", "advisoryInfo": "", "componentName": "gnupg2", "componentVersion": "2.2.20-3.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2025-30258", "cveSeverity": "LOW", "cveCVSS": 2.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-30258", "advisoryId": "", "advisoryInfo": "", "componentName": "gnupg2", "componentVersion": "2.2.20-3.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5914", "cveSeverity": "IMPORTANT", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5914", "advisoryId": "RHSA-2025:14135", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:14135", "componentName": "libarchive", "componentVersion": "3.3.3-5.el8", "componentFixedVersion": "0:3.3.3-6.el8_10" }, { "cveId": "CVE-2026-4424", "cveSeverity": "IMPORTANT", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4424", "advisoryId": "RHSA-2026:8534", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:8534", "componentName": "libarchive", "componentVersion": "3.3.3-5.el8", "componentFixedVersion": "0:3.3.3-7.el8_10" }, { "cveId": "CVE-2026-5121", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5121", "advisoryId": "RHSA-2026:8534", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:8534", "componentName": "libarchive", "componentVersion": "3.3.3-5.el8", "componentFixedVersion": "0:3.3.3-7.el8_10" }, { "cveId": "CVE-2026-4426", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4426", "advisoryId": "", "advisoryInfo": "", "componentName": "libarchive", "componentVersion": "3.3.3-5.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5745", "cveSeverity": "MODERATE", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5745", "advisoryId": "", "advisoryInfo": "", "componentName": "libarchive", "componentVersion": "3.3.3-5.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-60753", "cveSeverity": "MODERATE", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-60753", "advisoryId": "", "advisoryInfo": "", "componentName": "libarchive", "componentVersion": "3.3.3-5.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2024-57970", "cveSeverity": "MODERATE", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-57970", "advisoryId": "", "advisoryInfo": "", "componentName": "libarchive", "componentVersion": "3.3.3-5.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-25724", "cveSeverity": "MODERATE", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-25724", "advisoryId": "", "advisoryInfo": "", "componentName": "libarchive", "componentVersion": "3.3.3-5.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5915", "cveSeverity": "LOW", "cveCVSS": 6.6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5915", "advisoryId": "", "advisoryInfo": "", "componentName": "libarchive", "componentVersion": "3.3.3-5.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2018-1000880", "cveSeverity": "LOW", "cveCVSS": 4.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2018-1000880", "advisoryId": "", "advisoryInfo": "", "componentName": "libarchive", "componentVersion": "3.3.3-5.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2018-1000879", "cveSeverity": "LOW", "cveCVSS": 4.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2018-1000879", "advisoryId": "", "advisoryInfo": "", "componentName": "libarchive", "componentVersion": "3.3.3-5.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5916", "cveSeverity": "LOW", "cveCVSS": 3.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5916", "advisoryId": "", "advisoryInfo": "", "componentName": "libarchive", "componentVersion": "3.3.3-5.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5918", "cveSeverity": "LOW", "cveCVSS": 3.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5918", "advisoryId": "", "advisoryInfo": "", "componentName": "libarchive", "componentVersion": "3.3.3-5.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1632", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1632", "advisoryId": "", "advisoryInfo": "", "componentName": "libarchive", "componentVersion": "3.3.3-5.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5917", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5917", "advisoryId": "", "advisoryInfo": "", "componentName": "libarchive", "componentVersion": "3.3.3-5.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4878", "cveSeverity": "IMPORTANT", "cveCVSS": 6.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4878", "advisoryId": "", "advisoryInfo": "", "componentName": "libcap", "componentVersion": "2.48-6.el8_9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-27135", "cveSeverity": "IMPORTANT", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27135", "advisoryId": "RHSA-2026:7667", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:7667", "componentName": "libnghttp2", "componentVersion": "1.33.0-6.el8_10.1", "componentFixedVersion": "0:1.33.0-6.el8_10.2" }, { "cveId": "CVE-2025-49796", "cveSeverity": "IMPORTANT", "cveCVSS": 9.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-49796", "advisoryId": "RHSA-2025:10698", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:10698", "componentName": "libxml2", "componentVersion": "2.9.7-18.el8_10.1", "componentFixedVersion": "0:2.9.7-21.el8_10.1" }, { "cveId": "CVE-2025-49794", "cveSeverity": "IMPORTANT", "cveCVSS": 9.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-49794", "advisoryId": "RHSA-2025:10698", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:10698", "componentName": "libxml2", "componentVersion": "2.9.7-18.el8_10.1", "componentFixedVersion": "0:2.9.7-21.el8_10.1" }, { "cveId": "CVE-2024-56171", "cveSeverity": "IMPORTANT", "cveCVSS": 8.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-56171", "advisoryId": "RHSA-2025:2686", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:2686", "componentName": "libxml2", "componentVersion": "2.9.7-18.el8_10.1", "componentFixedVersion": "0:2.9.7-19.el8_10" }, { "cveId": "CVE-2025-24928", "cveSeverity": "IMPORTANT", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-24928", "advisoryId": "RHSA-2025:2686", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:2686", "componentName": "libxml2", "componentVersion": "2.9.7-18.el8_10.1", "componentFixedVersion": "0:2.9.7-19.el8_10" }, { "cveId": "CVE-2025-7425", "cveSeverity": "IMPORTANT", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-7425", "advisoryId": "RHSA-2025:12450", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:12450", "componentName": "libxml2", "componentVersion": "2.9.7-18.el8_10.1", "componentFixedVersion": "0:2.9.7-21.el8_10.2" }, { "cveId": "CVE-2025-6021", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-6021", "advisoryId": "RHSA-2025:10698", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:10698", "componentName": "libxml2", "componentVersion": "2.9.7-18.el8_10.1", "componentFixedVersion": "0:2.9.7-21.el8_10.1" }, { "cveId": "CVE-2025-32415", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-32415", "advisoryId": "RHSA-2025:13203", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:13203", "componentName": "libxml2", "componentVersion": "2.9.7-18.el8_10.1", "componentFixedVersion": "0:2.9.7-21.el8_10.3" }, { "cveId": "CVE-2025-9714", "cveSeverity": "MODERATE", "cveCVSS": 6.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-9714", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2", "componentVersion": "2.9.7-18.el8_10.1", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1757", "cveSeverity": "MODERATE", "cveCVSS": 6.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1757", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2", "componentVersion": "2.9.7-18.el8_10.1", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0990", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0990", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2", "componentVersion": "2.9.7-18.el8_10.1", "componentFixedVersion": "" }, { "cveId": "CVE-2022-49043", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-49043", "advisoryId": "RHSA-2025:1517", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:1517", "componentName": "libxml2", "componentVersion": "2.9.7-18.el8_10.1", "componentFixedVersion": "0:2.9.7-18.el8_10.2" }, { "cveId": "CVE-2025-32414", "cveSeverity": "MODERATE", "cveCVSS": 5.6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-32414", "advisoryId": "RHSA-2025:8958", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:8958", "componentName": "libxml2", "componentVersion": "2.9.7-18.el8_10.1", "componentFixedVersion": "0:2.9.7-20.el8_10" }, { "cveId": "CVE-2023-45322", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-45322", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2", "componentVersion": "2.9.7-18.el8_10.1", "componentFixedVersion": "" }, { "cveId": "CVE-2024-34459", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-34459", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2", "componentVersion": "2.9.7-18.el8_10.1", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0989", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0989", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2", "componentVersion": "2.9.7-18.el8_10.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-27113", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-27113", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2", "componentVersion": "2.9.7-18.el8_10.1", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0992", "cveSeverity": "LOW", "cveCVSS": 2.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0992", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2", "componentVersion": "2.9.7-18.el8_10.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-6170", "cveSeverity": "LOW", "cveCVSS": 2.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-6170", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2", "componentVersion": "2.9.7-18.el8_10.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-21176", "cveSeverity": "IMPORTANT", "cveCVSS": 8.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-21176", "advisoryId": "RHSA-2025:0382", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:0382", "componentName": "netstandard-targeting-pack-2.1", "componentVersion": "9.0.100-1.el8_10", "componentFixedVersion": "0:9.0.102-1.el8_10" }, { "cveId": "CVE-2025-55315", "cveSeverity": "IMPORTANT", "cveCVSS": 8.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-55315", "advisoryId": "RHSA-2025:18150", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:18150", "componentName": "netstandard-targeting-pack-2.1", "componentVersion": "9.0.100-1.el8_10", "componentFixedVersion": "0:9.0.111-1.el8_10" }, { "cveId": "CVE-2025-55248", "cveSeverity": "IMPORTANT", "cveCVSS": 8.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-55248", "advisoryId": "RHSA-2025:18150", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:18150", "componentName": "netstandard-targeting-pack-2.1", "componentVersion": "9.0.100-1.el8_10", "componentFixedVersion": "0:9.0.111-1.el8_10" }, { "cveId": "CVE-2025-26646", "cveSeverity": "IMPORTANT", "cveCVSS": 8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-26646", "advisoryId": "RHSA-2025:7571", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:7571", "componentName": "netstandard-targeting-pack-2.1", "componentVersion": "9.0.100-1.el8_10", "componentFixedVersion": "0:9.0.106-1.el8_10" }, { "cveId": "CVE-2025-24070", "cveSeverity": "IMPORTANT", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-24070", "advisoryId": "RHSA-2025:2667", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:2667", "componentName": "netstandard-targeting-pack-2.1", "componentVersion": "9.0.100-1.el8_10", "componentFixedVersion": "0:9.0.104-1.el8_10" }, { "cveId": "CVE-2026-32178", "cveSeverity": "IMPORTANT", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-32178", "advisoryId": "RHSA-2026:8475", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:8475", "componentName": "netstandard-targeting-pack-2.1", "componentVersion": "9.0.100-1.el8_10", "componentFixedVersion": "0:9.0.116-1.el8_10" }, { "cveId": "CVE-2026-33116", "cveSeverity": "IMPORTANT", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-33116", "advisoryId": "RHSA-2026:8475", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:8475", "componentName": "netstandard-targeting-pack-2.1", "componentVersion": "9.0.100-1.el8_10", "componentFixedVersion": "0:9.0.116-1.el8_10" }, { "cveId": "CVE-2026-26130", "cveSeverity": "IMPORTANT", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-26130", "advisoryId": "RHSA-2026:4443", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:4443", "componentName": "netstandard-targeting-pack-2.1", "componentVersion": "9.0.100-1.el8_10", "componentFixedVersion": "0:9.0.115-1.el8_10" }, { "cveId": "CVE-2026-26171", "cveSeverity": "IMPORTANT", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-26171", "advisoryId": "RHSA-2026:8475", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:8475", "componentName": "netstandard-targeting-pack-2.1", "componentVersion": "9.0.100-1.el8_10", "componentFixedVersion": "0:9.0.116-1.el8_10" }, { "cveId": "CVE-2025-21172", "cveSeverity": "IMPORTANT", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-21172", "advisoryId": "RHSA-2025:0382", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:0382", "componentName": "netstandard-targeting-pack-2.1", "componentVersion": "9.0.100-1.el8_10", "componentFixedVersion": "0:9.0.102-1.el8_10" }, { "cveId": "CVE-2025-21171", "cveSeverity": "IMPORTANT", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-21171", "advisoryId": "RHSA-2025:0382", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:0382", "componentName": "netstandard-targeting-pack-2.1", "componentVersion": "9.0.100-1.el8_10", "componentFixedVersion": "0:9.0.102-1.el8_10" }, { "cveId": "CVE-2026-32203", "cveSeverity": "IMPORTANT", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-32203", "advisoryId": "RHSA-2026:8475", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:8475", "componentName": "netstandard-targeting-pack-2.1", "componentVersion": "9.0.100-1.el8_10", "componentFixedVersion": "0:9.0.116-1.el8_10" }, { "cveId": "CVE-2025-30399", "cveSeverity": "IMPORTANT", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-30399", "advisoryId": "RHSA-2025:8815", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:8815", "componentName": "netstandard-targeting-pack-2.1", "componentVersion": "9.0.100-1.el8_10", "componentFixedVersion": "0:9.0.107-1.el8_10" }, { "cveId": "CVE-2025-21173", "cveSeverity": "IMPORTANT", "cveCVSS": 7.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-21173", "advisoryId": "RHSA-2025:0382", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:0382", "componentName": "netstandard-targeting-pack-2.1", "componentVersion": "9.0.100-1.el8_10", "componentFixedVersion": "0:9.0.102-1.el8_10" }, { "cveId": "CVE-2026-26127", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-26127", "advisoryId": "RHSA-2026:4443", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:4443", "componentName": "netstandard-targeting-pack-2.1", "componentVersion": "9.0.100-1.el8_10", "componentFixedVersion": "0:9.0.115-1.el8_10" }, { "cveId": "CVE-2025-55247", "cveSeverity": "MODERATE", "cveCVSS": 7.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-55247", "advisoryId": "RHSA-2025:18150", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:18150", "componentName": "netstandard-targeting-pack-2.1", "componentVersion": "9.0.100-1.el8_10", "componentFixedVersion": "0:9.0.111-1.el8_10" }, { "cveId": "CVE-2025-3573", "cveSeverity": "MODERATE", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-3573", "advisoryId": "", "advisoryInfo": "", "componentName": "netstandard-targeting-pack-2.1", "componentVersion": "9.0.100-1.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1647", "cveSeverity": "MODERATE", "cveCVSS": 5.6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1647", "advisoryId": "", "advisoryInfo": "", "componentName": "netstandard-targeting-pack-2.1", "componentVersion": "9.0.100-1.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2025-8941", "cveSeverity": "IMPORTANT", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-8941", "advisoryId": "RHSA-2025:14557", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:14557", "componentName": "pam", "componentVersion": "1.3.1-34.el8_10", "componentFixedVersion": "0:1.3.1-38.el8_10" }, { "cveId": "CVE-2025-6020", "cveSeverity": "IMPORTANT", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-6020", "advisoryId": "RHSA-2025:10027", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:10027", "componentName": "pam", "componentVersion": "1.3.1-34.el8_10", "componentFixedVersion": "0:1.3.1-37.el8_10" }, { "cveId": "CVE-2025-6020", "cveSeverity": "IMPORTANT", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-6020", "advisoryId": "RHSA-2025:14557", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:14557", "componentName": "pam", "componentVersion": "1.3.1-34.el8_10", "componentFixedVersion": "0:1.3.1-38.el8_10" }, { "cveId": "CVE-2024-10963", "cveSeverity": "IMPORTANT", "cveCVSS": 7.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-10963", "advisoryId": "RHSA-2024:10379", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2024:10379", "componentName": "pam", "componentVersion": "1.3.1-34.el8_10", "componentFixedVersion": "0:1.3.1-36.el8_10" }, { "cveId": "CVE-2024-10041", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-10041", "advisoryId": "RHSA-2024:10379", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2024:10379", "componentName": "pam", "componentVersion": "1.3.1-34.el8_10", "componentFixedVersion": "0:1.3.1-36.el8_10" }, { "cveId": "CVE-2026-6100", "cveSeverity": "IMPORTANT", "cveCVSS": 8.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-6100", "advisoryId": "", "advisoryInfo": "", "componentName": "platform-python", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2025-4517", "cveSeverity": "IMPORTANT", "cveCVSS": 7.6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-4517", "advisoryId": "RHSA-2025:10128", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:10128", "componentName": "platform-python", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "0:3.6.8-70.el8_10" }, { "cveId": "CVE-2024-12718", "cveSeverity": "IMPORTANT", "cveCVSS": 7.6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-12718", "advisoryId": "RHSA-2025:10128", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:10128", "componentName": "platform-python", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "0:3.6.8-70.el8_10" }, { "cveId": "CVE-2025-4138", "cveSeverity": "IMPORTANT", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-4138", "advisoryId": "RHSA-2025:10128", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:10128", "componentName": "platform-python", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "0:3.6.8-70.el8_10" }, { "cveId": "CVE-2026-4786", "cveSeverity": "IMPORTANT", "cveCVSS": 7.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4786", "advisoryId": "", "advisoryInfo": "", "componentName": "platform-python", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4519", "cveSeverity": "IMPORTANT", "cveCVSS": 7.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4519", "advisoryId": "RHSA-2026:6473", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:6473", "componentName": "platform-python", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "0:3.6.8-75.el8_10" }, { "cveId": "CVE-2025-12084", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-12084", "advisoryId": "RHSA-2026:1631", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:1631", "componentName": "platform-python", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "0:3.6.8-72.el8_10" }, { "cveId": "CVE-2025-4435", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-4435", "advisoryId": "RHSA-2025:10128", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:10128", "componentName": "platform-python", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "0:3.6.8-70.el8_10" }, { "cveId": "CVE-2025-8194", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-8194", "advisoryId": "RHSA-2025:14560", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:14560", "componentName": "platform-python", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "0:3.6.8-71.el8_10" }, { "cveId": "CVE-2025-4330", "cveSeverity": "MODERATE", "cveCVSS": 7.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-4330", "advisoryId": "RHSA-2025:10128", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:10128", "componentName": "platform-python", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "0:3.6.8-70.el8_10" }, { "cveId": "CVE-2026-1299", "cveSeverity": "MODERATE", "cveCVSS": 7.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1299", "advisoryId": "RHSA-2026:2128", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:2128", "componentName": "platform-python", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "0:3.6.8-73.el8_10" }, { "cveId": "CVE-2025-15366", "cveSeverity": "MODERATE", "cveCVSS": 7.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-15366", "advisoryId": "RHSA-2026:2128", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:2128", "componentName": "platform-python", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "0:3.6.8-73.el8_10" }, { "cveId": "CVE-2025-15367", "cveSeverity": "MODERATE", "cveCVSS": 7.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-15367", "advisoryId": "RHSA-2026:2128", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:2128", "componentName": "platform-python", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "0:3.6.8-73.el8_10" }, { "cveId": "CVE-2025-0938", "cveSeverity": "MODERATE", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-0938", "advisoryId": "RHSA-2026:5588", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:5588", "componentName": "platform-python", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "0:3.6.8-74.el8_10" }, { "cveId": "CVE-2024-9287", "cveSeverity": "MODERATE", "cveCVSS": 6.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-9287", "advisoryId": "RHSA-2024:10779", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2024:10779", "componentName": "platform-python", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "0:3.6.8-69.el8_10" }, { "cveId": "CVE-2026-5713", "cveSeverity": "MODERATE", "cveCVSS": 6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5713", "advisoryId": "", "advisoryInfo": "", "componentName": "platform-python", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2025-13837", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-13837", "advisoryId": "", "advisoryInfo": "", "componentName": "platform-python", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4224", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4224", "advisoryId": "", "advisoryInfo": "", "componentName": "platform-python", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3644", "cveSeverity": "MODERATE", "cveCVSS": 5.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3644", "advisoryId": "", "advisoryInfo": "", "componentName": "platform-python", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2025-12781", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-12781", "advisoryId": "", "advisoryInfo": "", "componentName": "platform-python", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2025-4516", "cveSeverity": "MODERATE", "cveCVSS": 5.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-4516", "advisoryId": "", "advisoryInfo": "", "componentName": "platform-python", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0672", "cveSeverity": "MODERATE", "cveCVSS": 4.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0672", "advisoryId": "", "advisoryInfo": "", "componentName": "platform-python", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2025-15282", "cveSeverity": "MODERATE", "cveCVSS": 4.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-15282", "advisoryId": "", "advisoryInfo": "", "componentName": "platform-python", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1502", "cveSeverity": "MODERATE", "cveCVSS": 4.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1502", "advisoryId": "", "advisoryInfo": "", "componentName": "platform-python", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11468", "cveSeverity": "MODERATE", "cveCVSS": 4.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11468", "advisoryId": "", "advisoryInfo": "", "componentName": "platform-python", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0865", "cveSeverity": "MODERATE", "cveCVSS": 4.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0865", "advisoryId": "RHSA-2026:2128", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:2128", "componentName": "platform-python", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "0:3.6.8-73.el8_10" }, { "cveId": "CVE-2025-8291", "cveSeverity": "MODERATE", "cveCVSS": 4.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-8291", "advisoryId": "", "advisoryInfo": "", "componentName": "platform-python", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2025-6069", "cveSeverity": "MODERATE", "cveCVSS": 4.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-6069", "advisoryId": "", "advisoryInfo": "", "componentName": "platform-python", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2024-11168", "cveSeverity": "MODERATE", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-11168", "advisoryId": "RHSA-2024:10779", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2024:10779", "componentName": "platform-python", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "0:3.6.8-69.el8_10" }, { "cveId": "CVE-2024-0397", "cveSeverity": "LOW", "cveCVSS": 5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-0397", "advisoryId": "", "advisoryInfo": "", "componentName": "platform-python", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2024-7592", "cveSeverity": "LOW", "cveCVSS": 4.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-7592", "advisoryId": "", "advisoryInfo": "", "componentName": "platform-python", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2019-9674", "cveSeverity": "LOW", "cveCVSS": 4.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2019-9674", "advisoryId": "", "advisoryInfo": "", "componentName": "platform-python", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2025-6075", "cveSeverity": "LOW", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-6075", "advisoryId": "", "advisoryInfo": "", "componentName": "platform-python", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3479", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3479", "advisoryId": "", "advisoryInfo": "", "componentName": "platform-python", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-2297", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-2297", "advisoryId": "", "advisoryInfo": "", "componentName": "platform-python", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1795", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1795", "advisoryId": "", "advisoryInfo": "", "componentName": "platform-python", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4786", "cveSeverity": "IMPORTANT", "cveCVSS": 7.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4786", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-chardet", "componentVersion": "3.0.4-7.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2021-28861", "cveSeverity": "MODERATE", "cveCVSS": 7.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-28861", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-chardet", "componentVersion": "3.0.4-7.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5713", "cveSeverity": "MODERATE", "cveCVSS": 6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5713", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-chardet", "componentVersion": "3.0.4-7.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4786", "cveSeverity": "IMPORTANT", "cveCVSS": 7.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4786", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-idna", "componentVersion": "2.5-7.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2021-28861", "cveSeverity": "MODERATE", "cveCVSS": 7.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-28861", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-idna", "componentVersion": "2.5-7.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5713", "cveSeverity": "MODERATE", "cveCVSS": 6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5713", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-idna", "componentVersion": "2.5-7.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-6100", "cveSeverity": "IMPORTANT", "cveCVSS": 8.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-6100", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2025-4517", "cveSeverity": "IMPORTANT", "cveCVSS": 7.6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-4517", "advisoryId": "RHSA-2025:10128", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:10128", "componentName": "python3-libs", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "0:3.6.8-70.el8_10" }, { "cveId": "CVE-2024-12718", "cveSeverity": "IMPORTANT", "cveCVSS": 7.6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-12718", "advisoryId": "RHSA-2025:10128", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:10128", "componentName": "python3-libs", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "0:3.6.8-70.el8_10" }, { "cveId": "CVE-2025-4138", "cveSeverity": "IMPORTANT", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-4138", "advisoryId": "RHSA-2025:10128", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:10128", "componentName": "python3-libs", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "0:3.6.8-70.el8_10" }, { "cveId": "CVE-2026-4786", "cveSeverity": "IMPORTANT", "cveCVSS": 7.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4786", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4519", "cveSeverity": "IMPORTANT", "cveCVSS": 7.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4519", "advisoryId": "RHSA-2026:6473", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:6473", "componentName": "python3-libs", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "0:3.6.8-75.el8_10" }, { "cveId": "CVE-2025-4435", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-4435", "advisoryId": "RHSA-2025:10128", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:10128", "componentName": "python3-libs", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "0:3.6.8-70.el8_10" }, { "cveId": "CVE-2025-8194", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-8194", "advisoryId": "RHSA-2025:14560", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:14560", "componentName": "python3-libs", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "0:3.6.8-71.el8_10" }, { "cveId": "CVE-2025-12084", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-12084", "advisoryId": "RHSA-2026:1631", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:1631", "componentName": "python3-libs", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "0:3.6.8-72.el8_10" }, { "cveId": "CVE-2025-4330", "cveSeverity": "MODERATE", "cveCVSS": 7.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-4330", "advisoryId": "RHSA-2025:10128", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:10128", "componentName": "python3-libs", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "0:3.6.8-70.el8_10" }, { "cveId": "CVE-2026-1299", "cveSeverity": "MODERATE", "cveCVSS": 7.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1299", "advisoryId": "RHSA-2026:2128", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:2128", "componentName": "python3-libs", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "0:3.6.8-73.el8_10" }, { "cveId": "CVE-2025-15366", "cveSeverity": "MODERATE", "cveCVSS": 7.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-15366", "advisoryId": "RHSA-2026:2128", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:2128", "componentName": "python3-libs", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "0:3.6.8-73.el8_10" }, { "cveId": "CVE-2025-15367", "cveSeverity": "MODERATE", "cveCVSS": 7.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-15367", "advisoryId": "RHSA-2026:2128", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:2128", "componentName": "python3-libs", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "0:3.6.8-73.el8_10" }, { "cveId": "CVE-2025-0938", "cveSeverity": "MODERATE", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-0938", "advisoryId": "RHSA-2026:5588", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:5588", "componentName": "python3-libs", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "0:3.6.8-74.el8_10" }, { "cveId": "CVE-2024-9287", "cveSeverity": "MODERATE", "cveCVSS": 6.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-9287", "advisoryId": "RHSA-2024:10779", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2024:10779", "componentName": "python3-libs", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "0:3.6.8-69.el8_10" }, { "cveId": "CVE-2026-5713", "cveSeverity": "MODERATE", "cveCVSS": 6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5713", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2025-13837", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-13837", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4224", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4224", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3644", "cveSeverity": "MODERATE", "cveCVSS": 5.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3644", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2025-12781", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-12781", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2025-4516", "cveSeverity": "MODERATE", "cveCVSS": 5.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-4516", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2025-15282", "cveSeverity": "MODERATE", "cveCVSS": 4.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-15282", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0672", "cveSeverity": "MODERATE", "cveCVSS": 4.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0672", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0865", "cveSeverity": "MODERATE", "cveCVSS": 4.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0865", "advisoryId": "RHSA-2026:2128", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:2128", "componentName": "python3-libs", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "0:3.6.8-73.el8_10" }, { "cveId": "CVE-2025-11468", "cveSeverity": "MODERATE", "cveCVSS": 4.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11468", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1502", "cveSeverity": "MODERATE", "cveCVSS": 4.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1502", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2025-6069", "cveSeverity": "MODERATE", "cveCVSS": 4.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-6069", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2025-8291", "cveSeverity": "MODERATE", "cveCVSS": 4.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-8291", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2024-11168", "cveSeverity": "MODERATE", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-11168", "advisoryId": "RHSA-2024:10779", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2024:10779", "componentName": "python3-libs", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "0:3.6.8-69.el8_10" }, { "cveId": "CVE-2024-0397", "cveSeverity": "LOW", "cveCVSS": 5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-0397", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2024-7592", "cveSeverity": "LOW", "cveCVSS": 4.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-7592", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2019-9674", "cveSeverity": "LOW", "cveCVSS": 4.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2019-9674", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2025-6075", "cveSeverity": "LOW", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-6075", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-2297", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-2297", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3479", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3479", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1795", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1795", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.6.8-67.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4786", "cveSeverity": "IMPORTANT", "cveCVSS": 7.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4786", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-pysocks", "componentVersion": "1.6.8-3.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2021-28861", "cveSeverity": "MODERATE", "cveCVSS": 7.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-28861", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-pysocks", "componentVersion": "1.6.8-3.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5713", "cveSeverity": "MODERATE", "cveCVSS": 6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5713", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-pysocks", "componentVersion": "1.6.8-3.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4786", "cveSeverity": "IMPORTANT", "cveCVSS": 7.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4786", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-requests", "componentVersion": "2.20.0-3.el8_8", "componentFixedVersion": "" }, { "cveId": "CVE-2021-28861", "cveSeverity": "MODERATE", "cveCVSS": 7.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-28861", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-requests", "componentVersion": "2.20.0-3.el8_8", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5713", "cveSeverity": "MODERATE", "cveCVSS": 6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5713", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-requests", "componentVersion": "2.20.0-3.el8_8", "componentFixedVersion": "" }, { "cveId": "CVE-2024-35195", "cveSeverity": "MODERATE", "cveCVSS": 5.6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-35195", "advisoryId": "RHSA-2025:0012", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:0012", "componentName": "python3-requests", "componentVersion": "2.20.0-3.el8_8", "componentFixedVersion": "0:2.20.0-5.el8_10" }, { "cveId": "CVE-2024-47081", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-47081", "advisoryId": "RHSA-2025:13234", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:13234", "componentName": "python3-requests", "componentVersion": "2.20.0-3.el8_8", "componentFixedVersion": "0:2.20.0-6.el8_10" }, { "cveId": "CVE-2026-4786", "cveSeverity": "IMPORTANT", "cveCVSS": 7.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4786", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-six", "componentVersion": "1.11.0-8.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2021-28861", "cveSeverity": "MODERATE", "cveCVSS": 7.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-28861", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-six", "componentVersion": "1.11.0-8.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5713", "cveSeverity": "MODERATE", "cveCVSS": 6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5713", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-six", "componentVersion": "1.11.0-8.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66418", "cveSeverity": "IMPORTANT", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66418", "advisoryId": "RHSA-2026:1254", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:1254", "componentName": "python3-urllib3", "componentVersion": "1.24.2-8.el8_10", "componentFixedVersion": "0:1.24.2-9.el8_10" }, { "cveId": "CVE-2026-21441", "cveSeverity": "IMPORTANT", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21441", "advisoryId": "RHSA-2026:1254", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:1254", "componentName": "python3-urllib3", "componentVersion": "1.24.2-8.el8_10", "componentFixedVersion": "0:1.24.2-9.el8_10" }, { "cveId": "CVE-2025-66471", "cveSeverity": "IMPORTANT", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66471", "advisoryId": "RHSA-2026:1254", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:1254", "componentName": "python3-urllib3", "componentVersion": "1.24.2-8.el8_10", "componentFixedVersion": "0:1.24.2-9.el8_10" }, { "cveId": "CVE-2026-4786", "cveSeverity": "IMPORTANT", "cveCVSS": 7.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4786", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-urllib3", "componentVersion": "1.24.2-8.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2021-28861", "cveSeverity": "MODERATE", "cveCVSS": 7.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-28861", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-urllib3", "componentVersion": "1.24.2-8.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5713", "cveSeverity": "MODERATE", "cveCVSS": 6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5713", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-urllib3", "componentVersion": "1.24.2-8.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2025-6965", "cveSeverity": "IMPORTANT", "cveCVSS": 7.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-6965", "advisoryId": "RHSA-2025:12010", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:12010", "componentName": "sqlite-libs", "componentVersion": "3.26.0-19.el8_9", "componentFixedVersion": "0:3.26.0-20.el8_10" }, { "cveId": "CVE-2019-19244", "cveSeverity": "LOW", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2019-19244", "advisoryId": "", "advisoryInfo": "", "componentName": "sqlite-libs", "componentVersion": "3.26.0-19.el8_9", "componentFixedVersion": "" }, { "cveId": "CVE-2019-9937", "cveSeverity": "LOW", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2019-9937", "advisoryId": "", "advisoryInfo": "", "componentName": "sqlite-libs", "componentVersion": "3.26.0-19.el8_9", "componentFixedVersion": "" }, { "cveId": "CVE-2024-0232", "cveSeverity": "LOW", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-0232", "advisoryId": "", "advisoryInfo": "", "componentName": "sqlite-libs", "componentVersion": "3.26.0-19.el8_9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-70873", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-70873", "advisoryId": "", "advisoryInfo": "", "componentName": "sqlite-libs", "componentVersion": "3.26.0-19.el8_9", "componentFixedVersion": "" }, { "cveId": "CVE-2019-9936", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2019-9936", "advisoryId": "", "advisoryInfo": "", "componentName": "sqlite-libs", "componentVersion": "3.26.0-19.el8_9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-34982", "cveSeverity": "IMPORTANT", "cveCVSS": 8.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-34982", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2026-25749", "cveSeverity": "MODERATE", "cveCVSS": 7.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-25749", "advisoryId": "RHSA-2026:4442", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:4442", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "2:8.0.1763-22.el8_10" }, { "cveId": "CVE-2026-28418", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28418", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28419", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28419", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2026-39881", "cveSeverity": "MODERATE", "cveCVSS": 5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-39881", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2025-29768", "cveSeverity": "MODERATE", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-29768", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28420", "cveSeverity": "MODERATE", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28420", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2025-53905", "cveSeverity": "MODERATE", "cveCVSS": 4.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-53905", "advisoryId": "RHSA-2025:17715", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:17715", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "2:8.0.1763-21.el8_10" }, { "cveId": "CVE-2026-35177", "cveSeverity": "MODERATE", "cveCVSS": 4.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-35177", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2024-22667", "cveSeverity": "LOW", "cveCVSS": 8.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-22667", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2023-4738", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-4738", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2284", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2284", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2023-0433", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-0433", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3234", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3234", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2206", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2206", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2022-4292", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-4292", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2125", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2125", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2023-4751", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-4751", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2023-0512", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-0512", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2129", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2129", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2175", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2175", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3256", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3256", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2343", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2343", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3235", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3235", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2023-0054", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-0054", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2126", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2126", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2285", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2285", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3352", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3352", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2286", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2286", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2023-4734", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-4734", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3296", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3296", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2210", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2210", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2023-4781", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-4781", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2946", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2946", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2124", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2124", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2207", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2207", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2022-1619", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-1619", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2345", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2345", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2819", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2819", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3037", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3037", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2522", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2522", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2344", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2344", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2182", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2182", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2026-26269", "cveSeverity": "LOW", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-26269", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2021-3927", "cveSeverity": "LOW", "cveCVSS": 7.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-3927", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2023-0049", "cveSeverity": "LOW", "cveCVSS": 7.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-0049", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2023-0288", "cveSeverity": "LOW", "cveCVSS": 7.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-0288", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2023-4735", "cveSeverity": "LOW", "cveCVSS": 7.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-4735", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2023-1127", "cveSeverity": "LOW", "cveCVSS": 7.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-1127", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2021-4166", "cveSeverity": "LOW", "cveCVSS": 7.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-4166", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2287", "cveSeverity": "LOW", "cveCVSS": 7.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2287", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2023-4752", "cveSeverity": "LOW", "cveCVSS": 7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-4752", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2023-4750", "cveSeverity": "LOW", "cveCVSS": 7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-4750", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3705", "cveSeverity": "LOW", "cveCVSS": 7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3705", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2023-4733", "cveSeverity": "LOW", "cveCVSS": 7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-4733", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2022-0351", "cveSeverity": "LOW", "cveCVSS": 6.6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-0351", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2022-1720", "cveSeverity": "LOW", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-1720", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3153", "cveSeverity": "LOW", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3153", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2023-1264", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-1264", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2023-2610", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-2610", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2022-4293", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-4293", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2023-2609", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-2609", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2980", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2980", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2923", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2923", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2023-5441", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-5441", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2020-20703", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2020-20703", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2021-3236", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-3236", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2023-1175", "cveSeverity": "LOW", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-1175", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2023-1170", "cveSeverity": "LOW", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-1170", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2018-20786", "cveSeverity": "LOW", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2018-20786", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2023-5344", "cveSeverity": "LOW", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-5344", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2023-48706", "cveSeverity": "LOW", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-48706", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2024-45306", "cveSeverity": "LOW", "cveCVSS": 4.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-45306", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2024-43802", "cveSeverity": "LOW", "cveCVSS": 4.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-43802", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2023-48237", "cveSeverity": "LOW", "cveCVSS": 4.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-48237", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2023-48234", "cveSeverity": "LOW", "cveCVSS": 4.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-48234", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2023-48231", "cveSeverity": "LOW", "cveCVSS": 4.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-48231", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2023-48233", "cveSeverity": "LOW", "cveCVSS": 4.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-48233", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2023-48232", "cveSeverity": "LOW", "cveCVSS": 4.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-48232", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2023-48236", "cveSeverity": "LOW", "cveCVSS": 4.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-48236", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2023-48235", "cveSeverity": "LOW", "cveCVSS": 4.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-48235", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2025-22134", "cveSeverity": "LOW", "cveCVSS": 4.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-22134", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2025-26603", "cveSeverity": "LOW", "cveCVSS": 4.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-26603", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2024-41965", "cveSeverity": "LOW", "cveCVSS": 4.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-41965", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2025-24014", "cveSeverity": "LOW", "cveCVSS": 4.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-24014", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2023-46246", "cveSeverity": "LOW", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-46246", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2024-47814", "cveSeverity": "LOW", "cveCVSS": 3.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-47814", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2024-43374", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-43374", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2023-5535", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-5535", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2208", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2208", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2183", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2183", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2021-3974", "cveSeverity": "LOW", "cveCVSS": 2.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-3974", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1215", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1215", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2849", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2849", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2845", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2845", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28422", "cveSeverity": "LOW", "cveCVSS": 2.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28422", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.0.1763-19.el8_6.4", "componentFixedVersion": "" }, { "cveId": "CVE-2019-12900", "cveSeverity": "MODERATE", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2019-12900", "advisoryId": "RHSA-2024:8922", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2024:8922", "componentName": "bzip2-libs", "componentVersion": "1.0.6-26.el8", "componentFixedVersion": "0:1.0.6-27.el8_10" }, { "cveId": "CVE-2019-12900", "cveSeverity": "MODERATE", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2019-12900", "advisoryId": "RHSA-2025:0733", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:0733", "componentName": "bzip2-libs", "componentVersion": "1.0.6-26.el8", "componentFixedVersion": "0:1.0.6-28.el8_10" }, { "cveId": "CVE-2025-5278", "cveSeverity": "MODERATE", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5278", "advisoryId": "", "advisoryInfo": "", "componentName": "coreutils-single", "componentVersion": "8.30-15.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1965", "cveSeverity": "MODERATE", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1965", "advisoryId": "", "advisoryInfo": "", "componentName": "curl", "componentVersion": "7.61.1-34.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-13034", "cveSeverity": "MODERATE", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-13034", "advisoryId": "", "advisoryInfo": "", "componentName": "curl", "componentVersion": "7.61.1-34.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3784", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3784", "advisoryId": "", "advisoryInfo": "", "componentName": "curl", "componentVersion": "7.61.1-34.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3805", "cveSeverity": "MODERATE", "cveCVSS": 6.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3805", "advisoryId": "", "advisoryInfo": "", "componentName": "curl", "componentVersion": "7.61.1-34.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3783", "cveSeverity": "MODERATE", "cveCVSS": 5.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3783", "advisoryId": "", "advisoryInfo": "", "componentName": "curl", "componentVersion": "7.61.1-34.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-9086", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-9086", "advisoryId": "RHSA-2025:23383", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:23383", "componentName": "curl", "componentVersion": "7.61.1-34.el8_10.2", "componentFixedVersion": "0:7.61.1-34.el8_10.9" }, { "cveId": "CVE-2025-14017", "cveSeverity": "MODERATE", "cveCVSS": 4.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14017", "advisoryId": "", "advisoryInfo": "", "componentName": "curl", "componentVersion": "7.61.1-34.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-15079", "cveSeverity": "LOW", "cveCVSS": 8.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-15079", "advisoryId": "", "advisoryInfo": "", "componentName": "curl", "componentVersion": "7.61.1-34.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-14819", "cveSeverity": "LOW", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14819", "advisoryId": "", "advisoryInfo": "", "componentName": "curl", "componentVersion": "7.61.1-34.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-14524", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14524", "advisoryId": "", "advisoryInfo": "", "componentName": "curl", "componentVersion": "7.61.1-34.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2024-11053", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-11053", "advisoryId": "", "advisoryInfo": "", "componentName": "curl", "componentVersion": "7.61.1-34.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2024-7264", "cveSeverity": "LOW", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-7264", "advisoryId": "", "advisoryInfo": "", "componentName": "curl", "componentVersion": "7.61.1-34.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-15224", "cveSeverity": "LOW", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-15224", "advisoryId": "", "advisoryInfo": "", "componentName": "curl", "componentVersion": "7.61.1-34.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-27534", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-27534", "advisoryId": "", "advisoryInfo": "", "componentName": "curl", "componentVersion": "7.61.1-34.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-0235", "cveSeverity": "MODERATE", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-0235", "advisoryId": "", "advisoryInfo": "", "componentName": "dnf-plugin-subscription-manager", "componentVersion": "1.28.42-1.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2019-8905", "cveSeverity": "MODERATE", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2019-8905", "advisoryId": "", "advisoryInfo": "", "componentName": "file-libs", "componentVersion": "5.33-26.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2019-8906", "cveSeverity": "LOW", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2019-8906", "advisoryId": "", "advisoryInfo": "", "componentName": "file-libs", "componentVersion": "5.33-26.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4647", "cveSeverity": "MODERATE", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4647", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "8.2-20.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5245", "cveSeverity": "MODERATE", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5245", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "8.2-20.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2022-47007", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-47007", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "8.2-20.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2022-47011", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-47011", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "8.2-20.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2022-47010", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-47010", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "8.2-20.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2024-57360", "cveSeverity": "LOW", "cveCVSS": 5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-57360", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "8.2-20.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11413", "cveSeverity": "LOW", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11413", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "8.2-20.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69649", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69649", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "8.2-20.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11414", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11414", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "8.2-20.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69652", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69652", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "8.2-20.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11412", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11412", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "8.2-20.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11495", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11495", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "8.2-20.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11840", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11840", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "8.2-20.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66865", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66865", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "8.2-20.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66864", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66864", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "8.2-20.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66866", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66866", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "8.2-20.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69650", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69650", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "8.2-20.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66863", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66863", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "8.2-20.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11494", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11494", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "8.2-20.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66861", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66861", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "8.2-20.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-3198", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-3198", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "8.2-20.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69648", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69648", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "8.2-20.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66862", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66862", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "8.2-20.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69647", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69647", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "8.2-20.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11839", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11839", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "8.2-20.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1152", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1152", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "8.2-20.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1151", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1151", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "8.2-20.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1150", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1150", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "8.2-20.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1153", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1153", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "8.2-20.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69645", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69645", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "8.2-20.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69644", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69644", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "8.2-20.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69651", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69651", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "8.2-20.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69646", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69646", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "8.2-20.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-13601", "cveSeverity": "MODERATE", "cveCVSS": 7.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-13601", "advisoryId": "RHSA-2026:0991", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:0991", "componentName": "glib2", "componentVersion": "2.56.4-165.el8_10", "componentFixedVersion": "0:2.56.4-168.el8_10" }, { "cveId": "CVE-2024-52533", "cveSeverity": "MODERATE", "cveCVSS": 7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-52533", "advisoryId": "RHSA-2025:11327", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:11327", "componentName": "glib2", "componentVersion": "2.56.4-165.el8_10", "componentFixedVersion": "0:2.56.4-166.el8_10" }, { "cveId": "CVE-2025-14512", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14512", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2", "componentVersion": "2.56.4-165.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2025-14087", "cveSeverity": "MODERATE", "cveCVSS": 5.6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14087", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2", "componentVersion": "2.56.4-165.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1489", "cveSeverity": "MODERATE", "cveCVSS": 5.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1489", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2", "componentVersion": "2.56.4-165.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2025-4373", "cveSeverity": "MODERATE", "cveCVSS": 4.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-4373", "advisoryId": "RHSA-2025:11327", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:11327", "componentName": "glib2", "componentVersion": "2.56.4-165.el8_10", "componentFixedVersion": "0:2.56.4-166.el8_10" }, { "cveId": "CVE-2026-1484", "cveSeverity": "MODERATE", "cveCVSS": 4.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1484", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2", "componentVersion": "2.56.4-165.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2024-34397", "cveSeverity": "MODERATE", "cveCVSS": 3.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-34397", "advisoryId": "RHSA-2025:11327", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:11327", "componentName": "glib2", "componentVersion": "2.56.4-165.el8_10", "componentFixedVersion": "0:2.56.4-166.el8_10" }, { "cveId": "CVE-2023-32665", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-32665", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2", "componentVersion": "2.56.4-165.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2023-32611", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-32611", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2", "componentVersion": "2.56.4-165.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2023-29499", "cveSeverity": "LOW", "cveCVSS": 6.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-29499", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2", "componentVersion": "2.56.4-165.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2023-32636", "cveSeverity": "LOW", "cveCVSS": 6.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-32636", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2", "componentVersion": "2.56.4-165.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0988", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0988", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2", "componentVersion": "2.56.4-165.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2025-3360", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-3360", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2", "componentVersion": "2.56.4-165.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2025-7039", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-7039", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2", "componentVersion": "2.56.4-165.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1485", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1485", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2", "componentVersion": "2.56.4-165.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2025-32988", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-32988", "advisoryId": "RHSA-2025:17415", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:17415", "componentName": "gnutls", "componentVersion": "3.6.16-8.el8_9.3", "componentFixedVersion": "0:3.6.16-8.el8_10.4" }, { "cveId": "CVE-2025-32990", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-32990", "advisoryId": "RHSA-2025:17415", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:17415", "componentName": "gnutls", "componentVersion": "3.6.16-8.el8_9.3", "componentFixedVersion": "0:3.6.16-8.el8_10.4" }, { "cveId": "CVE-2025-6395", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-6395", "advisoryId": "RHSA-2025:17415", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:17415", "componentName": "gnutls", "componentVersion": "3.6.16-8.el8_9.3", "componentFixedVersion": "0:3.6.16-8.el8_10.4" }, { "cveId": "CVE-2025-14831", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14831", "advisoryId": "RHSA-2026:5585", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:5585", "componentName": "gnutls", "componentVersion": "3.6.16-8.el8_9.3", "componentFixedVersion": "0:3.6.16-8.el8_10.5" }, { "cveId": "CVE-2024-12243", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-12243", "advisoryId": "RHSA-2025:4051", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:4051", "componentName": "gnutls", "componentVersion": "3.6.16-8.el8_9.3", "componentFixedVersion": "0:3.6.16-8.el8_10.3" }, { "cveId": "CVE-2021-4209", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-4209", "advisoryId": "", "advisoryInfo": "", "componentName": "gnutls", "componentVersion": "3.6.16-8.el8_9.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-9820", "cveSeverity": "LOW", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-9820", "advisoryId": "RHSA-2026:5585", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:5585", "componentName": "gnutls", "componentVersion": "3.6.16-8.el8_9.3", "componentFixedVersion": "0:3.6.16-8.el8_10.5" }, { "cveId": "CVE-2025-24528", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-24528", "advisoryId": "RHSA-2025:2722", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:2722", "componentName": "krb5-libs", "componentVersion": "1.18.2-30.el8_10", "componentFixedVersion": "0:1.18.2-31.el8_10" }, { "cveId": "CVE-2025-3576", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-3576", "advisoryId": "RHSA-2025:8411", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:8411", "componentName": "krb5-libs", "componentVersion": "1.18.2-30.el8_10", "componentFixedVersion": "0:1.18.2-32.el8_10" }, { "cveId": "CVE-2025-14104", "cveSeverity": "MODERATE", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14104", "advisoryId": "RHSA-2026:1852", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:1852", "componentName": "libblkid", "componentVersion": "2.32.1-46.el8", "componentFixedVersion": "0:2.32.1-48.el8_10" }, { "cveId": "CVE-2026-27456", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27456", "advisoryId": "", "advisoryInfo": "", "componentName": "libblkid", "componentVersion": "2.32.1-46.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1965", "cveSeverity": "MODERATE", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1965", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl", "componentVersion": "7.61.1-34.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-13034", "cveSeverity": "MODERATE", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-13034", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl", "componentVersion": "7.61.1-34.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3784", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3784", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl", "componentVersion": "7.61.1-34.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3805", "cveSeverity": "MODERATE", "cveCVSS": 6.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3805", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl", "componentVersion": "7.61.1-34.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3783", "cveSeverity": "MODERATE", "cveCVSS": 5.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3783", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl", "componentVersion": "7.61.1-34.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-9086", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-9086", "advisoryId": "RHSA-2025:23383", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:23383", "componentName": "libcurl", "componentVersion": "7.61.1-34.el8_10.2", "componentFixedVersion": "0:7.61.1-34.el8_10.9" }, { "cveId": "CVE-2025-14017", "cveSeverity": "MODERATE", "cveCVSS": 4.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14017", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl", "componentVersion": "7.61.1-34.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-15079", "cveSeverity": "LOW", "cveCVSS": 8.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-15079", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl", "componentVersion": "7.61.1-34.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-14819", "cveSeverity": "LOW", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14819", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl", "componentVersion": "7.61.1-34.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-14524", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14524", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl", "componentVersion": "7.61.1-34.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2024-11053", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-11053", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl", "componentVersion": "7.61.1-34.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2024-7264", "cveSeverity": "LOW", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-7264", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl", "componentVersion": "7.61.1-34.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-15224", "cveSeverity": "LOW", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-15224", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl", "componentVersion": "7.61.1-34.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-27534", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-27534", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl", "componentVersion": "7.61.1-34.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-14104", "cveSeverity": "MODERATE", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14104", "advisoryId": "RHSA-2026:1852", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:1852", "componentName": "libfdisk", "componentVersion": "2.32.1-46.el8", "componentFixedVersion": "0:2.32.1-48.el8_10" }, { "cveId": "CVE-2026-27456", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27456", "advisoryId": "", "advisoryInfo": "", "componentName": "libfdisk", "componentVersion": "2.32.1-46.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2020-11023", "cveSeverity": "MODERATE", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2020-11023", "advisoryId": "RHSA-2025:1301", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:1301", "componentName": "libgcc", "componentVersion": "8.5.0-22.el8_10", "componentFixedVersion": "0:8.5.0-23.el8_10" }, { "cveId": "CVE-2022-27943", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-27943", "advisoryId": "", "advisoryInfo": "", "componentName": "libgcc", "componentVersion": "8.5.0-22.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2018-20657", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2018-20657", "advisoryId": "", "advisoryInfo": "", "componentName": "libgcc", "componentVersion": "8.5.0-22.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2019-14250", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2019-14250", "advisoryId": "", "advisoryInfo": "", "componentName": "libgcc", "componentVersion": "8.5.0-22.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2024-2236", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-2236", "advisoryId": "", "advisoryInfo": "", "componentName": "libgcrypt", "componentVersion": "1.8.5-7.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2019-12904", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2019-12904", "advisoryId": "", "advisoryInfo": "", "componentName": "libgcrypt", "componentVersion": "1.8.5-7.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5222", "cveSeverity": "MODERATE", "cveCVSS": 7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5222", "advisoryId": "", "advisoryInfo": "", "componentName": "libicu", "componentVersion": "60.3-2.el8_1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-14104", "cveSeverity": "MODERATE", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14104", "advisoryId": "RHSA-2026:1852", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:1852", "componentName": "libmount", "componentVersion": "2.32.1-46.el8", "componentFixedVersion": "0:2.32.1-48.el8_10" }, { "cveId": "CVE-2026-27456", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27456", "advisoryId": "", "advisoryInfo": "", "componentName": "libmount", "componentVersion": "2.32.1-46.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-14104", "cveSeverity": "MODERATE", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14104", "advisoryId": "RHSA-2026:1852", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:1852", "componentName": "libsmartcols", "componentVersion": "2.32.1-46.el8", "componentFixedVersion": "0:2.32.1-48.el8_10" }, { "cveId": "CVE-2026-27456", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27456", "advisoryId": "", "advisoryInfo": "", "componentName": "libsmartcols", "componentVersion": "2.32.1-46.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5318", "cveSeverity": "MODERATE", "cveCVSS": 8.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5318", "advisoryId": "RHSA-2025:18286", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:18286", "componentName": "libssh", "componentVersion": "0.9.6-14.el8", "componentFixedVersion": "0:0.9.6-15.el8_10" }, { "cveId": "CVE-2026-0966", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0966", "advisoryId": "", "advisoryInfo": "", "componentName": "libssh", "componentVersion": "0.9.6-14.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5351", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5351", "advisoryId": "", "advisoryInfo": "", "componentName": "libssh", "componentVersion": "0.9.6-14.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3731", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3731", "advisoryId": "", "advisoryInfo": "", "componentName": "libssh", "componentVersion": "0.9.6-14.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0964", "cveSeverity": "MODERATE", "cveCVSS": 5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0964", "advisoryId": "", "advisoryInfo": "", "componentName": "libssh", "componentVersion": "0.9.6-14.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5372", "cveSeverity": "MODERATE", "cveCVSS": 5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5372", "advisoryId": "RHSA-2025:21977", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:21977", "componentName": "libssh", "componentVersion": "0.9.6-14.el8", "componentFixedVersion": "0:0.9.6-16.el8_10" }, { "cveId": "CVE-2025-8114", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-8114", "advisoryId": "", "advisoryInfo": "", "componentName": "libssh", "componentVersion": "0.9.6-14.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-4878", "cveSeverity": "LOW", "cveCVSS": 3.6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-4878", "advisoryId": "", "advisoryInfo": "", "componentName": "libssh", "componentVersion": "0.9.6-14.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0965", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0965", "advisoryId": "", "advisoryInfo": "", "componentName": "libssh", "componentVersion": "0.9.6-14.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0968", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0968", "advisoryId": "", "advisoryInfo": "", "componentName": "libssh", "componentVersion": "0.9.6-14.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-8277", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-8277", "advisoryId": "", "advisoryInfo": "", "componentName": "libssh", "componentVersion": "0.9.6-14.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0967", "cveSeverity": "LOW", "cveCVSS": 2.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0967", "advisoryId": "", "advisoryInfo": "", "componentName": "libssh", "componentVersion": "0.9.6-14.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5318", "cveSeverity": "MODERATE", "cveCVSS": 8.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5318", "advisoryId": "RHSA-2025:18286", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:18286", "componentName": "libssh-config", "componentVersion": "0.9.6-14.el8", "componentFixedVersion": "0:0.9.6-15.el8_10" }, { "cveId": "CVE-2025-5351", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5351", "advisoryId": "", "advisoryInfo": "", "componentName": "libssh-config", "componentVersion": "0.9.6-14.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0966", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0966", "advisoryId": "", "advisoryInfo": "", "componentName": "libssh-config", "componentVersion": "0.9.6-14.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3731", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3731", "advisoryId": "", "advisoryInfo": "", "componentName": "libssh-config", "componentVersion": "0.9.6-14.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5372", "cveSeverity": "MODERATE", "cveCVSS": 5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5372", "advisoryId": "RHSA-2025:21977", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:21977", "componentName": "libssh-config", "componentVersion": "0.9.6-14.el8", "componentFixedVersion": "0:0.9.6-16.el8_10" }, { "cveId": "CVE-2026-0964", "cveSeverity": "MODERATE", "cveCVSS": 5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0964", "advisoryId": "", "advisoryInfo": "", "componentName": "libssh-config", "componentVersion": "0.9.6-14.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-8114", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-8114", "advisoryId": "", "advisoryInfo": "", "componentName": "libssh-config", "componentVersion": "0.9.6-14.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-4878", "cveSeverity": "LOW", "cveCVSS": 3.6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-4878", "advisoryId": "", "advisoryInfo": "", "componentName": "libssh-config", "componentVersion": "0.9.6-14.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0965", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0965", "advisoryId": "", "advisoryInfo": "", "componentName": "libssh-config", "componentVersion": "0.9.6-14.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0968", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0968", "advisoryId": "", "advisoryInfo": "", "componentName": "libssh-config", "componentVersion": "0.9.6-14.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-8277", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-8277", "advisoryId": "", "advisoryInfo": "", "componentName": "libssh-config", "componentVersion": "0.9.6-14.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0967", "cveSeverity": "LOW", "cveCVSS": 2.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0967", "advisoryId": "", "advisoryInfo": "", "componentName": "libssh-config", "componentVersion": "0.9.6-14.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2020-11023", "cveSeverity": "MODERATE", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2020-11023", "advisoryId": "RHSA-2025:1301", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:1301", "componentName": "libstdc++", "componentVersion": "8.5.0-22.el8_10", "componentFixedVersion": "0:8.5.0-23.el8_10" }, { "cveId": "CVE-2022-27943", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-27943", "advisoryId": "", "advisoryInfo": "", "componentName": "libstdc++", "componentVersion": "8.5.0-22.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2018-20657", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2018-20657", "advisoryId": "", "advisoryInfo": "", "componentName": "libstdc++", "componentVersion": "8.5.0-22.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2019-14250", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2019-14250", "advisoryId": "", "advisoryInfo": "", "componentName": "libstdc++", "componentVersion": "8.5.0-22.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2024-12133", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-12133", "advisoryId": "RHSA-2025:4049", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:4049", "componentName": "libtasn1", "componentVersion": "4.13-4.el8_7", "componentFixedVersion": "0:4.13-5.el8_10" }, { "cveId": "CVE-2025-13151", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-13151", "advisoryId": "", "advisoryInfo": "", "componentName": "libtasn1", "componentVersion": "4.13-4.el8_7", "componentFixedVersion": "" }, { "cveId": "CVE-2018-1000654", "cveSeverity": "LOW", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2018-1000654", "advisoryId": "", "advisoryInfo": "", "componentName": "libtasn1", "componentVersion": "4.13-4.el8_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-14104", "cveSeverity": "MODERATE", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14104", "advisoryId": "RHSA-2026:1852", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:1852", "componentName": "libuuid", "componentVersion": "2.32.1-46.el8", "componentFixedVersion": "0:2.32.1-48.el8_10" }, { "cveId": "CVE-2026-27456", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27456", "advisoryId": "", "advisoryInfo": "", "componentName": "libuuid", "componentVersion": "2.32.1-46.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2022-4899", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-4899", "advisoryId": "", "advisoryInfo": "", "componentName": "libzstd", "componentVersion": "1.4.4-1.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2021-24032", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-24032", "advisoryId": "", "advisoryInfo": "", "componentName": "libzstd", "componentVersion": "1.4.4-1.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2019-17543", "cveSeverity": "MODERATE", "cveCVSS": 8.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2019-17543", "advisoryId": "RHSA-2025:11035", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:11035", "componentName": "lz4-libs", "componentVersion": "1.8.3-3.el8_4", "componentFixedVersion": "0:1.8.3-5.el8_10" }, { "cveId": "CVE-2025-22150", "cveSeverity": "MODERATE", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-22150", "advisoryId": "RHSA-2025:1582", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:1582", "componentName": "nodejs", "componentVersion": "1:18.20.4-1.module+el8.10.0+22199+56ea0ead", "componentFixedVersion": "1:18.20.6-1.module+el8.10.0+22776+24cd6c55" }, { "cveId": "CVE-2025-23085", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-23085", "advisoryId": "RHSA-2025:1582", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:1582", "componentName": "nodejs", "componentVersion": "1:18.20.4-1.module+el8.10.0+22199+56ea0ead", "componentFixedVersion": "1:18.20.6-1.module+el8.10.0+22776+24cd6c55" }, { "cveId": "CVE-2024-21538", "cveSeverity": "LOW", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-21538", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:18.20.4-1.module+el8.10.0+22199+56ea0ead", "componentFixedVersion": "" }, { "cveId": "CVE-2025-22150", "cveSeverity": "MODERATE", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-22150", "advisoryId": "RHSA-2025:1582", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:1582", "componentName": "npm", "componentVersion": "1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead", "componentFixedVersion": "1:10.8.2-1.18.20.6.1.module+el8.10.0+22776+24cd6c55" }, { "cveId": "CVE-2025-23085", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-23085", "advisoryId": "RHSA-2025:1582", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:1582", "componentName": "npm", "componentVersion": "1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead", "componentFixedVersion": "1:10.8.2-1.18.20.6.1.module+el8.10.0+22776+24cd6c55" }, { "cveId": "CVE-2024-21538", "cveSeverity": "LOW", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-21538", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead", "componentFixedVersion": "" }, { "cveId": "CVE-2026-22185", "cveSeverity": "MODERATE", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-22185", "advisoryId": "", "advisoryInfo": "", "componentName": "openldap", "componentVersion": "2.4.46-20.el8_10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28390", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28390", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69419", "cveSeverity": "MODERATE", "cveCVSS": 7.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69419", "advisoryId": "RHSA-2026:3042", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:3042", "componentName": "openssl", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "1:1.1.1k-15.el8_6" }, { "cveId": "CVE-2025-9230", "cveSeverity": "MODERATE", "cveCVSS": 5.6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-9230", "advisoryId": "RHSA-2026:0337", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:0337", "componentName": "openssl", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "1:1.1.1k-14.el8_10" }, { "cveId": "CVE-2023-0466", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-0466", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2023-2650", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-2650", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69421", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69421", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2026-22796", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-22796", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2023-0464", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-0464", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69420", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69420", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2025-15468", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-15468", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2024-41996", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-41996", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28388", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28388", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28389", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28389", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2026-31789", "cveSeverity": "LOW", "cveCVSS": 5.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-31789", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2024-4741", "cveSeverity": "LOW", "cveCVSS": 5.6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-4741", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2025-15469", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-15469", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2026-22795", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-22795", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2024-0727", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-0727", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2023-0465", "cveSeverity": "LOW", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-0465", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2025-68160", "cveSeverity": "LOW", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-68160", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2024-13176", "cveSeverity": "LOW", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-13176", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28386", "cveSeverity": "LOW", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28386", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69418", "cveSeverity": "LOW", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69418", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2024-2511", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-2511", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2026-2673", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-2673", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28390", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28390", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69419", "cveSeverity": "MODERATE", "cveCVSS": 7.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69419", "advisoryId": "RHSA-2026:3042", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:3042", "componentName": "openssl-libs", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "1:1.1.1k-15.el8_6" }, { "cveId": "CVE-2025-9230", "cveSeverity": "MODERATE", "cveCVSS": 5.6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-9230", "advisoryId": "RHSA-2026:0337", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:0337", "componentName": "openssl-libs", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "1:1.1.1k-14.el8_10" }, { "cveId": "CVE-2023-0466", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-0466", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69421", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69421", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2023-2650", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-2650", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2024-41996", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-41996", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2026-22796", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-22796", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2025-15468", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-15468", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2023-0464", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-0464", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28388", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28388", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28389", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28389", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69420", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69420", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2026-31789", "cveSeverity": "LOW", "cveCVSS": 5.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-31789", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2024-4741", "cveSeverity": "LOW", "cveCVSS": 5.6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-4741", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2024-0727", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-0727", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2026-22795", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-22795", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2025-15469", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-15469", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2023-0465", "cveSeverity": "LOW", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-0465", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2024-13176", "cveSeverity": "LOW", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-13176", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28386", "cveSeverity": "LOW", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28386", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2025-68160", "cveSeverity": "LOW", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-68160", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69418", "cveSeverity": "LOW", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69418", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2024-2511", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-2511", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2026-2673", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-2673", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:1.1.1k-14.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4176", "cveSeverity": "MODERATE", "cveCVSS": 7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4176", "advisoryId": "", "advisoryInfo": "", "componentName": "perl-Errno", "componentVersion": "1.28-422.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-40909", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-40909", "advisoryId": "RHSA-2025:11805", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:11805", "componentName": "perl-Errno", "componentVersion": "1.28-422.el8", "componentFixedVersion": "0:1.28-423.el8_10" }, { "cveId": "CVE-2026-4176", "cveSeverity": "MODERATE", "cveCVSS": 7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4176", "advisoryId": "", "advisoryInfo": "", "componentName": "perl-IO", "componentVersion": "1.38-422.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-40909", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-40909", "advisoryId": "RHSA-2025:11805", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:11805", "componentName": "perl-IO", "componentVersion": "1.38-422.el8", "componentFixedVersion": "0:1.38-423.el8_10" }, { "cveId": "CVE-2026-4176", "cveSeverity": "MODERATE", "cveCVSS": 7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4176", "advisoryId": "", "advisoryInfo": "", "componentName": "perl-interpreter", "componentVersion": "4:5.26.3-422.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-40909", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-40909", "advisoryId": "RHSA-2025:11805", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:11805", "componentName": "perl-interpreter", "componentVersion": "4:5.26.3-422.el8", "componentFixedVersion": "4:5.26.3-423.el8_10" }, { "cveId": "CVE-2026-4176", "cveSeverity": "MODERATE", "cveCVSS": 7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4176", "advisoryId": "", "advisoryInfo": "", "componentName": "perl-libs", "componentVersion": "4:5.26.3-422.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-40909", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-40909", "advisoryId": "RHSA-2025:11805", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:11805", "componentName": "perl-libs", "componentVersion": "4:5.26.3-422.el8", "componentFixedVersion": "4:5.26.3-423.el8_10" }, { "cveId": "CVE-2026-4176", "cveSeverity": "MODERATE", "cveCVSS": 7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4176", "advisoryId": "", "advisoryInfo": "", "componentName": "perl-macros", "componentVersion": "4:5.26.3-422.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-40909", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-40909", "advisoryId": "RHSA-2025:11805", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:11805", "componentName": "perl-macros", "componentVersion": "4:5.26.3-422.el8", "componentFixedVersion": "4:5.26.3-423.el8_10" }, { "cveId": "CVE-2025-47273", "cveSeverity": "MODERATE", "cveCVSS": 7.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-47273", "advisoryId": "RHSA-2025:11036", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:11036", "componentName": "platform-python-setuptools", "componentVersion": "39.2.0-8.el8_10", "componentFixedVersion": "0:39.2.0-9.el8_10" }, { "cveId": "CVE-2022-0235", "cveSeverity": "MODERATE", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-0235", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-cloud-what", "componentVersion": "1.28.42-1.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-50181", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-50181", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-pip-wheel", "componentVersion": "9.0.3-24.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-50182", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-50182", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-pip-wheel", "componentVersion": "9.0.3-24.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2026-25645", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-25645", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-pip-wheel", "componentVersion": "9.0.3-24.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2023-45803", "cveSeverity": "MODERATE", "cveCVSS": 4.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-45803", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-pip-wheel", "componentVersion": "9.0.3-24.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2018-20225", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2018-20225", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-pip-wheel", "componentVersion": "9.0.3-24.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-47273", "cveSeverity": "MODERATE", "cveCVSS": 7.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-47273", "advisoryId": "RHSA-2025:11036", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2025:11036", "componentName": "python3-setuptools-wheel", "componentVersion": "39.2.0-8.el8_10", "componentFixedVersion": "0:39.2.0-9.el8_10" }, { "cveId": "CVE-2022-0235", "cveSeverity": "MODERATE", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-0235", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-subscription-manager-rhsm", "componentVersion": "1.28.42-1.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2022-0235", "cveSeverity": "MODERATE", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-0235", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-syspurpose", "componentVersion": "1.28.42-1.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2022-0235", "cveSeverity": "MODERATE", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-0235", "advisoryId": "", "advisoryInfo": "", "componentName": "subscription-manager", "componentVersion": "1.28.42-1.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2022-0235", "cveSeverity": "MODERATE", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-0235", "advisoryId": "", "advisoryInfo": "", "componentName": "subscription-manager-rhsm-certificates", "componentVersion": "20220623-1.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2026-29111", "cveSeverity": "MODERATE", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-29111", "advisoryId": "", "advisoryInfo": "", "componentName": "systemd", "componentVersion": "239-82.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4105", "cveSeverity": "MODERATE", "cveCVSS": 6.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4105", "advisoryId": "", "advisoryInfo": "", "componentName": "systemd", "componentVersion": "239-82.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-4598", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-4598", "advisoryId": "", "advisoryInfo": "", "componentName": "systemd", "componentVersion": "239-82.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2018-20839", "cveSeverity": "MODERATE", "cveCVSS": 4.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2018-20839", "advisoryId": "", "advisoryInfo": "", "componentName": "systemd", "componentVersion": "239-82.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2021-3997", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-3997", "advisoryId": "", "advisoryInfo": "", "componentName": "systemd", "componentVersion": "239-82.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-29111", "cveSeverity": "MODERATE", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-29111", "advisoryId": "", "advisoryInfo": "", "componentName": "systemd-libs", "componentVersion": "239-82.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4105", "cveSeverity": "MODERATE", "cveCVSS": 6.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4105", "advisoryId": "", "advisoryInfo": "", "componentName": "systemd-libs", "componentVersion": "239-82.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-4598", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-4598", "advisoryId": "", "advisoryInfo": "", "componentName": "systemd-libs", "componentVersion": "239-82.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2018-20839", "cveSeverity": "MODERATE", "cveCVSS": 4.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2018-20839", "advisoryId": "", "advisoryInfo": "", "componentName": "systemd-libs", "componentVersion": "239-82.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2021-3997", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-3997", "advisoryId": "", "advisoryInfo": "", "componentName": "systemd-libs", "componentVersion": "239-82.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-29111", "cveSeverity": "MODERATE", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-29111", "advisoryId": "", "advisoryInfo": "", "componentName": "systemd-pam", "componentVersion": "239-82.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4105", "cveSeverity": "MODERATE", "cveCVSS": 6.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4105", "advisoryId": "", "advisoryInfo": "", "componentName": "systemd-pam", "componentVersion": "239-82.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-4598", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-4598", "advisoryId": "", "advisoryInfo": "", "componentName": "systemd-pam", "componentVersion": "239-82.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2018-20839", "cveSeverity": "MODERATE", "cveCVSS": 4.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2018-20839", "advisoryId": "", "advisoryInfo": "", "componentName": "systemd-pam", "componentVersion": "239-82.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2021-3997", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-3997", "advisoryId": "", "advisoryInfo": "", "componentName": "systemd-pam", "componentVersion": "239-82.el8_10.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-45582", "cveSeverity": "MODERATE", "cveCVSS": 5.6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-45582", "advisoryId": "", "advisoryInfo": "", "componentName": "tar", "componentVersion": "2:1.30-9.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5704", "cveSeverity": "MODERATE", "cveCVSS": 5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5704", "advisoryId": "", "advisoryInfo": "", "componentName": "tar", "componentVersion": "2:1.30-9.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-64118", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-64118", "advisoryId": "", "advisoryInfo": "", "componentName": "tar", "componentVersion": "2:1.30-9.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2026-33056", "cveSeverity": "MODERATE", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-33056", "advisoryId": "", "advisoryInfo": "", "componentName": "tar", "componentVersion": "2:1.30-9.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2019-9923", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2019-9923", "advisoryId": "", "advisoryInfo": "", "componentName": "tar", "componentVersion": "2:1.30-9.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2023-39804", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-39804", "advisoryId": "", "advisoryInfo": "", "componentName": "tar", "componentVersion": "2:1.30-9.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2021-20193", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-20193", "advisoryId": "", "advisoryInfo": "", "componentName": "tar", "componentVersion": "2:1.30-9.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2025-14104", "cveSeverity": "MODERATE", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14104", "advisoryId": "RHSA-2026:1852", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:1852", "componentName": "util-linux", "componentVersion": "2.32.1-46.el8", "componentFixedVersion": "0:2.32.1-48.el8_10" }, { "cveId": "CVE-2026-27456", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27456", "advisoryId": "", "advisoryInfo": "", "componentName": "util-linux", "componentVersion": "2.32.1-46.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2026-34743", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-34743", "advisoryId": "", "advisoryInfo": "", "componentName": "xz-libs", "componentVersion": "5.2.4-4.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2025-9301", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-9301", "advisoryId": "", "advisoryInfo": "", "componentName": "cmake-filesystem", "componentVersion": "3.26.5-2.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2020-35512", "cveSeverity": "LOW", "cveCVSS": 7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2020-35512", "advisoryId": "", "advisoryInfo": "", "componentName": "dbus", "componentVersion": "1:1.12.8-26.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2020-35512", "cveSeverity": "LOW", "cveCVSS": 7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2020-35512", "advisoryId": "", "advisoryInfo": "", "componentName": "dbus-common", "componentVersion": "1:1.12.8-26.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2020-35512", "cveSeverity": "LOW", "cveCVSS": 7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2020-35512", "advisoryId": "", "advisoryInfo": "", "componentName": "dbus-daemon", "componentVersion": "1:1.12.8-26.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2020-35512", "cveSeverity": "LOW", "cveCVSS": 7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2020-35512", "advisoryId": "", "advisoryInfo": "", "componentName": "dbus-libs", "componentVersion": "1:1.12.8-26.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2020-35512", "cveSeverity": "LOW", "cveCVSS": 7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2020-35512", "advisoryId": "", "advisoryInfo": "", "componentName": "dbus-tools", "componentVersion": "1:1.12.8-26.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2024-25260", "cveSeverity": "LOW", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-25260", "advisoryId": "", "advisoryInfo": "", "componentName": "elfutils-default-yama-scope", "componentVersion": "0.190-2.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2024-25260", "cveSeverity": "LOW", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-25260", "advisoryId": "", "advisoryInfo": "", "componentName": "elfutils-libelf", "componentVersion": "0.190-2.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2024-25260", "cveSeverity": "LOW", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-25260", "advisoryId": "", "advisoryInfo": "", "componentName": "elfutils-libs", "componentVersion": "0.190-2.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2023-4156", "cveSeverity": "LOW", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-4156", "advisoryId": "", "advisoryInfo": "", "componentName": "gawk", "componentVersion": "4.2.1-4.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2023-24056", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-24056", "advisoryId": "", "advisoryInfo": "", "componentName": "libpkgconf", "componentVersion": "1.4.2-1.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2020-19189", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2020-19189", "advisoryId": "", "advisoryInfo": "", "componentName": "ncurses", "componentVersion": "6.1-10.20180224.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2020-19190", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2020-19190", "advisoryId": "", "advisoryInfo": "", "componentName": "ncurses", "componentVersion": "6.1-10.20180224.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2020-19188", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2020-19188", "advisoryId": "", "advisoryInfo": "", "componentName": "ncurses", "componentVersion": "6.1-10.20180224.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2020-19186", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2020-19186", "advisoryId": "", "advisoryInfo": "", "componentName": "ncurses", "componentVersion": "6.1-10.20180224.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2020-19185", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2020-19185", "advisoryId": "", "advisoryInfo": "", "componentName": "ncurses", "componentVersion": "6.1-10.20180224.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2020-19187", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2020-19187", "advisoryId": "", "advisoryInfo": "", "componentName": "ncurses", "componentVersion": "6.1-10.20180224.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2023-50495", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-50495", "advisoryId": "", "advisoryInfo": "", "componentName": "ncurses", "componentVersion": "6.1-10.20180224.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2021-39537", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-39537", "advisoryId": "", "advisoryInfo": "", "componentName": "ncurses", "componentVersion": "6.1-10.20180224.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2018-19211", "cveSeverity": "LOW", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2018-19211", "advisoryId": "", "advisoryInfo": "", "componentName": "ncurses", "componentVersion": "6.1-10.20180224.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2020-19190", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2020-19190", "advisoryId": "", "advisoryInfo": "", "componentName": "ncurses-base", "componentVersion": "6.1-10.20180224.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2020-19188", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2020-19188", "advisoryId": "", "advisoryInfo": "", "componentName": "ncurses-base", "componentVersion": "6.1-10.20180224.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2020-19185", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2020-19185", "advisoryId": "", "advisoryInfo": "", "componentName": "ncurses-base", "componentVersion": "6.1-10.20180224.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2020-19187", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2020-19187", "advisoryId": "", "advisoryInfo": "", "componentName": "ncurses-base", "componentVersion": "6.1-10.20180224.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2020-19189", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2020-19189", "advisoryId": "", "advisoryInfo": "", "componentName": "ncurses-base", "componentVersion": "6.1-10.20180224.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2020-19186", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2020-19186", "advisoryId": "", "advisoryInfo": "", "componentName": "ncurses-base", "componentVersion": "6.1-10.20180224.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2023-50495", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-50495", "advisoryId": "", "advisoryInfo": "", "componentName": "ncurses-base", "componentVersion": "6.1-10.20180224.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2021-39537", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-39537", "advisoryId": "", "advisoryInfo": "", "componentName": "ncurses-base", "componentVersion": "6.1-10.20180224.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2018-19211", "cveSeverity": "LOW", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2018-19211", "advisoryId": "", "advisoryInfo": "", "componentName": "ncurses-base", "componentVersion": "6.1-10.20180224.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2020-19190", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2020-19190", "advisoryId": "", "advisoryInfo": "", "componentName": "ncurses-libs", "componentVersion": "6.1-10.20180224.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2020-19189", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2020-19189", "advisoryId": "", "advisoryInfo": "", "componentName": "ncurses-libs", "componentVersion": "6.1-10.20180224.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2020-19186", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2020-19186", "advisoryId": "", "advisoryInfo": "", "componentName": "ncurses-libs", "componentVersion": "6.1-10.20180224.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2023-50495", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-50495", "advisoryId": "", "advisoryInfo": "", "componentName": "ncurses-libs", "componentVersion": "6.1-10.20180224.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2020-19188", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2020-19188", "advisoryId": "", "advisoryInfo": "", "componentName": "ncurses-libs", "componentVersion": "6.1-10.20180224.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2020-19185", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2020-19185", "advisoryId": "", "advisoryInfo": "", "componentName": "ncurses-libs", "componentVersion": "6.1-10.20180224.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2020-19187", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2020-19187", "advisoryId": "", "advisoryInfo": "", "componentName": "ncurses-libs", "componentVersion": "6.1-10.20180224.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2021-39537", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-39537", "advisoryId": "", "advisoryInfo": "", "componentName": "ncurses-libs", "componentVersion": "6.1-10.20180224.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2018-19211", "cveSeverity": "LOW", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2018-19211", "advisoryId": "", "advisoryInfo": "", "componentName": "ncurses-libs", "componentVersion": "6.1-10.20180224.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2022-41409", "cveSeverity": "LOW", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-41409", "advisoryId": "", "advisoryInfo": "", "componentName": "pcre2", "componentVersion": "10.32-3.el8_6", "componentFixedVersion": "" }, { "cveId": "CVE-2023-24056", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-24056", "advisoryId": "", "advisoryInfo": "", "componentName": "pkgconf", "componentVersion": "1.4.2-1.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2023-24056", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-24056", "advisoryId": "", "advisoryInfo": "", "componentName": "pkgconf-m4", "componentVersion": "1.4.2-1.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2023-24056", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-24056", "advisoryId": "", "advisoryInfo": "", "componentName": "pkgconf-pkg-config", "componentVersion": "1.4.2-1.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2018-1121", "cveSeverity": "LOW", "cveCVSS": 3.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2018-1121", "advisoryId": "", "advisoryInfo": "", "componentName": "procps-ng", "componentVersion": "3.3.15-14.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2024-56433", "cveSeverity": "LOW", "cveCVSS": 3.6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-56433", "advisoryId": "", "advisoryInfo": "", "componentName": "shadow-utils", "componentVersion": "2:4.6-22.el8", "componentFixedVersion": "" }, { "cveId": "CVE-2026-27171", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27171", "advisoryId": "", "advisoryInfo": "", "componentName": "zlib", "componentVersion": "1.2.11-25.el8", "componentFixedVersion": "" } ] } } ACS_IMAGE_SCAN_EYECATCHER_END