running acs-image-check Step: acs-image-check Results: /workspace/source/source/results/acs-image-check Custom root CA variable is not set. Make sure CA trust is established Using rox central endpoint central-rhacs-operator.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com:443 Download roxctl cli roxctl image check Running acs-image-check:report ACS_IMAGE_CHECK_EYECATCHER_BEGIN { "results": [ { "metadata": { "id": "quay.io/rhtap_qe/e2e-tests-python-qigwtwyr:on-pr-9deb7cc2c02e134492834fe05b6082dc19c8fdbf@sha256:978285956522a0211bccf2f8efb772b63b5b60d242d772aba9680486111156ac", "additionalInfo": { "name": "quay.io/rhtap_qe/e2e-tests-python-qigwtwyr:on-pr-9deb7cc2c02e134492834fe05b6082dc19c8fdbf@sha256:978285956522a0211bccf2f8efb772b63b5b60d242d772aba9680486111156ac", "type": "image" } }, "summary": { "CRITICAL": 0, "HIGH": 0, "LOW": 1, "MEDIUM": 0, "TOTAL": 1 }, "violatedPolicies": [ { "name": "Red Hat Package Manager in Image", "severity": "LOW", "description": "Alert on deployments with components of the Red Hat/Fedora/CentOS package management system.", "violation": [ "Image includes component 'dnf' (version 4.14.0-31.el9)", "Image includes component 'rpm' (version 4.16.1.3-39.el9)", "Image includes component 'yum' (version 4.14.0-31.el9)" ], "remediation": "Run `rpm -e --nodeps $(rpm -qa '*rpm*' '*dnf*' '*libsolv*' '*hawkey*' 'yum*')` in the image build for production containers.", "failingCheck": false } ] } ], "summary": { "CRITICAL": 0, "HIGH": 0, "LOW": 1, "MEDIUM": 0, "TOTAL": 1 } } ACS_IMAGE_CHECK_EYECATCHER_END running acs-image-scan Step: acs-image-scan Results: /workspace/source/source/results/acs-image-scan Custom root CA variable is not set. Make sure CA trust is established Running acs-image-scan:rox-image-scan Using rox central endpoint central-rhacs-operator.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com:443 Download roxctl cli roxctl image scan {"vulnerabilities":{"critical":0,"high":8,"medium":117,"low":228}} {"result":"SUCCESS","timestamp":"1777044297","note":"Task completed: Refer to Tekton task result SCAN_OUTPUT for found vulnerabilities.","namespace":"default","successes":"0","failures":"0","warnings":"0"} Running acs-image-scan:report ACS_IMAGE_SCAN_EYECATCHER_BEGIN { "result": { "summary": { "CRITICAL": 0, "IMPORTANT": 8, "LOW": 228, "MODERATE": 117, "TOTAL-COMPONENTS": 150, "TOTAL-VULNERABILITIES": 353 }, "vulnerabilities": [ { "cveId": "CVE-2026-4046", "cveSeverity": "IMPORTANT", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4046", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4437", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4437", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4438", "cveSeverity": "LOW", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4438", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4046", "cveSeverity": "IMPORTANT", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4046", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-common", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4437", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4437", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-common", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4438", "cveSeverity": "LOW", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4438", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-common", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4046", "cveSeverity": "IMPORTANT", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4046", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-devel", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4437", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4437", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-devel", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4438", "cveSeverity": "LOW", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4438", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-devel", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4046", "cveSeverity": "IMPORTANT", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4046", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-gconv-extra", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4437", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4437", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-gconv-extra", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4438", "cveSeverity": "LOW", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4438", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-gconv-extra", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4046", "cveSeverity": "IMPORTANT", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4046", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-headers", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4437", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4437", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-headers", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4438", "cveSeverity": "LOW", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4438", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-headers", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4046", "cveSeverity": "IMPORTANT", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4046", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-langpack-en", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4437", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4437", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-langpack-en", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4438", "cveSeverity": "LOW", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4438", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-langpack-en", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4046", "cveSeverity": "IMPORTANT", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4046", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-locale-source", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4437", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4437", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-locale-source", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4438", "cveSeverity": "LOW", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4438", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-locale-source", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4046", "cveSeverity": "IMPORTANT", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4046", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-minimal-langpack", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4437", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4437", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-minimal-langpack", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4438", "cveSeverity": "LOW", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4438", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-minimal-langpack", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-25679", "cveSeverity": "IMPORTANT", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-25679", "advisoryId": "", "advisoryInfo": "", "componentName": "go-srpm-macros", "componentVersion": "3.6.0-14.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-32282", "cveSeverity": "MODERATE", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-32282", "advisoryId": "", "advisoryInfo": "", "componentName": "go-srpm-macros", "componentVersion": "3.6.0-14.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2024-8244", "cveSeverity": "MODERATE", "cveCVSS": 5.6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-8244", "advisoryId": "", "advisoryInfo": "", "componentName": "go-srpm-macros", "componentVersion": "3.6.0-14.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4878", "cveSeverity": "IMPORTANT", "cveCVSS": 6.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4878", "advisoryId": "", "advisoryInfo": "", "componentName": "libcap", "componentVersion": "2.48-10.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4775", "cveSeverity": "IMPORTANT", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4775", "advisoryId": "", "advisoryInfo": "", "componentName": "libtiff", "componentVersion": "4.4.0-15.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-6277", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-6277", "advisoryId": "", "advisoryInfo": "", "componentName": "libtiff", "componentVersion": "4.4.0-15.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-25433", "cveSeverity": "MODERATE", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-25433", "advisoryId": "", "advisoryInfo": "", "componentName": "libtiff", "componentVersion": "4.4.0-15.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-3164", "cveSeverity": "MODERATE", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-3164", "advisoryId": "", "advisoryInfo": "", "componentName": "libtiff", "componentVersion": "4.4.0-15.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-25434", "cveSeverity": "MODERATE", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-25434", "advisoryId": "", "advisoryInfo": "", "componentName": "libtiff", "componentVersion": "4.4.0-15.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-61143", "cveSeverity": "MODERATE", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-61143", "advisoryId": "", "advisoryInfo": "", "componentName": "libtiff", "componentVersion": "4.4.0-15.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-25435", "cveSeverity": "MODERATE", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-25435", "advisoryId": "", "advisoryInfo": "", "componentName": "libtiff", "componentVersion": "4.4.0-15.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-8851", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-8851", "advisoryId": "", "advisoryInfo": "", "componentName": "libtiff", "componentVersion": "4.4.0-15.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-61145", "cveSeverity": "MODERATE", "cveCVSS": 5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-61145", "advisoryId": "", "advisoryInfo": "", "componentName": "libtiff", "componentVersion": "4.4.0-15.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-61144", "cveSeverity": "MODERATE", "cveCVSS": 5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-61144", "advisoryId": "", "advisoryInfo": "", "componentName": "libtiff", "componentVersion": "4.4.0-15.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-1916", "cveSeverity": "LOW", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-1916", "advisoryId": "", "advisoryInfo": "", "componentName": "libtiff", "componentVersion": "4.4.0-15.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-1056", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-1056", "advisoryId": "", "advisoryInfo": "", "componentName": "libtiff", "componentVersion": "4.4.0-15.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-8961", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-8961", "advisoryId": "", "advisoryInfo": "", "componentName": "libtiff", "componentVersion": "4.4.0-15.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2017-16232", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2017-16232", "advisoryId": "", "advisoryInfo": "", "componentName": "libtiff", "componentVersion": "4.4.0-15.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-9165", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-9165", "advisoryId": "", "advisoryInfo": "", "componentName": "libtiff", "componentVersion": "4.4.0-15.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2024-13978", "cveSeverity": "LOW", "cveCVSS": 2.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-13978", "advisoryId": "", "advisoryInfo": "", "componentName": "libtiff", "componentVersion": "4.4.0-15.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4775", "cveSeverity": "IMPORTANT", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4775", "advisoryId": "", "advisoryInfo": "", "componentName": "libtiff-devel", "componentVersion": "4.4.0-15.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-6277", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-6277", "advisoryId": "", "advisoryInfo": "", "componentName": "libtiff-devel", "componentVersion": "4.4.0-15.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-3164", "cveSeverity": "MODERATE", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-3164", "advisoryId": "", "advisoryInfo": "", "componentName": "libtiff-devel", "componentVersion": "4.4.0-15.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-61143", "cveSeverity": "MODERATE", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-61143", "advisoryId": "", "advisoryInfo": "", "componentName": "libtiff-devel", "componentVersion": "4.4.0-15.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-25433", "cveSeverity": "MODERATE", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-25433", "advisoryId": "", "advisoryInfo": "", "componentName": "libtiff-devel", "componentVersion": "4.4.0-15.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-25434", "cveSeverity": "MODERATE", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-25434", "advisoryId": "", "advisoryInfo": "", "componentName": "libtiff-devel", "componentVersion": "4.4.0-15.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-25435", "cveSeverity": "MODERATE", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-25435", "advisoryId": "", "advisoryInfo": "", "componentName": "libtiff-devel", "componentVersion": "4.4.0-15.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-8851", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-8851", "advisoryId": "", "advisoryInfo": "", "componentName": "libtiff-devel", "componentVersion": "4.4.0-15.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-61145", "cveSeverity": "MODERATE", "cveCVSS": 5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-61145", "advisoryId": "", "advisoryInfo": "", "componentName": "libtiff-devel", "componentVersion": "4.4.0-15.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-61144", "cveSeverity": "MODERATE", "cveCVSS": 5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-61144", "advisoryId": "", "advisoryInfo": "", "componentName": "libtiff-devel", "componentVersion": "4.4.0-15.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-1916", "cveSeverity": "LOW", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-1916", "advisoryId": "", "advisoryInfo": "", "componentName": "libtiff-devel", "componentVersion": "4.4.0-15.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-1056", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-1056", "advisoryId": "", "advisoryInfo": "", "componentName": "libtiff-devel", "componentVersion": "4.4.0-15.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2017-16232", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2017-16232", "advisoryId": "", "advisoryInfo": "", "componentName": "libtiff-devel", "componentVersion": "4.4.0-15.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-9165", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-9165", "advisoryId": "", "advisoryInfo": "", "componentName": "libtiff-devel", "componentVersion": "4.4.0-15.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-8961", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-8961", "advisoryId": "", "advisoryInfo": "", "componentName": "libtiff-devel", "componentVersion": "4.4.0-15.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2024-13978", "cveSeverity": "LOW", "cveCVSS": 2.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-13978", "advisoryId": "", "advisoryInfo": "", "componentName": "libtiff-devel", "componentVersion": "4.4.0-15.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-35385", "cveSeverity": "IMPORTANT", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-35385", "advisoryId": "", "advisoryInfo": "", "componentName": "openssh", "componentVersion": "8.7p1-48.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2023-51767", "cveSeverity": "MODERATE", "cveCVSS": 7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-51767", "advisoryId": "", "advisoryInfo": "", "componentName": "openssh", "componentVersion": "8.7p1-48.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-35414", "cveSeverity": "MODERATE", "cveCVSS": 4.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-35414", "advisoryId": "", "advisoryInfo": "", "componentName": "openssh", "componentVersion": "8.7p1-48.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-32728", "cveSeverity": "MODERATE", "cveCVSS": 4.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-32728", "advisoryId": "", "advisoryInfo": "", "componentName": "openssh", "componentVersion": "8.7p1-48.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-35386", "cveSeverity": "LOW", "cveCVSS": 3.6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-35386", "advisoryId": "", "advisoryInfo": "", "componentName": "openssh", "componentVersion": "8.7p1-48.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-35387", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-35387", "advisoryId": "", "advisoryInfo": "", "componentName": "openssh", "componentVersion": "8.7p1-48.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-35388", "cveSeverity": "LOW", "cveCVSS": 2.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-35388", "advisoryId": "", "advisoryInfo": "", "componentName": "openssh", "componentVersion": "8.7p1-48.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-35385", "cveSeverity": "IMPORTANT", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-35385", "advisoryId": "", "advisoryInfo": "", "componentName": "openssh-clients", "componentVersion": "8.7p1-48.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2023-51767", "cveSeverity": "MODERATE", "cveCVSS": 7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-51767", "advisoryId": "", "advisoryInfo": "", "componentName": "openssh-clients", "componentVersion": "8.7p1-48.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-35414", "cveSeverity": "MODERATE", "cveCVSS": 4.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-35414", "advisoryId": "", "advisoryInfo": "", "componentName": "openssh-clients", "componentVersion": "8.7p1-48.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-32728", "cveSeverity": "MODERATE", "cveCVSS": 4.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-32728", "advisoryId": "", "advisoryInfo": "", "componentName": "openssh-clients", "componentVersion": "8.7p1-48.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-35386", "cveSeverity": "LOW", "cveCVSS": 3.6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-35386", "advisoryId": "", "advisoryInfo": "", "componentName": "openssh-clients", "componentVersion": "8.7p1-48.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-35387", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-35387", "advisoryId": "", "advisoryInfo": "", "componentName": "openssh-clients", "componentVersion": "8.7p1-48.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-35388", "cveSeverity": "LOW", "cveCVSS": 2.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-35388", "advisoryId": "", "advisoryInfo": "", "componentName": "openssh-clients", "componentVersion": "8.7p1-48.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-6100", "cveSeverity": "IMPORTANT", "cveCVSS": 8.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-6100", "advisoryId": "", "advisoryInfo": "", "componentName": "python3", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4786", "cveSeverity": "IMPORTANT", "cveCVSS": 7.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4786", "advisoryId": "", "advisoryInfo": "", "componentName": "python3", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5713", "cveSeverity": "MODERATE", "cveCVSS": 6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5713", "advisoryId": "", "advisoryInfo": "", "componentName": "python3", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4224", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4224", "advisoryId": "", "advisoryInfo": "", "componentName": "python3", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-13837", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-13837", "advisoryId": "", "advisoryInfo": "", "componentName": "python3", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3644", "cveSeverity": "MODERATE", "cveCVSS": 5.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3644", "advisoryId": "", "advisoryInfo": "", "componentName": "python3", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-12781", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-12781", "advisoryId": "", "advisoryInfo": "", "componentName": "python3", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-4516", "cveSeverity": "MODERATE", "cveCVSS": 5.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-4516", "advisoryId": "", "advisoryInfo": "", "componentName": "python3", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-15282", "cveSeverity": "MODERATE", "cveCVSS": 4.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-15282", "advisoryId": "", "advisoryInfo": "", "componentName": "python3", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0672", "cveSeverity": "MODERATE", "cveCVSS": 4.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0672", "advisoryId": "", "advisoryInfo": "", "componentName": "python3", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11468", "cveSeverity": "MODERATE", "cveCVSS": 4.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11468", "advisoryId": "", "advisoryInfo": "", "componentName": "python3", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1502", "cveSeverity": "MODERATE", "cveCVSS": 4.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1502", "advisoryId": "", "advisoryInfo": "", "componentName": "python3", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-2297", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-2297", "advisoryId": "", "advisoryInfo": "", "componentName": "python3", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3479", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3479", "advisoryId": "", "advisoryInfo": "", "componentName": "python3", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1795", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1795", "advisoryId": "", "advisoryInfo": "", "componentName": "python3", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-6100", "cveSeverity": "IMPORTANT", "cveCVSS": 8.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-6100", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4786", "cveSeverity": "IMPORTANT", "cveCVSS": 7.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4786", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5713", "cveSeverity": "MODERATE", "cveCVSS": 6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5713", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4224", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4224", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-13837", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-13837", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3644", "cveSeverity": "MODERATE", "cveCVSS": 5.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3644", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-12781", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-12781", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-4516", "cveSeverity": "MODERATE", "cveCVSS": 5.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-4516", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-15282", "cveSeverity": "MODERATE", "cveCVSS": 4.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-15282", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0672", "cveSeverity": "MODERATE", "cveCVSS": 4.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0672", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1502", "cveSeverity": "MODERATE", "cveCVSS": 4.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1502", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11468", "cveSeverity": "MODERATE", "cveCVSS": 4.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11468", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3479", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3479", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-2297", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-2297", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1795", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1795", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-6100", "cveSeverity": "IMPORTANT", "cveCVSS": 8.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-6100", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4786", "cveSeverity": "IMPORTANT", "cveCVSS": 7.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4786", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5713", "cveSeverity": "MODERATE", "cveCVSS": 6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5713", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4224", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4224", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-13837", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-13837", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3644", "cveSeverity": "MODERATE", "cveCVSS": 5.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3644", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-12781", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-12781", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-4516", "cveSeverity": "MODERATE", "cveCVSS": 5.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-4516", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-15282", "cveSeverity": "MODERATE", "cveCVSS": 4.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-15282", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0672", "cveSeverity": "MODERATE", "cveCVSS": 4.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0672", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0865", "cveSeverity": "MODERATE", "cveCVSS": 4.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0865", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11468", "cveSeverity": "MODERATE", "cveCVSS": 4.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11468", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1502", "cveSeverity": "MODERATE", "cveCVSS": 4.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1502", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-6069", "cveSeverity": "MODERATE", "cveCVSS": 4.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-6069", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-6075", "cveSeverity": "LOW", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-6075", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-2297", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-2297", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3479", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3479", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-6100", "cveSeverity": "IMPORTANT", "cveCVSS": 8.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-6100", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-devel", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4786", "cveSeverity": "IMPORTANT", "cveCVSS": 7.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4786", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-devel", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5713", "cveSeverity": "MODERATE", "cveCVSS": 6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5713", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-devel", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4224", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4224", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-devel", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-13837", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-13837", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-devel", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3644", "cveSeverity": "MODERATE", "cveCVSS": 5.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3644", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-devel", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-12781", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-12781", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-devel", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-4516", "cveSeverity": "MODERATE", "cveCVSS": 5.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-4516", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-devel", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-15282", "cveSeverity": "MODERATE", "cveCVSS": 4.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-15282", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-devel", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0672", "cveSeverity": "MODERATE", "cveCVSS": 4.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0672", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-devel", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1502", "cveSeverity": "MODERATE", "cveCVSS": 4.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1502", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-devel", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11468", "cveSeverity": "MODERATE", "cveCVSS": 4.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11468", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-devel", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0865", "cveSeverity": "MODERATE", "cveCVSS": 4.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0865", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-devel", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-6069", "cveSeverity": "MODERATE", "cveCVSS": 4.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-6069", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-devel", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-6075", "cveSeverity": "LOW", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-6075", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-devel", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-2297", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-2297", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-devel", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3479", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3479", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-devel", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-6100", "cveSeverity": "IMPORTANT", "cveCVSS": 8.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-6100", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-libs", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4786", "cveSeverity": "IMPORTANT", "cveCVSS": 7.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4786", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-libs", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5713", "cveSeverity": "MODERATE", "cveCVSS": 6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5713", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-libs", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4224", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4224", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-libs", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-13837", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-13837", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-libs", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3644", "cveSeverity": "MODERATE", "cveCVSS": 5.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3644", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-libs", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-12781", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-12781", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-libs", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-4516", "cveSeverity": "MODERATE", "cveCVSS": 5.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-4516", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-libs", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0672", "cveSeverity": "MODERATE", "cveCVSS": 4.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0672", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-libs", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-15282", "cveSeverity": "MODERATE", "cveCVSS": 4.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-15282", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-libs", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1502", "cveSeverity": "MODERATE", "cveCVSS": 4.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1502", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-libs", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0865", "cveSeverity": "MODERATE", "cveCVSS": 4.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0865", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-libs", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11468", "cveSeverity": "MODERATE", "cveCVSS": 4.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11468", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-libs", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-6069", "cveSeverity": "MODERATE", "cveCVSS": 4.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-6069", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-libs", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-6075", "cveSeverity": "LOW", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-6075", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-libs", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3479", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3479", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-libs", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-2297", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-2297", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-libs", "componentVersion": "3.12.12-4.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-34982", "cveSeverity": "IMPORTANT", "cveCVSS": 8.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-34982", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28418", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28418", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28419", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28419", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-39881", "cveSeverity": "MODERATE", "cveCVSS": 5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-39881", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-29768", "cveSeverity": "MODERATE", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-29768", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28420", "cveSeverity": "MODERATE", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28420", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-35177", "cveSeverity": "MODERATE", "cveCVSS": 4.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-35177", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2024-22667", "cveSeverity": "LOW", "cveCVSS": 8.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-22667", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-4781", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-4781", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2862", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2862", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2175", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2175", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2021-4173", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-4173", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2257", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2257", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-4738", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-4738", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2982", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2982", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2819", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2819", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2345", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2345", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3297", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3297", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3099", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3099", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2817", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2817", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-0054", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-0054", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-1619", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-1619", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2344", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2344", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2522", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2522", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2285", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2285", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-1616", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-1616", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-0512", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-0512", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2206", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2206", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-0051", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-0051", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2889", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2889", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3235", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3235", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2021-3973", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-3973", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3324", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3324", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2125", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2125", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2284", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2284", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2210", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2210", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3234", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3234", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2343", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2343", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2129", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2129", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2286", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2286", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2946", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2946", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-4141", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-4141", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3256", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3256", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2042", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2042", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-4751", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-4751", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-4292", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-4292", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-0433", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-0433", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3352", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3352", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-4734", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-4734", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2182", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2182", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2124", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2124", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2126", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2126", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-1620", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-1620", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3134", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3134", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3016", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3016", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2207", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2207", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3037", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3037", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2304", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2304", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3296", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3296", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-26269", "cveSeverity": "LOW", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-26269", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-0288", "cveSeverity": "LOW", "cveCVSS": 7.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-0288", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2021-4187", "cveSeverity": "LOW", "cveCVSS": 7.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-4187", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-4735", "cveSeverity": "LOW", "cveCVSS": 7.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-4735", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2021-3927", "cveSeverity": "LOW", "cveCVSS": 7.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-3927", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2021-3928", "cveSeverity": "LOW", "cveCVSS": 7.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-3928", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-1127", "cveSeverity": "LOW", "cveCVSS": 7.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-1127", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-0049", "cveSeverity": "LOW", "cveCVSS": 7.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-0049", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2021-4166", "cveSeverity": "LOW", "cveCVSS": 7.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-4166", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2287", "cveSeverity": "LOW", "cveCVSS": 7.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2287", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3705", "cveSeverity": "LOW", "cveCVSS": 7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3705", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2021-4136", "cveSeverity": "LOW", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-4136", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-0213", "cveSeverity": "LOW", "cveCVSS": 6.6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-0213", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-0351", "cveSeverity": "LOW", "cveCVSS": 6.6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-0351", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-1720", "cveSeverity": "LOW", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-1720", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3153", "cveSeverity": "LOW", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3153", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2980", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2980", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3278", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3278", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2923", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2923", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-2610", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-2610", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2874", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2874", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-5441", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-5441", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-4293", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-4293", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-1725", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-1725", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-2609", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-2609", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-1674", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-1674", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-1264", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-1264", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-1170", "cveSeverity": "LOW", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-1170", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-1175", "cveSeverity": "LOW", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-1175", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-5344", "cveSeverity": "LOW", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-5344", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-48706", "cveSeverity": "LOW", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-48706", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2024-45306", "cveSeverity": "LOW", "cveCVSS": 4.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-45306", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2024-43802", "cveSeverity": "LOW", "cveCVSS": 4.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-43802", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2024-41957", "cveSeverity": "LOW", "cveCVSS": 4.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-41957", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-48233", "cveSeverity": "LOW", "cveCVSS": 4.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-48233", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-48231", "cveSeverity": "LOW", "cveCVSS": 4.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-48231", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-48232", "cveSeverity": "LOW", "cveCVSS": 4.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-48232", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-48235", "cveSeverity": "LOW", "cveCVSS": 4.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-48235", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-48236", "cveSeverity": "LOW", "cveCVSS": 4.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-48236", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-48234", "cveSeverity": "LOW", "cveCVSS": 4.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-48234", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-48237", "cveSeverity": "LOW", "cveCVSS": 4.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-48237", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2024-41965", "cveSeverity": "LOW", "cveCVSS": 4.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-41965", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-24014", "cveSeverity": "LOW", "cveCVSS": 4.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-24014", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-22134", "cveSeverity": "LOW", "cveCVSS": 4.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-22134", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-26603", "cveSeverity": "LOW", "cveCVSS": 4.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-26603", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-46246", "cveSeverity": "LOW", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-46246", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2024-47814", "cveSeverity": "LOW", "cveCVSS": 3.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-47814", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-5535", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-5535", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2024-43374", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-43374", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2183", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2183", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2208", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2208", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2021-3974", "cveSeverity": "LOW", "cveCVSS": 2.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-3974", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2021-3968", "cveSeverity": "LOW", "cveCVSS": 2.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-3968", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2845", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2845", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2849", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2849", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1215", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1215", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28422", "cveSeverity": "LOW", "cveCVSS": 2.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28422", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-filesystem", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-34982", "cveSeverity": "IMPORTANT", "cveCVSS": 8.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-34982", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28418", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28418", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28419", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28419", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-39881", "cveSeverity": "MODERATE", "cveCVSS": 5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-39881", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28420", "cveSeverity": "MODERATE", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28420", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-29768", "cveSeverity": "MODERATE", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-29768", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-35177", "cveSeverity": "MODERATE", "cveCVSS": 4.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-35177", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2024-22667", "cveSeverity": "LOW", "cveCVSS": 8.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-22667", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-1619", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-1619", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2946", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2946", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-4141", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-4141", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2344", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2344", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3234", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3234", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2819", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2819", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-0051", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-0051", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3134", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3134", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2207", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2207", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3099", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3099", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2343", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2343", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-0433", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-0433", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2125", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2125", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2042", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2042", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2021-4173", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-4173", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2126", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2126", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3256", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3256", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3037", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3037", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2522", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2522", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-4738", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-4738", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2182", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2182", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-4781", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-4781", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2206", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2206", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2862", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2862", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-4734", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-4734", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2124", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2124", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3297", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3297", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3016", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3016", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2175", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2175", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2304", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2304", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3324", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3324", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3296", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3296", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2257", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2257", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2982", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2982", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2889", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2889", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3352", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3352", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3235", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3235", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2284", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2284", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-0512", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-0512", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-4751", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-4751", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2210", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2210", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-1616", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-1616", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-1620", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-1620", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-4292", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-4292", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2129", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2129", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2285", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2285", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2286", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2286", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2021-3973", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-3973", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2345", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2345", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-0054", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-0054", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2817", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2817", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-26269", "cveSeverity": "LOW", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-26269", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2021-3928", "cveSeverity": "LOW", "cveCVSS": 7.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-3928", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-0049", "cveSeverity": "LOW", "cveCVSS": 7.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-0049", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-0288", "cveSeverity": "LOW", "cveCVSS": 7.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-0288", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2021-3927", "cveSeverity": "LOW", "cveCVSS": 7.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-3927", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2021-4187", "cveSeverity": "LOW", "cveCVSS": 7.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-4187", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-4735", "cveSeverity": "LOW", "cveCVSS": 7.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-4735", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-1127", "cveSeverity": "LOW", "cveCVSS": 7.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-1127", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2287", "cveSeverity": "LOW", "cveCVSS": 7.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2287", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2021-4166", "cveSeverity": "LOW", "cveCVSS": 7.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-4166", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3705", "cveSeverity": "LOW", "cveCVSS": 7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3705", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2021-4136", "cveSeverity": "LOW", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-4136", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-0213", "cveSeverity": "LOW", "cveCVSS": 6.6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-0213", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-0351", "cveSeverity": "LOW", "cveCVSS": 6.6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-0351", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3153", "cveSeverity": "LOW", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3153", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-1720", "cveSeverity": "LOW", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-1720", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-2610", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-2610", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-2609", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-2609", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-1264", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-1264", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2874", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2874", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-5441", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-5441", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2980", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2980", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-1674", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-1674", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2923", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2923", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3278", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3278", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-4293", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-4293", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-1725", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-1725", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-1175", "cveSeverity": "LOW", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-1175", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-5344", "cveSeverity": "LOW", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-5344", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-1170", "cveSeverity": "LOW", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-1170", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-48706", "cveSeverity": "LOW", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-48706", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2024-45306", "cveSeverity": "LOW", "cveCVSS": 4.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-45306", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2024-43802", "cveSeverity": "LOW", "cveCVSS": 4.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-43802", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2024-41957", "cveSeverity": "LOW", "cveCVSS": 4.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-41957", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-48233", "cveSeverity": "LOW", "cveCVSS": 4.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-48233", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-48235", "cveSeverity": "LOW", "cveCVSS": 4.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-48235", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-48232", "cveSeverity": "LOW", "cveCVSS": 4.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-48232", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-48236", "cveSeverity": "LOW", "cveCVSS": 4.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-48236", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-48237", "cveSeverity": "LOW", "cveCVSS": 4.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-48237", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-48231", "cveSeverity": "LOW", "cveCVSS": 4.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-48231", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-48234", "cveSeverity": "LOW", "cveCVSS": 4.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-48234", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-22134", "cveSeverity": "LOW", "cveCVSS": 4.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-22134", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-24014", "cveSeverity": "LOW", "cveCVSS": 4.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-24014", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-26603", "cveSeverity": "LOW", "cveCVSS": 4.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-26603", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2024-41965", "cveSeverity": "LOW", "cveCVSS": 4.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-41965", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-46246", "cveSeverity": "LOW", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-46246", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2024-47814", "cveSeverity": "LOW", "cveCVSS": 3.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-47814", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2208", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2208", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2023-5535", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-5535", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2183", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2183", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2024-43374", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-43374", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2021-3974", "cveSeverity": "LOW", "cveCVSS": 2.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-3974", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2021-3968", "cveSeverity": "LOW", "cveCVSS": 2.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-3968", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1215", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1215", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2849", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2849", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-2845", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-2845", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28422", "cveSeverity": "LOW", "cveCVSS": 2.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28422", "advisoryId": "", "advisoryInfo": "", "componentName": "vim-minimal", "componentVersion": "2:8.2.2637-23.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4647", "cveSeverity": "MODERATE", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4647", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11081", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11081", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-7545", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-7545", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2021-45078", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-45078", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11082", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11082", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2021-20197", "cveSeverity": "MODERATE", "cveCVSS": 4.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-20197", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5245", "cveSeverity": "MODERATE", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5245", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2022-44840", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-44840", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2021-3826", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-3826", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2022-47007", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-47007", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2022-38533", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-38533", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2022-47011", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-47011", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2022-47010", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-47010", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2022-47008", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-47008", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2024-57360", "cveSeverity": "LOW", "cveCVSS": 5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-57360", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11413", "cveSeverity": "LOW", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11413", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69648", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69648", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69650", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69650", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66862", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66862", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69652", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69652", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66864", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66864", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11840", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11840", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11495", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11495", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11494", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11494", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69647", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69647", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66866", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66866", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66865", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66865", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66863", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66863", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11839", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11839", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69649", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69649", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-3198", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-3198", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66861", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66861", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11414", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11414", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11412", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11412", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1150", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1150", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1152", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1152", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1151", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1151", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1153", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1153", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69646", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69646", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69645", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69645", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69644", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69644", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69651", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69651", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2023-1972", "cveSeverity": "LOW", "cveCVSS": 2.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-1972", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4647", "cveSeverity": "MODERATE", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4647", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11081", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11081", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11082", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11082", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2021-45078", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-45078", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-7545", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-7545", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2021-20197", "cveSeverity": "MODERATE", "cveCVSS": 4.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-20197", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5245", "cveSeverity": "MODERATE", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5245", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2022-44840", "cveSeverity": "LOW", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-44840", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2021-3826", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-3826", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2022-47010", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-47010", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2022-47007", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-47007", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2022-38533", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-38533", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2022-47011", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-47011", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2022-47008", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-47008", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2024-57360", "cveSeverity": "LOW", "cveCVSS": 5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-57360", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11413", "cveSeverity": "LOW", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11413", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66863", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66863", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66866", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66866", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69648", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69648", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66861", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66861", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66862", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66862", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69647", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69647", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-3198", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-3198", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69649", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69649", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69650", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69650", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66864", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66864", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11414", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11414", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11412", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11412", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11495", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11495", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11839", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11839", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66865", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66865", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11840", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11840", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69652", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69652", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11494", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11494", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1152", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1152", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1150", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1150", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1151", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1151", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1153", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1153", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69644", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69644", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69645", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69645", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69646", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69646", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69651", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69651", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2023-1972", "cveSeverity": "LOW", "cveCVSS": 2.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-1972", "advisoryId": "", "advisoryInfo": "", "componentName": "binutils-gold", "componentVersion": "2.35.2-67.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4426", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4426", "advisoryId": "", "advisoryInfo": "", "componentName": "bsdtar", "componentVersion": "3.5.3-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5745", "cveSeverity": "MODERATE", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5745", "advisoryId": "", "advisoryInfo": "", "componentName": "bsdtar", "componentVersion": "3.5.3-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-60753", "cveSeverity": "MODERATE", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-60753", "advisoryId": "", "advisoryInfo": "", "componentName": "bsdtar", "componentVersion": "3.5.3-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2023-30571", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-30571", "advisoryId": "", "advisoryInfo": "", "componentName": "bsdtar", "componentVersion": "3.5.3-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5915", "cveSeverity": "LOW", "cveCVSS": 6.6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5915", "advisoryId": "", "advisoryInfo": "", "componentName": "bsdtar", "componentVersion": "3.5.3-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5918", "cveSeverity": "LOW", "cveCVSS": 3.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5918", "advisoryId": "", "advisoryInfo": "", "componentName": "bsdtar", "componentVersion": "3.5.3-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5916", "cveSeverity": "LOW", "cveCVSS": 3.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5916", "advisoryId": "", "advisoryInfo": "", "componentName": "bsdtar", "componentVersion": "3.5.3-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1632", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1632", "advisoryId": "", "advisoryInfo": "", "componentName": "bsdtar", "componentVersion": "3.5.3-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5917", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5917", "advisoryId": "", "advisoryInfo": "", "componentName": "bsdtar", "componentVersion": "3.5.3-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5278", "cveSeverity": "MODERATE", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5278", "advisoryId": "", "advisoryInfo": "", "componentName": "coreutils-single", "componentVersion": "8.32-39.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1965", "cveSeverity": "MODERATE", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1965", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-13034", "cveSeverity": "MODERATE", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-13034", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3784", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3784", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3805", "cveSeverity": "MODERATE", "cveCVSS": 6.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3805", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3783", "cveSeverity": "MODERATE", "cveCVSS": 5.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3783", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-14017", "cveSeverity": "MODERATE", "cveCVSS": 4.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14017", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-15079", "cveSeverity": "LOW", "cveCVSS": 8.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-15079", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-14819", "cveSeverity": "LOW", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14819", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-14524", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14524", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2024-11053", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-11053", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2024-7264", "cveSeverity": "LOW", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-7264", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-15224", "cveSeverity": "LOW", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-15224", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2024-9681", "cveSeverity": "LOW", "cveCVSS": 3.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-9681", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-32776", "cveSeverity": "MODERATE", "cveCVSS": 6.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-32776", "advisoryId": "", "advisoryInfo": "", "componentName": "expat", "componentVersion": "2.5.0-5.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2026-32778", "cveSeverity": "MODERATE", "cveCVSS": 5.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-32778", "advisoryId": "", "advisoryInfo": "", "componentName": "expat", "componentVersion": "2.5.0-5.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2026-32777", "cveSeverity": "MODERATE", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-32777", "advisoryId": "", "advisoryInfo": "", "componentName": "expat", "componentVersion": "2.5.0-5.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2026-41080", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-41080", "advisoryId": "", "advisoryInfo": "", "componentName": "expat", "componentVersion": "2.5.0-5.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66382", "cveSeverity": "LOW", "cveCVSS": 2.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66382", "advisoryId": "", "advisoryInfo": "", "componentName": "expat", "componentVersion": "2.5.0-5.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2026-24515", "cveSeverity": "LOW", "cveCVSS": 2.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-24515", "advisoryId": "", "advisoryInfo": "", "componentName": "expat", "componentVersion": "2.5.0-5.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2026-32776", "cveSeverity": "MODERATE", "cveCVSS": 6.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-32776", "advisoryId": "", "advisoryInfo": "", "componentName": "expat-devel", "componentVersion": "2.5.0-5.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2026-32778", "cveSeverity": "MODERATE", "cveCVSS": 5.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-32778", "advisoryId": "", "advisoryInfo": "", "componentName": "expat-devel", "componentVersion": "2.5.0-5.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2026-32777", "cveSeverity": "MODERATE", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-32777", "advisoryId": "", "advisoryInfo": "", "componentName": "expat-devel", "componentVersion": "2.5.0-5.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2026-41080", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-41080", "advisoryId": "", "advisoryInfo": "", "componentName": "expat-devel", "componentVersion": "2.5.0-5.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66382", "cveSeverity": "LOW", "cveCVSS": 2.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66382", "advisoryId": "", "advisoryInfo": "", "componentName": "expat-devel", "componentVersion": "2.5.0-5.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2026-24515", "cveSeverity": "LOW", "cveCVSS": 2.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-24515", "advisoryId": "", "advisoryInfo": "", "componentName": "expat-devel", "componentVersion": "2.5.0-5.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2026-34085", "cveSeverity": "MODERATE", "cveCVSS": 6.6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-34085", "advisoryId": "", "advisoryInfo": "", "componentName": "fontconfig", "componentVersion": "2.14.0-2.el9_1", "componentFixedVersion": "" }, { "cveId": "CVE-2026-34085", "cveSeverity": "MODERATE", "cveCVSS": 6.6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-34085", "advisoryId": "", "advisoryInfo": "", "componentName": "fontconfig-devel", "componentVersion": "2.14.0-2.el9_1", "componentFixedVersion": "" }, { "cveId": "CVE-2026-23865", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-23865", "advisoryId": "", "advisoryInfo": "", "componentName": "freetype", "componentVersion": "2.10.4-10.el9_5", "componentFixedVersion": "" }, { "cveId": "CVE-2026-23865", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-23865", "advisoryId": "", "advisoryInfo": "", "componentName": "freetype-devel", "componentVersion": "2.10.4-10.el9_5", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4647", "cveSeverity": "MODERATE", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4647", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11083", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11083", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11082", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11082", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11081", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11081", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5245", "cveSeverity": "MODERATE", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5245", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-47007", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-47007", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-47010", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-47010", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-47011", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-47011", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2024-57360", "cveSeverity": "LOW", "cveCVSS": 5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-57360", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11413", "cveSeverity": "LOW", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11413", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69650", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69650", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11840", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11840", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11495", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11495", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66864", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66864", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66863", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66863", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66861", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66861", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66866", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66866", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69648", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69648", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11412", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11412", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66865", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66865", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-3198", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-3198", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69649", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69649", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69647", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69647", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69652", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69652", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11414", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11414", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11839", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11839", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66862", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66862", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11494", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11494", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1150", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1150", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1153", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1153", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1151", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1151", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1152", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1152", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69644", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69644", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69646", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69646", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69651", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69651", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69645", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69645", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4647", "cveSeverity": "MODERATE", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4647", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11083", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11083", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11081", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11081", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11082", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11082", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5245", "cveSeverity": "MODERATE", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5245", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-47007", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-47007", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-47011", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-47011", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-47010", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-47010", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2024-57360", "cveSeverity": "LOW", "cveCVSS": 5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-57360", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11413", "cveSeverity": "LOW", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11413", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11839", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11839", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69652", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69652", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66864", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66864", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66863", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66863", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66862", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66862", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66861", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66861", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11412", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11412", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11840", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11840", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-3198", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-3198", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69649", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69649", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69650", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69650", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11414", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11414", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66865", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66865", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11495", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11495", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11494", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11494", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69647", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69647", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66866", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66866", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69648", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69648", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1153", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1153", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1150", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1150", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1152", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1152", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1151", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1151", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69645", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69645", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69651", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69651", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69644", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69644", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69646", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69646", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-gdbserver", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4647", "cveSeverity": "MODERATE", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4647", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-headless", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11082", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11082", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-headless", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11083", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11083", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-headless", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11081", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11081", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-headless", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5245", "cveSeverity": "MODERATE", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5245", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-headless", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-47010", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-47010", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-headless", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-47007", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-47007", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-headless", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-47011", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-47011", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-headless", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2024-57360", "cveSeverity": "LOW", "cveCVSS": 5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-57360", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-headless", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11413", "cveSeverity": "LOW", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11413", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-headless", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66863", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66863", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-headless", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11495", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11495", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-headless", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-3198", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-3198", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-headless", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69649", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69649", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-headless", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66862", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66862", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-headless", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11494", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11494", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-headless", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11840", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11840", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-headless", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11839", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11839", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-headless", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11412", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11412", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-headless", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69652", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69652", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-headless", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66861", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66861", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-headless", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66864", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66864", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-headless", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11414", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11414", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-headless", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69648", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69648", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-headless", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69647", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69647", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-headless", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66865", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66865", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-headless", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66866", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66866", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-headless", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69650", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69650", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-headless", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1151", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1151", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-headless", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1150", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1150", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-headless", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1152", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1152", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-headless", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1153", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1153", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-headless", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69646", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69646", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-headless", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69651", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69651", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-headless", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69645", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69645", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-headless", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-69644", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-69644", "advisoryId": "", "advisoryInfo": "", "componentName": "gdb-headless", "componentVersion": "16.3-2.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-48386", "cveSeverity": "MODERATE", "cveCVSS": 6.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-48386", "advisoryId": "", "advisoryInfo": "", "componentName": "git", "componentVersion": "2.47.3-1.el9_6", "componentFixedVersion": "" }, { "cveId": "CVE-2025-48386", "cveSeverity": "MODERATE", "cveCVSS": 6.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-48386", "advisoryId": "", "advisoryInfo": "", "componentName": "git-core", "componentVersion": "2.47.3-1.el9_6", "componentFixedVersion": "" }, { "cveId": "CVE-2025-48386", "cveSeverity": "MODERATE", "cveCVSS": 6.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-48386", "advisoryId": "", "advisoryInfo": "", "componentName": "git-core-doc", "componentVersion": "2.47.3-1.el9_6", "componentFixedVersion": "" }, { "cveId": "CVE-2025-14512", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14512", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2", "componentVersion": "2.68.4-18.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-14087", "cveSeverity": "MODERATE", "cveCVSS": 5.6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14087", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2", "componentVersion": "2.68.4-18.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1489", "cveSeverity": "MODERATE", "cveCVSS": 5.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1489", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2", "componentVersion": "2.68.4-18.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1484", "cveSeverity": "MODERATE", "cveCVSS": 4.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1484", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2", "componentVersion": "2.68.4-18.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2023-32636", "cveSeverity": "LOW", "cveCVSS": 6.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-32636", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2", "componentVersion": "2.68.4-18.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0988", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0988", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2", "componentVersion": "2.68.4-18.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-7039", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-7039", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2", "componentVersion": "2.68.4-18.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-3360", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-3360", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2", "componentVersion": "2.68.4-18.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1485", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1485", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2", "componentVersion": "2.68.4-18.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-14512", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14512", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2-devel", "componentVersion": "2.68.4-18.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-14087", "cveSeverity": "MODERATE", "cveCVSS": 5.6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14087", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2-devel", "componentVersion": "2.68.4-18.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1489", "cveSeverity": "MODERATE", "cveCVSS": 5.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1489", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2-devel", "componentVersion": "2.68.4-18.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1484", "cveSeverity": "MODERATE", "cveCVSS": 4.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1484", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2-devel", "componentVersion": "2.68.4-18.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2023-32636", "cveSeverity": "LOW", "cveCVSS": 6.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-32636", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2-devel", "componentVersion": "2.68.4-18.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0988", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0988", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2-devel", "componentVersion": "2.68.4-18.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-3360", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-3360", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2-devel", "componentVersion": "2.68.4-18.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-7039", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-7039", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2-devel", "componentVersion": "2.68.4-18.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1485", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1485", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2-devel", "componentVersion": "2.68.4-18.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-68972", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-68972", "advisoryId": "", "advisoryInfo": "", "componentName": "gnupg2", "componentVersion": "2.3.3-5.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3219", "cveSeverity": "LOW", "cveCVSS": 6.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3219", "advisoryId": "", "advisoryInfo": "", "componentName": "gnupg2", "componentVersion": "2.3.3-5.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-24883", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-24883", "advisoryId": "", "advisoryInfo": "", "componentName": "gnupg2", "componentVersion": "2.3.3-5.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-30258", "cveSeverity": "LOW", "cveCVSS": 2.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-30258", "advisoryId": "", "advisoryInfo": "", "componentName": "gnupg2", "componentVersion": "2.3.3-5.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-22693", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-22693", "advisoryId": "", "advisoryInfo": "", "componentName": "harfbuzz", "componentVersion": "2.7.4-10.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-22693", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-22693", "advisoryId": "", "advisoryInfo": "", "componentName": "harfbuzz-devel", "componentVersion": "2.7.4-10.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-22693", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-22693", "advisoryId": "", "advisoryInfo": "", "componentName": "harfbuzz-icu", "componentVersion": "2.7.4-10.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2024-42516", "cveSeverity": "MODERATE", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-42516", "advisoryId": "", "advisoryInfo": "", "componentName": "httpd", "componentVersion": "2.4.62-7.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2024-43204", "cveSeverity": "MODERATE", "cveCVSS": 5.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-43204", "advisoryId": "", "advisoryInfo": "", "componentName": "httpd", "componentVersion": "2.4.62-7.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-53020", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-53020", "advisoryId": "", "advisoryInfo": "", "componentName": "httpd", "componentVersion": "2.4.62-7.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2024-42516", "cveSeverity": "MODERATE", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-42516", "advisoryId": "", "advisoryInfo": "", "componentName": "httpd-core", "componentVersion": "2.4.62-7.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2024-43204", "cveSeverity": "MODERATE", "cveCVSS": 5.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-43204", "advisoryId": "", "advisoryInfo": "", "componentName": "httpd-core", "componentVersion": "2.4.62-7.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-53020", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-53020", "advisoryId": "", "advisoryInfo": "", "componentName": "httpd-core", "componentVersion": "2.4.62-7.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2024-42516", "cveSeverity": "MODERATE", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-42516", "advisoryId": "", "advisoryInfo": "", "componentName": "httpd-devel", "componentVersion": "2.4.62-7.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2024-43204", "cveSeverity": "MODERATE", "cveCVSS": 5.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-43204", "advisoryId": "", "advisoryInfo": "", "componentName": "httpd-devel", "componentVersion": "2.4.62-7.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-53020", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-53020", "advisoryId": "", "advisoryInfo": "", "componentName": "httpd-devel", "componentVersion": "2.4.62-7.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2024-42516", "cveSeverity": "MODERATE", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-42516", "advisoryId": "", "advisoryInfo": "", "componentName": "httpd-filesystem", "componentVersion": "2.4.62-7.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2024-43204", "cveSeverity": "MODERATE", "cveCVSS": 5.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-43204", "advisoryId": "", "advisoryInfo": "", "componentName": "httpd-filesystem", "componentVersion": "2.4.62-7.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-53020", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-53020", "advisoryId": "", "advisoryInfo": "", "componentName": "httpd-filesystem", "componentVersion": "2.4.62-7.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2024-42516", "cveSeverity": "MODERATE", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-42516", "advisoryId": "", "advisoryInfo": "", "componentName": "httpd-tools", "componentVersion": "2.4.62-7.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2024-43204", "cveSeverity": "MODERATE", "cveCVSS": 5.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-43204", "advisoryId": "", "advisoryInfo": "", "componentName": "httpd-tools", "componentVersion": "2.4.62-7.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-53020", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-53020", "advisoryId": "", "advisoryInfo": "", "componentName": "httpd-tools", "componentVersion": "2.4.62-7.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3554", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3554", "advisoryId": "", "advisoryInfo": "", "componentName": "libX11", "componentVersion": "1.7.0-11.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3555", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3555", "advisoryId": "", "advisoryInfo": "", "componentName": "libX11", "componentVersion": "1.7.0-11.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3554", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3554", "advisoryId": "", "advisoryInfo": "", "componentName": "libX11-common", "componentVersion": "1.7.0-11.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3555", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3555", "advisoryId": "", "advisoryInfo": "", "componentName": "libX11-common", "componentVersion": "1.7.0-11.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3554", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3554", "advisoryId": "", "advisoryInfo": "", "componentName": "libX11-devel", "componentVersion": "1.7.0-11.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3555", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3555", "advisoryId": "", "advisoryInfo": "", "componentName": "libX11-devel", "componentVersion": "1.7.0-11.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3554", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3554", "advisoryId": "", "advisoryInfo": "", "componentName": "libX11-xcb", "componentVersion": "1.7.0-11.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3555", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3555", "advisoryId": "", "advisoryInfo": "", "componentName": "libX11-xcb", "componentVersion": "1.7.0-11.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4426", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4426", "advisoryId": "", "advisoryInfo": "", "componentName": "libarchive", "componentVersion": "3.5.3-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-60753", "cveSeverity": "MODERATE", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-60753", "advisoryId": "", "advisoryInfo": "", "componentName": "libarchive", "componentVersion": "3.5.3-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5745", "cveSeverity": "MODERATE", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5745", "advisoryId": "", "advisoryInfo": "", "componentName": "libarchive", "componentVersion": "3.5.3-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2023-30571", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-30571", "advisoryId": "", "advisoryInfo": "", "componentName": "libarchive", "componentVersion": "3.5.3-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5915", "cveSeverity": "LOW", "cveCVSS": 6.6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5915", "advisoryId": "", "advisoryInfo": "", "componentName": "libarchive", "componentVersion": "3.5.3-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5916", "cveSeverity": "LOW", "cveCVSS": 3.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5916", "advisoryId": "", "advisoryInfo": "", "componentName": "libarchive", "componentVersion": "3.5.3-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5918", "cveSeverity": "LOW", "cveCVSS": 3.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5918", "advisoryId": "", "advisoryInfo": "", "componentName": "libarchive", "componentVersion": "3.5.3-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1632", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1632", "advisoryId": "", "advisoryInfo": "", "componentName": "libarchive", "componentVersion": "3.5.3-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5917", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5917", "advisoryId": "", "advisoryInfo": "", "componentName": "libarchive", "componentVersion": "3.5.3-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-27456", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27456", "advisoryId": "", "advisoryInfo": "", "componentName": "libblkid", "componentVersion": "2.37.4-21.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-27456", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27456", "advisoryId": "", "advisoryInfo": "", "componentName": "libblkid-devel", "componentVersion": "2.37.4-21.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1965", "cveSeverity": "MODERATE", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1965", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-devel", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-13034", "cveSeverity": "MODERATE", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-13034", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-devel", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3784", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3784", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-devel", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3805", "cveSeverity": "MODERATE", "cveCVSS": 6.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3805", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-devel", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3783", "cveSeverity": "MODERATE", "cveCVSS": 5.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3783", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-devel", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-14017", "cveSeverity": "MODERATE", "cveCVSS": 4.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14017", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-devel", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-15079", "cveSeverity": "LOW", "cveCVSS": 8.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-15079", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-devel", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-14819", "cveSeverity": "LOW", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14819", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-devel", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-14524", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14524", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-devel", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2024-11053", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-11053", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-devel", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2024-7264", "cveSeverity": "LOW", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-7264", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-devel", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-15224", "cveSeverity": "LOW", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-15224", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-devel", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2024-9681", "cveSeverity": "LOW", "cveCVSS": 3.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-9681", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-devel", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-13034", "cveSeverity": "MODERATE", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-13034", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1965", "cveSeverity": "MODERATE", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1965", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3784", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3784", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3805", "cveSeverity": "MODERATE", "cveCVSS": 6.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3805", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3783", "cveSeverity": "MODERATE", "cveCVSS": 5.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3783", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-14017", "cveSeverity": "MODERATE", "cveCVSS": 4.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14017", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-15079", "cveSeverity": "LOW", "cveCVSS": 8.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-15079", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-14819", "cveSeverity": "LOW", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14819", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-14524", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14524", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2024-11053", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-11053", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2024-7264", "cveSeverity": "LOW", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-7264", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-15224", "cveSeverity": "LOW", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-15224", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2024-9681", "cveSeverity": "LOW", "cveCVSS": 3.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-9681", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-27456", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27456", "advisoryId": "", "advisoryInfo": "", "componentName": "libfdisk", "componentVersion": "2.37.4-21.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-27456", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27456", "advisoryId": "", "advisoryInfo": "", "componentName": "libmount", "componentVersion": "2.37.4-21.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-27456", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27456", "advisoryId": "", "advisoryInfo": "", "componentName": "libmount-devel", "componentVersion": "2.37.4-21.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-33636", "cveSeverity": "MODERATE", "cveCVSS": 7.6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-33636", "advisoryId": "", "advisoryInfo": "", "componentName": "libpng", "componentVersion": "2:1.6.37-12.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-33416", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-33416", "advisoryId": "", "advisoryInfo": "", "componentName": "libpng", "componentVersion": "2:1.6.37-12.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-64506", "cveSeverity": "MODERATE", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-64506", "advisoryId": "", "advisoryInfo": "", "componentName": "libpng", "componentVersion": "2:1.6.37-12.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-28164", "cveSeverity": "MODERATE", "cveCVSS": 5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-28164", "advisoryId": "", "advisoryInfo": "", "componentName": "libpng", "componentVersion": "2:1.6.37-12.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-64505", "cveSeverity": "MODERATE", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-64505", "advisoryId": "", "advisoryInfo": "", "componentName": "libpng", "componentVersion": "2:1.6.37-12.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-34757", "cveSeverity": "MODERATE", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-34757", "advisoryId": "", "advisoryInfo": "", "componentName": "libpng", "componentVersion": "2:1.6.37-12.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3857", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3857", "advisoryId": "", "advisoryInfo": "", "componentName": "libpng", "componentVersion": "2:1.6.37-12.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-33636", "cveSeverity": "MODERATE", "cveCVSS": 7.6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-33636", "advisoryId": "", "advisoryInfo": "", "componentName": "libpng-devel", "componentVersion": "2:1.6.37-12.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-33416", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-33416", "advisoryId": "", "advisoryInfo": "", "componentName": "libpng-devel", "componentVersion": "2:1.6.37-12.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-64506", "cveSeverity": "MODERATE", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-64506", "advisoryId": "", "advisoryInfo": "", "componentName": "libpng-devel", "componentVersion": "2:1.6.37-12.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-28164", "cveSeverity": "MODERATE", "cveCVSS": 5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-28164", "advisoryId": "", "advisoryInfo": "", "componentName": "libpng-devel", "componentVersion": "2:1.6.37-12.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-34757", "cveSeverity": "MODERATE", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-34757", "advisoryId": "", "advisoryInfo": "", "componentName": "libpng-devel", "componentVersion": "2:1.6.37-12.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-64505", "cveSeverity": "MODERATE", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-64505", "advisoryId": "", "advisoryInfo": "", "componentName": "libpng-devel", "componentVersion": "2:1.6.37-12.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3857", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3857", "advisoryId": "", "advisoryInfo": "", "componentName": "libpng-devel", "componentVersion": "2:1.6.37-12.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-4207", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-4207", "advisoryId": "", "advisoryInfo": "", "componentName": "libpq", "componentVersion": "13.23-1.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-4207", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-4207", "advisoryId": "", "advisoryInfo": "", "componentName": "libpq-devel", "componentVersion": "13.23-1.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-27456", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27456", "advisoryId": "", "advisoryInfo": "", "componentName": "libsmartcols", "componentVersion": "2.37.4-21.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-27456", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27456", "advisoryId": "", "advisoryInfo": "", "componentName": "libuuid", "componentVersion": "2.37.4-21.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1757", "cveSeverity": "MODERATE", "cveCVSS": 6.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1757", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2", "componentVersion": "2.9.13-14.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0990", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0990", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2", "componentVersion": "2.9.13-14.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2023-45322", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-45322", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2", "componentVersion": "2.9.13-14.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2024-34459", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-34459", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2", "componentVersion": "2.9.13-14.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0989", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0989", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2", "componentVersion": "2.9.13-14.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-27113", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-27113", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2", "componentVersion": "2.9.13-14.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0992", "cveSeverity": "LOW", "cveCVSS": 2.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0992", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2", "componentVersion": "2.9.13-14.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-6170", "cveSeverity": "LOW", "cveCVSS": 2.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-6170", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2", "componentVersion": "2.9.13-14.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1757", "cveSeverity": "MODERATE", "cveCVSS": 6.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1757", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2-devel", "componentVersion": "2.9.13-14.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0990", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0990", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2-devel", "componentVersion": "2.9.13-14.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2023-45322", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-45322", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2-devel", "componentVersion": "2.9.13-14.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2024-34459", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-34459", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2-devel", "componentVersion": "2.9.13-14.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0989", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0989", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2-devel", "componentVersion": "2.9.13-14.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-27113", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-27113", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2-devel", "componentVersion": "2.9.13-14.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0992", "cveSeverity": "LOW", "cveCVSS": 2.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0992", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2-devel", "componentVersion": "2.9.13-14.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-6170", "cveSeverity": "LOW", "cveCVSS": 2.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-6170", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2-devel", "componentVersion": "2.9.13-14.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-10911", "cveSeverity": "MODERATE", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-10911", "advisoryId": "", "advisoryInfo": "", "componentName": "libxslt", "componentVersion": "1.1.34-14.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11731", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11731", "advisoryId": "", "advisoryInfo": "", "componentName": "libxslt", "componentVersion": "1.1.34-14.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-10911", "cveSeverity": "MODERATE", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-10911", "advisoryId": "", "advisoryInfo": "", "componentName": "libxslt-devel", "componentVersion": "1.1.34-14.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11731", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11731", "advisoryId": "", "advisoryInfo": "", "componentName": "libxslt-devel", "componentVersion": "1.1.34-14.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2026-27903", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27903", "advisoryId": "", "advisoryInfo": "", "componentName": "llvm-filesystem", "componentVersion": "20.1.8-3.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-27903", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27903", "advisoryId": "", "advisoryInfo": "", "componentName": "llvm-libs", "componentVersion": "20.1.8-3.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2024-42516", "cveSeverity": "MODERATE", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-42516", "advisoryId": "", "advisoryInfo": "", "componentName": "mod_ldap", "componentVersion": "2.4.62-7.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2024-43204", "cveSeverity": "MODERATE", "cveCVSS": 5.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-43204", "advisoryId": "", "advisoryInfo": "", "componentName": "mod_ldap", "componentVersion": "2.4.62-7.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-53020", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-53020", "advisoryId": "", "advisoryInfo": "", "componentName": "mod_ldap", "componentVersion": "2.4.62-7.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2024-42516", "cveSeverity": "MODERATE", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-42516", "advisoryId": "", "advisoryInfo": "", "componentName": "mod_lua", "componentVersion": "2.4.62-7.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2024-43204", "cveSeverity": "MODERATE", "cveCVSS": 5.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-43204", "advisoryId": "", "advisoryInfo": "", "componentName": "mod_lua", "componentVersion": "2.4.62-7.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-53020", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-53020", "advisoryId": "", "advisoryInfo": "", "componentName": "mod_lua", "componentVersion": "2.4.62-7.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2024-42516", "cveSeverity": "MODERATE", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-42516", "advisoryId": "", "advisoryInfo": "", "componentName": "mod_session", "componentVersion": "2.4.62-7.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2024-43204", "cveSeverity": "MODERATE", "cveCVSS": 5.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-43204", "advisoryId": "", "advisoryInfo": "", "componentName": "mod_session", "componentVersion": "2.4.62-7.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-53020", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-53020", "advisoryId": "", "advisoryInfo": "", "componentName": "mod_session", "componentVersion": "2.4.62-7.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2024-42516", "cveSeverity": "MODERATE", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-42516", "advisoryId": "", "advisoryInfo": "", "componentName": "mod_ssl", "componentVersion": "1:2.4.62-7.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2024-43204", "cveSeverity": "MODERATE", "cveCVSS": 5.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-43204", "advisoryId": "", "advisoryInfo": "", "componentName": "mod_ssl", "componentVersion": "1:2.4.62-7.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-53020", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-53020", "advisoryId": "", "advisoryInfo": "", "componentName": "mod_ssl", "componentVersion": "1:2.4.62-7.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-64756", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-64756", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1527", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1527", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-33671", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-33671", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21712", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21712", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-7458", "cveSeverity": "MODERATE", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-7458", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-27903", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27903", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21713", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21713", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-2581", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-2581", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21717", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21717", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-62408", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-62408", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-29087", "cveSeverity": "MODERATE", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-29087", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21714", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21714", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-33672", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-33672", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-64118", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-64118", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2024-21538", "cveSeverity": "LOW", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-21538", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21716", "cveSeverity": "LOW", "cveCVSS": 3.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21716", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-22036", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-22036", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-70873", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-70873", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21715", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21715", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-47279", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-47279", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5889", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5889", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-64756", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-64756", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-docs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-33671", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-33671", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-docs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21712", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21712", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-docs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1527", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1527", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-docs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-7458", "cveSeverity": "MODERATE", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-7458", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-docs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21717", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21717", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-docs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-62408", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-62408", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-docs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-2581", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-2581", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-docs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-27903", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27903", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-docs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21713", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21713", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-docs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-29087", "cveSeverity": "MODERATE", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-29087", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-docs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21714", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21714", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-docs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-33672", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-33672", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-docs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-64118", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-64118", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-docs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2024-21538", "cveSeverity": "LOW", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-21538", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-docs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21716", "cveSeverity": "LOW", "cveCVSS": 3.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21716", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-docs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-22036", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-22036", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-docs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-70873", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-70873", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-docs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21715", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21715", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-docs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-47279", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-47279", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-docs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5889", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5889", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-docs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-64756", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-64756", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1527", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1527", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21712", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21712", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-33671", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-33671", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-7458", "cveSeverity": "MODERATE", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-7458", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-2581", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-2581", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-27903", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27903", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21713", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21713", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21717", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21717", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-62408", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-62408", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-29087", "cveSeverity": "MODERATE", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-29087", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-33672", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-33672", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21714", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21714", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-64118", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-64118", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2024-21538", "cveSeverity": "LOW", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-21538", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21716", "cveSeverity": "LOW", "cveCVSS": 3.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21716", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-22036", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-22036", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-70873", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-70873", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21715", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21715", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5889", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5889", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-47279", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-47279", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-full-i18n", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-64756", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-64756", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-33671", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-33671", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21712", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21712", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1527", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1527", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-7458", "cveSeverity": "MODERATE", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-7458", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-62408", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-62408", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-27903", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27903", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21713", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21713", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21717", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21717", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-2581", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-2581", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-29087", "cveSeverity": "MODERATE", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-29087", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21714", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21714", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-33672", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-33672", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-64118", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-64118", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2024-21538", "cveSeverity": "LOW", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-21538", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21716", "cveSeverity": "LOW", "cveCVSS": 3.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21716", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-22036", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-22036", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21715", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21715", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-70873", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-70873", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-47279", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-47279", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5889", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5889", "advisoryId": "", "advisoryInfo": "", "componentName": "nodejs-libs", "componentVersion": "1:22.22.2-1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-64756", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-64756", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21712", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21712", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1527", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1527", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-33671", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-33671", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-7458", "cveSeverity": "MODERATE", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-7458", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-27903", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27903", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21713", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21713", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-2581", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-2581", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21717", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21717", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-62408", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-62408", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-29087", "cveSeverity": "MODERATE", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-29087", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-33672", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-33672", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21714", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21714", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-64118", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-64118", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2024-21538", "cveSeverity": "LOW", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-21538", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21716", "cveSeverity": "LOW", "cveCVSS": 3.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21716", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-22036", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-22036", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-70873", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-70873", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-21715", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-21715", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5889", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5889", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2025-47279", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-47279", "advisoryId": "", "advisoryInfo": "", "componentName": "npm", "componentVersion": "1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461", "componentFixedVersion": "" }, { "cveId": "CVE-2026-22185", "cveSeverity": "MODERATE", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-22185", "advisoryId": "", "advisoryInfo": "", "componentName": "openldap", "componentVersion": "2.6.8-4.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-22185", "cveSeverity": "MODERATE", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-22185", "advisoryId": "", "advisoryInfo": "", "componentName": "openldap-devel", "componentVersion": "2.6.8-4.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28390", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28390", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-31790", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-31790", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2024-41996", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-41996", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28389", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28389", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28388", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28388", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-31789", "cveSeverity": "LOW", "cveCVSS": 5.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-31789", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2024-13176", "cveSeverity": "LOW", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-13176", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28386", "cveSeverity": "LOW", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28386", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-2673", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-2673", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-9232", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-9232", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28390", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28390", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-devel", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-31790", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-31790", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-devel", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28389", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28389", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-devel", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28388", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28388", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-devel", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2024-41996", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-41996", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-devel", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-31789", "cveSeverity": "LOW", "cveCVSS": 5.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-31789", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-devel", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2024-13176", "cveSeverity": "LOW", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-13176", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-devel", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28386", "cveSeverity": "LOW", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28386", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-devel", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-9232", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-9232", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-devel", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-2673", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-2673", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-devel", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28390", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28390", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-31790", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-31790", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2024-41996", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-41996", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28388", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28388", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28389", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28389", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-31789", "cveSeverity": "LOW", "cveCVSS": 5.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-31789", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28386", "cveSeverity": "LOW", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28386", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2024-13176", "cveSeverity": "LOW", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-13176", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-2673", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-2673", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-9232", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-9232", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-2100", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-2100", "advisoryId": "", "advisoryInfo": "", "componentName": "p11-kit", "componentVersion": "0.25.3-3.el9_5", "componentFixedVersion": "" }, { "cveId": "CVE-2026-2100", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-2100", "advisoryId": "", "advisoryInfo": "", "componentName": "p11-kit-trust", "componentVersion": "0.25.3-3.el9_5", "componentFixedVersion": "" }, { "cveId": "CVE-2025-48386", "cveSeverity": "MODERATE", "cveCVSS": 6.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-48386", "advisoryId": "", "advisoryInfo": "", "componentName": "perl-Git", "componentVersion": "2.47.3-1.el9_6", "componentFixedVersion": "" }, { "cveId": "CVE-2025-8869", "cveSeverity": "MODERATE", "cveCVSS": 0, "cveInfo": "https://nvd.nist.gov/vuln/detail/CVE-2025-8869", "advisoryId": "", "advisoryInfo": "", "componentName": "pip", "componentVersion": "24.2", "componentFixedVersion": "25.3" }, { "cveId": "CVE-2026-1703", "cveSeverity": "LOW", "cveCVSS": 0, "cveInfo": "https://nvd.nist.gov/vuln/detail/CVE-2026-1703", "advisoryId": "", "advisoryInfo": "", "componentName": "pip", "componentVersion": "24.2", "componentFixedVersion": "26.0" }, { "cveId": "CVE-2025-8869", "cveSeverity": "LOW", "cveCVSS": 0, "cveInfo": "https://advisory.echohq.com/cve/CVE-2025-8869", "advisoryId": "", "advisoryInfo": "", "componentName": "pip", "componentVersion": "24.2", "componentFixedVersion": "25.2+echo.1" }, { "cveId": "CVE-2026-1703", "cveSeverity": "LOW", "cveCVSS": 0, "cveInfo": "https://advisory.echohq.com/cve/CVE-2026-1703", "advisoryId": "", "advisoryInfo": "", "componentName": "pip", "componentVersion": "24.2", "componentFixedVersion": "25.2+echo.1" }, { "cveId": "CVE-2026-32284", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-32284", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-pip-wheel", "componentVersion": "21.3.1-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-50181", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-50181", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-pip-wheel", "componentVersion": "21.3.1-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-50182", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-50182", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-pip-wheel", "componentVersion": "21.3.1-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-25645", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-25645", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-pip-wheel", "componentVersion": "21.3.1-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2023-45803", "cveSeverity": "MODERATE", "cveCVSS": 4.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-45803", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-pip-wheel", "componentVersion": "21.3.1-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2021-3572", "cveSeverity": "LOW", "cveCVSS": 4.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-3572", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-pip-wheel", "componentVersion": "21.3.1-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-32284", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-32284", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-pip", "componentVersion": "23.2.1-5.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-50181", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-50181", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-pip", "componentVersion": "23.2.1-5.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-50182", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-50182", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-pip", "componentVersion": "23.2.1-5.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-25645", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-25645", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-pip", "componentVersion": "23.2.1-5.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-32284", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-32284", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-pip-wheel", "componentVersion": "23.2.1-5.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-50181", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-50181", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-pip-wheel", "componentVersion": "23.2.1-5.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-50182", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-50182", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-pip-wheel", "componentVersion": "23.2.1-5.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-25645", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-25645", "advisoryId": "", "advisoryInfo": "", "componentName": "python3.12-pip-wheel", "componentVersion": "23.2.1-5.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2023-24607", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-24607", "advisoryId": "", "advisoryInfo": "", "componentName": "qt5-srpm-macros", "componentVersion": "5.15.9-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2021-38593", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-38593", "advisoryId": "", "advisoryInfo": "", "componentName": "qt5-srpm-macros", "componentVersion": "5.15.9-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5683", "cveSeverity": "MODERATE", "cveCVSS": 4.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5683", "advisoryId": "", "advisoryInfo": "", "componentName": "qt5-srpm-macros", "componentVersion": "5.15.9-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-23050", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-23050", "advisoryId": "", "advisoryInfo": "", "componentName": "qt5-srpm-macros", "componentVersion": "5.15.9-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2024-12086", "cveSeverity": "MODERATE", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-12086", "advisoryId": "", "advisoryInfo": "", "componentName": "rsync", "componentVersion": "3.2.5-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-27171", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27171", "advisoryId": "", "advisoryInfo": "", "componentName": "rsync", "componentVersion": "3.2.5-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-29111", "cveSeverity": "MODERATE", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-29111", "advisoryId": "", "advisoryInfo": "", "componentName": "systemd", "componentVersion": "252-55.el9_7.8", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4105", "cveSeverity": "MODERATE", "cveCVSS": 6.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4105", "advisoryId": "", "advisoryInfo": "", "componentName": "systemd", "componentVersion": "252-55.el9_7.8", "componentFixedVersion": "" }, { "cveId": "CVE-2026-29111", "cveSeverity": "MODERATE", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-29111", "advisoryId": "", "advisoryInfo": "", "componentName": "systemd-libs", "componentVersion": "252-55.el9_7.8", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4105", "cveSeverity": "MODERATE", "cveCVSS": 6.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4105", "advisoryId": "", "advisoryInfo": "", "componentName": "systemd-libs", "componentVersion": "252-55.el9_7.8", "componentFixedVersion": "" }, { "cveId": "CVE-2026-29111", "cveSeverity": "MODERATE", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-29111", "advisoryId": "", "advisoryInfo": "", "componentName": "systemd-pam", "componentVersion": "252-55.el9_7.8", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4105", "cveSeverity": "MODERATE", "cveCVSS": 6.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4105", "advisoryId": "", "advisoryInfo": "", "componentName": "systemd-pam", "componentVersion": "252-55.el9_7.8", "componentFixedVersion": "" }, { "cveId": "CVE-2026-29111", "cveSeverity": "MODERATE", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-29111", "advisoryId": "", "advisoryInfo": "", "componentName": "systemd-rpm-macros", "componentVersion": "252-55.el9_7.8", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4105", "cveSeverity": "MODERATE", "cveCVSS": 6.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4105", "advisoryId": "", "advisoryInfo": "", "componentName": "systemd-rpm-macros", "componentVersion": "252-55.el9_7.8", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5704", "cveSeverity": "MODERATE", "cveCVSS": 5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5704", "advisoryId": "", "advisoryInfo": "", "componentName": "tar", "componentVersion": "2:1.34-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-64118", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-64118", "advisoryId": "", "advisoryInfo": "", "componentName": "tar", "componentVersion": "2:1.34-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-33056", "cveSeverity": "MODERATE", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-33056", "advisoryId": "", "advisoryInfo": "", "componentName": "tar", "componentVersion": "2:1.34-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2023-39804", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-39804", "advisoryId": "", "advisoryInfo": "", "componentName": "tar", "componentVersion": "2:1.34-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2024-29040", "cveSeverity": "MODERATE", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-29040", "advisoryId": "", "advisoryInfo": "", "componentName": "tpm2-tss", "componentVersion": "3.2.3-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-27456", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27456", "advisoryId": "", "advisoryInfo": "", "componentName": "util-linux", "componentVersion": "2.37.4-21.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-27456", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27456", "advisoryId": "", "advisoryInfo": "", "componentName": "util-linux-core", "componentVersion": "2.37.4-21.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-27199", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://nvd.nist.gov/vuln/detail/CVE-2026-27199", "advisoryId": "", "advisoryInfo": "", "componentName": "werkzeug", "componentVersion": "3.1.4", "componentFixedVersion": "3.1.6" }, { "cveId": "CVE-2026-21860", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://osv.dev/vulnerability/GHSA-87hc-h4r5-73f7", "advisoryId": "", "advisoryInfo": "", "componentName": "werkzeug", "componentVersion": "3.1.4", "componentFixedVersion": "3.1.5" }, { "cveId": "CVE-2021-31879", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-31879", "advisoryId": "", "advisoryInfo": "", "componentName": "wget", "componentVersion": "1.21.1-8.el9_4", "componentFixedVersion": "" }, { "cveId": "CVE-2024-10524", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-10524", "advisoryId": "", "advisoryInfo": "", "componentName": "wget", "componentVersion": "1.21.1-8.el9_4", "componentFixedVersion": "" }, { "cveId": "CVE-2026-34743", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-34743", "advisoryId": "", "advisoryInfo": "", "componentName": "xz", "componentVersion": "5.2.5-8.el9_0", "componentFixedVersion": "" }, { "cveId": "CVE-2026-34743", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-34743", "advisoryId": "", "advisoryInfo": "", "componentName": "xz-devel", "componentVersion": "5.2.5-8.el9_0", "componentFixedVersion": "" }, { "cveId": "CVE-2026-34743", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-34743", "advisoryId": "", "advisoryInfo": "", "componentName": "xz-libs", "componentVersion": "5.2.5-8.el9_0", "componentFixedVersion": "" }, { "cveId": "CVE-2025-9301", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-9301", "advisoryId": "", "advisoryInfo": "", "componentName": "cmake-filesystem", "componentVersion": "3.26.5-3.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2022-27943", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-27943", "advisoryId": "", "advisoryInfo": "", "componentName": "cpp", "componentVersion": "11.5.0-11.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2024-25260", "cveSeverity": "LOW", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-25260", "advisoryId": "", "advisoryInfo": "", "componentName": "elfutils-debuginfod-client", "componentVersion": "0.193-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1377", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1377", "advisoryId": "", "advisoryInfo": "", "componentName": "elfutils-debuginfod-client", "componentVersion": "0.193-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1371", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1371", "advisoryId": "", "advisoryInfo": "", "componentName": "elfutils-debuginfod-client", "componentVersion": "0.193-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1376", "cveSeverity": "LOW", "cveCVSS": 2.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1376", "advisoryId": "", "advisoryInfo": "", "componentName": "elfutils-debuginfod-client", "componentVersion": "0.193-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2024-25260", "cveSeverity": "LOW", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-25260", "advisoryId": "", "advisoryInfo": "", "componentName": "elfutils-default-yama-scope", "componentVersion": "0.193-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1377", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1377", "advisoryId": "", "advisoryInfo": "", "componentName": "elfutils-default-yama-scope", "componentVersion": "0.193-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1371", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1371", "advisoryId": "", "advisoryInfo": "", "componentName": "elfutils-default-yama-scope", "componentVersion": "0.193-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1376", "cveSeverity": "LOW", "cveCVSS": 2.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1376", "advisoryId": "", "advisoryInfo": "", "componentName": "elfutils-default-yama-scope", "componentVersion": "0.193-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2024-25260", "cveSeverity": "LOW", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-25260", "advisoryId": "", "advisoryInfo": "", "componentName": "elfutils-libelf", "componentVersion": "0.193-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1371", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1371", "advisoryId": "", "advisoryInfo": "", "componentName": "elfutils-libelf", "componentVersion": "0.193-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1377", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1377", "advisoryId": "", "advisoryInfo": "", "componentName": "elfutils-libelf", "componentVersion": "0.193-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1376", "cveSeverity": "LOW", "cveCVSS": 2.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1376", "advisoryId": "", "advisoryInfo": "", "componentName": "elfutils-libelf", "componentVersion": "0.193-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2024-25260", "cveSeverity": "LOW", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-25260", "advisoryId": "", "advisoryInfo": "", "componentName": "elfutils-libs", "componentVersion": "0.193-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1371", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1371", "advisoryId": "", "advisoryInfo": "", "componentName": "elfutils-libs", "componentVersion": "0.193-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1377", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1377", "advisoryId": "", "advisoryInfo": "", "componentName": "elfutils-libs", "componentVersion": "0.193-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1376", "cveSeverity": "LOW", "cveCVSS": 2.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1376", "advisoryId": "", "advisoryInfo": "", "componentName": "elfutils-libs", "componentVersion": "0.193-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2017-1000383", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2017-1000383", "advisoryId": "", "advisoryInfo": "", "componentName": "emacs-filesystem", "componentVersion": "1:27.2-18.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2023-4156", "cveSeverity": "LOW", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-4156", "advisoryId": "", "advisoryInfo": "", "componentName": "gawk", "componentVersion": "5.1.0-6.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-27943", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-27943", "advisoryId": "", "advisoryInfo": "", "componentName": "gcc", "componentVersion": "11.5.0-11.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-27943", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-27943", "advisoryId": "", "advisoryInfo": "", "componentName": "gcc-c++", "componentVersion": "11.5.0-11.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-27943", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-27943", "advisoryId": "", "advisoryInfo": "", "componentName": "gcc-gfortran", "componentVersion": "11.5.0-11.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-27943", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-27943", "advisoryId": "", "advisoryInfo": "", "componentName": "gcc-plugin-annobin", "componentVersion": "11.5.0-11.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-27943", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-27943", "advisoryId": "", "advisoryInfo": "", "componentName": "libgcc", "componentVersion": "11.5.0-11.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-27943", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-27943", "advisoryId": "", "advisoryInfo": "", "componentName": "libgfortran", "componentVersion": "11.5.0-11.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-27943", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-27943", "advisoryId": "", "advisoryInfo": "", "componentName": "libgomp", "componentVersion": "11.5.0-11.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2023-24056", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-24056", "advisoryId": "", "advisoryInfo": "", "componentName": "libpkgconf", "componentVersion": "1.7.3-10.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-27943", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-27943", "advisoryId": "", "advisoryInfo": "", "componentName": "libquadmath", "componentVersion": "11.5.0-11.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-27943", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-27943", "advisoryId": "", "advisoryInfo": "", "componentName": "libquadmath-devel", "componentVersion": "11.5.0-11.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-27943", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-27943", "advisoryId": "", "advisoryInfo": "", "componentName": "libstdc++", "componentVersion": "11.5.0-11.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-27943", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-27943", "advisoryId": "", "advisoryInfo": "", "componentName": "libstdc++-devel", "componentVersion": "11.5.0-11.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-13151", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-13151", "advisoryId": "", "advisoryInfo": "", "componentName": "libtasn1", "componentVersion": "4.16.0-9.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2023-50495", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-50495", "advisoryId": "", "advisoryInfo": "", "componentName": "ncurses", "componentVersion": "6.2-12.20210508.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2023-50495", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-50495", "advisoryId": "", "advisoryInfo": "", "componentName": "ncurses-base", "componentVersion": "6.2-12.20210508.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2023-50495", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-50495", "advisoryId": "", "advisoryInfo": "", "componentName": "ncurses-libs", "componentVersion": "6.2-12.20210508.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-2673", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-2673", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-fips-provider", "componentVersion": "3.0.7-8.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-2673", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-2673", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-fips-provider-so", "componentVersion": "3.0.7-8.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2021-45261", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-45261", "advisoryId": "", "advisoryInfo": "", "componentName": "patch", "componentVersion": "2.7.6-16.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-41409", "cveSeverity": "LOW", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-41409", "advisoryId": "", "advisoryInfo": "", "componentName": "pcre2", "componentVersion": "10.40-6.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-41409", "cveSeverity": "LOW", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-41409", "advisoryId": "", "advisoryInfo": "", "componentName": "pcre2-devel", "componentVersion": "10.40-6.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-41409", "cveSeverity": "LOW", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-41409", "advisoryId": "", "advisoryInfo": "", "componentName": "pcre2-syntax", "componentVersion": "10.40-6.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-41409", "cveSeverity": "LOW", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-41409", "advisoryId": "", "advisoryInfo": "", "componentName": "pcre2-utf16", "componentVersion": "10.40-6.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-41409", "cveSeverity": "LOW", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-41409", "advisoryId": "", "advisoryInfo": "", "componentName": "pcre2-utf32", "componentVersion": "10.40-6.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2023-24056", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-24056", "advisoryId": "", "advisoryInfo": "", "componentName": "pkgconf", "componentVersion": "1.7.3-10.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2023-24056", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-24056", "advisoryId": "", "advisoryInfo": "", "componentName": "pkgconf-m4", "componentVersion": "1.7.3-10.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2023-24056", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-24056", "advisoryId": "", "advisoryInfo": "", "componentName": "pkgconf-pkg-config", "componentVersion": "1.7.3-10.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2024-0232", "cveSeverity": "LOW", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-0232", "advisoryId": "", "advisoryInfo": "", "componentName": "sqlite", "componentVersion": "3.34.1-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-70873", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-70873", "advisoryId": "", "advisoryInfo": "", "componentName": "sqlite", "componentVersion": "3.34.1-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2024-0232", "cveSeverity": "LOW", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-0232", "advisoryId": "", "advisoryInfo": "", "componentName": "sqlite-devel", "componentVersion": "3.34.1-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-70873", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-70873", "advisoryId": "", "advisoryInfo": "", "componentName": "sqlite-devel", "componentVersion": "3.34.1-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2024-0232", "cveSeverity": "LOW", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-0232", "advisoryId": "", "advisoryInfo": "", "componentName": "sqlite-libs", "componentVersion": "3.34.1-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-70873", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-70873", "advisoryId": "", "advisoryInfo": "", "componentName": "sqlite-libs", "componentVersion": "3.34.1-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2022-0529", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-0529", "advisoryId": "", "advisoryInfo": "", "componentName": "unzip", "componentVersion": "6.0-59.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-0530", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-0530", "advisoryId": "", "advisoryInfo": "", "componentName": "unzip", "componentVersion": "6.0-59.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2021-4217", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-4217", "advisoryId": "", "advisoryInfo": "", "componentName": "unzip", "componentVersion": "6.0-59.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-27171", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27171", "advisoryId": "", "advisoryInfo": "", "componentName": "zlib", "componentVersion": "1.2.11-40.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-27171", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27171", "advisoryId": "", "advisoryInfo": "", "componentName": "zlib-devel", "componentVersion": "1.2.11-40.el9", "componentFixedVersion": "" } ] } } ACS_IMAGE_SCAN_EYECATCHER_END