{
  "matches": [
    {
      "vulnerability": {
        "id": "CVE-2017-17740",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2017-17740",
        "namespace": "debian:distro:debian:13",
        "severity": "Negligible",
        "urls": [],
        "description": "contrib/slapd-modules/nops/nops.c in OpenLDAP through 2.4.45, when both the nops module and the memberof overlay are enabled, attempts to free a buffer that was allocated on the stack, which allows remote attackers to cause a denial of service (slapd crash) via a member MODDN operation.",
        "cvss": [],
        "epss": [
          {
            "cve": "CVE-2017-17740",
            "epss": 0.06138,
            "percentile": 0.90838,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2017-17740",
            "cwe": "CWE-119",
            "source": "nvd@nist.gov",
            "type": "Primary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.3069
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2017-17740",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2017-17740",
          "namespace": "nvd:cpe",
          "severity": "High",
          "urls": [
            "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html",
            "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html",
            "http://www.openldap.org/its/index.cgi/Incoming?id=8759",
            "https://kc.mcafee.com/corporate/index?page=content&id=SB10365",
            "https://www.oracle.com/security-alerts/cpuapr2022.html"
          ],
          "description": "contrib/slapd-modules/nops/nops.c in OpenLDAP through 2.4.45, when both the nops module and the memberof overlay are enabled, attempts to free a buffer that was allocated on the stack, which allows remote attackers to cause a denial of service (slapd crash) via a member MODDN operation.",
          "cvss": [
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "metrics": {
                "baseScore": 7.5,
                "exploitabilityScore": 3.9,
                "impactScore": 3.6
              },
              "vendorMetadata": {}
            },
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "2.0",
              "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
              "metrics": {
                "baseScore": 5,
                "exploitabilityScore": 10,
                "impactScore": 2.9
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2017-17740",
              "epss": 0.06138,
              "percentile": 0.90838,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2017-17740",
              "cwe": "CWE-119",
              "source": "nvd@nist.gov",
              "type": "Primary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "openldap",
              "version": "2.6.10+dfsg-1"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2017-17740",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "46230cf5226e2e82",
        "name": "libldap2",
        "version": "2.6.10+dfsg-1",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libldap2",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libldap2",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libldap2:libldap2:2.6.10\\+dfsg-1:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libldap2@2.6.10%2Bdfsg-1?arch=amd64&distro=debian-13&upstream=openldap",
        "upstreams": [
          {
            "name": "openldap"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2011-3389",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2011-3389",
        "namespace": "debian:distro:debian:13",
        "severity": "Negligible",
        "urls": [],
        "description": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
        "cvss": [],
        "epss": [
          {
            "cve": "CVE-2011-3389",
            "epss": 0.03933,
            "percentile": 0.88362,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2011-3389",
            "cwe": "CWE-326",
            "source": "nvd@nist.gov",
            "type": "Primary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.19665
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2011-3389",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389",
          "namespace": "nvd:cpe",
          "severity": "Medium",
          "urls": [
            "http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/",
            "http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx",
            "http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx",
            "http://curl.haxx.se/docs/adv_20120124B.html",
            "http://downloads.asterisk.org/pub/security/AST-2016-001.html",
            "http://ekoparty.org/2011/juliano-rizzo.php",
            "http://eprint.iacr.org/2004/111",
            "http://eprint.iacr.org/2006/136",
            "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html",
            "http://isc.sans.edu/diary/SSL+TLS+part+3+/11635",
            "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html",
            "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html",
            "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html",
            "http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html",
            "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html",
            "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html",
            "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html",
            "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html",
            "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html",
            "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html",
            "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html",
            "http://marc.info/?l=bugtraq&m=132750579901589&w=2",
            "http://marc.info/?l=bugtraq&m=132872385320240&w=2",
            "http://marc.info/?l=bugtraq&m=133365109612558&w=2",
            "http://marc.info/?l=bugtraq&m=133728004526190&w=2",
            "http://marc.info/?l=bugtraq&m=134254866602253&w=2",
            "http://marc.info/?l=bugtraq&m=134254957702612&w=2",
            "http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue",
            "http://osvdb.org/74829",
            "http://rhn.redhat.com/errata/RHSA-2012-0508.html",
            "http://rhn.redhat.com/errata/RHSA-2013-1455.html",
            "http://secunia.com/advisories/45791",
            "http://secunia.com/advisories/47998",
            "http://secunia.com/advisories/48256",
            "http://secunia.com/advisories/48692",
            "http://secunia.com/advisories/48915",
            "http://secunia.com/advisories/48948",
            "http://secunia.com/advisories/49198",
            "http://secunia.com/advisories/55322",
            "http://secunia.com/advisories/55350",
            "http://secunia.com/advisories/55351",
            "http://security.gentoo.org/glsa/glsa-201203-02.xml",
            "http://security.gentoo.org/glsa/glsa-201406-32.xml",
            "http://support.apple.com/kb/HT4999",
            "http://support.apple.com/kb/HT5001",
            "http://support.apple.com/kb/HT5130",
            "http://support.apple.com/kb/HT5281",
            "http://support.apple.com/kb/HT5501",
            "http://support.apple.com/kb/HT6150",
            "http://technet.microsoft.com/security/advisory/2588513",
            "http://vnhacker.blogspot.com/2011/09/beast.html",
            "http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf",
            "http://www.debian.org/security/2012/dsa-2398",
            "http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html",
            "http://www.ibm.com/developerworks/java/jdk/alerts/",
            "http://www.imperialviolet.org/2011/09/23/chromeandbeast.html",
            "http://www.insecure.cl/Beast-SSL.rar",
            "http://www.kb.cert.org/vuls/id/864643",
            "http://www.mandriva.com/security/advisories?name=MDVSA-2012:058",
            "http://www.opera.com/docs/changelogs/mac/1151/",
            "http://www.opera.com/docs/changelogs/mac/1160/",
            "http://www.opera.com/docs/changelogs/unix/1151/",
            "http://www.opera.com/docs/changelogs/unix/1160/",
            "http://www.opera.com/docs/changelogs/windows/1151/",
            "http://www.opera.com/docs/changelogs/windows/1160/",
            "http://www.opera.com/support/kb/view/1004/",
            "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
            "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
            "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
            "http://www.redhat.com/support/errata/RHSA-2011-1384.html",
            "http://www.redhat.com/support/errata/RHSA-2012-0006.html",
            "http://www.securityfocus.com/bid/49388",
            "http://www.securityfocus.com/bid/49778",
            "http://www.securitytracker.com/id/1029190",
            "http://www.securitytracker.com/id?1025997",
            "http://www.securitytracker.com/id?1026103",
            "http://www.securitytracker.com/id?1026704",
            "http://www.ubuntu.com/usn/USN-1263-1",
            "http://www.us-cert.gov/cas/techalerts/TA12-010A.html",
            "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail",
            "https://bugzilla.novell.com/show_bug.cgi?id=719047",
            "https://bugzilla.redhat.com/show_bug.cgi?id=737506",
            "https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf",
            "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006",
            "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862",
            "https://hermes.opensuse.org/messages/13154861",
            "https://hermes.opensuse.org/messages/13155432",
            "https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02",
            "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752"
          ],
          "description": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
          "cvss": [
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "2.0",
              "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
              "metrics": {
                "baseScore": 4.3,
                "exploitabilityScore": 8.6,
                "impactScore": 2.9
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2011-3389",
              "epss": 0.03933,
              "percentile": 0.88362,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2011-3389",
              "cwe": "CWE-326",
              "source": "nvd@nist.gov",
              "type": "Primary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "gnutls28",
              "version": "3.8.9-3+deb13u2"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2011-3389",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "3c7a5e6105f5c289",
        "name": "libgnutls30t64",
        "version": "3.8.9-3+deb13u2",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libgnutls30t64",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libgnutls30t64",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libgnutls30t64:libgnutls30t64:3.8.9-3\\+deb13u2:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libgnutls30t64@3.8.9-3%2Bdeb13u2?arch=amd64&distro=debian-13&upstream=gnutls28",
        "upstreams": [
          {
            "name": "gnutls28"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2015-3276",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2015-3276",
        "namespace": "debian:distro:debian:13",
        "severity": "Negligible",
        "urls": [],
        "description": "The nss_parse_ciphers function in libraries/libldap/tls_m.c in OpenLDAP does not properly parse OpenSSL-style multi-keyword mode cipher strings, which might cause a weaker than intended cipher to be used and allow remote attackers to have unspecified impact via unknown vectors.",
        "cvss": [],
        "epss": [
          {
            "cve": "CVE-2015-3276",
            "epss": 0.01912,
            "percentile": 0.83361,
            "date": "2026-04-27"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.09560000000000002
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2015-3276",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2015-3276",
          "namespace": "nvd:cpe",
          "severity": "High",
          "urls": [
            "http://rhn.redhat.com/errata/RHSA-2015-2131.html",
            "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
            "http://www.securitytracker.com/id/1034221",
            "https://bugzilla.redhat.com/show_bug.cgi?id=1238322"
          ],
          "description": "The nss_parse_ciphers function in libraries/libldap/tls_m.c in OpenLDAP does not properly parse OpenSSL-style multi-keyword mode cipher strings, which might cause a weaker than intended cipher to be used and allow remote attackers to have unspecified impact via unknown vectors.",
          "cvss": [
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
              "metrics": {
                "baseScore": 7.5,
                "exploitabilityScore": 3.9,
                "impactScore": 3.6
              },
              "vendorMetadata": {}
            },
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "2.0",
              "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
              "metrics": {
                "baseScore": 5,
                "exploitabilityScore": 10,
                "impactScore": 2.9
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2015-3276",
              "epss": 0.01912,
              "percentile": 0.83361,
              "date": "2026-04-27"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "openldap",
              "version": "2.6.10+dfsg-1"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2015-3276",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "46230cf5226e2e82",
        "name": "libldap2",
        "version": "2.6.10+dfsg-1",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libldap2",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libldap2",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libldap2:libldap2:2.6.10\\+dfsg-1:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libldap2@2.6.10%2Bdfsg-1?arch=amd64&distro=debian-13&upstream=openldap",
        "upstreams": [
          {
            "name": "openldap"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2018-20796",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2018-20796",
        "namespace": "debian:distro:debian:13",
        "severity": "Negligible",
        "urls": [],
        "description": "In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(\\227|)(\\\\1\\\\1|t1|\\\\\\2537)+' in grep.",
        "cvss": [],
        "epss": [
          {
            "cve": "CVE-2018-20796",
            "epss": 0.01492,
            "percentile": 0.8113,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2018-20796",
            "cwe": "CWE-674",
            "source": "nvd@nist.gov",
            "type": "Primary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.0746
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2018-20796",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2018-20796",
          "namespace": "nvd:cpe",
          "severity": "High",
          "urls": [
            "http://www.securityfocus.com/bid/107160",
            "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141",
            "https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html",
            "https://security.netapp.com/advisory/ntap-20190315-0002/",
            "https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp%3Butm_medium=RSS"
          ],
          "description": "In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(\\227|)(\\\\1\\\\1|t1|\\\\\\2537)+' in grep.",
          "cvss": [
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "3.0",
              "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "metrics": {
                "baseScore": 7.5,
                "exploitabilityScore": 3.9,
                "impactScore": 3.6
              },
              "vendorMetadata": {}
            },
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "2.0",
              "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
              "metrics": {
                "baseScore": 5,
                "exploitabilityScore": 10,
                "impactScore": 2.9
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2018-20796",
              "epss": 0.01492,
              "percentile": 0.8113,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2018-20796",
              "cwe": "CWE-674",
              "source": "nvd@nist.gov",
              "type": "Primary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "glibc",
              "version": "2.41-12+deb13u2"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2018-20796",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "5e21ad3d95f6eebc",
        "name": "libc6",
        "version": "2.41-12+deb13u2",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libc6",
            "layerID": "sha256:318bc252656ce5b3c77fc9a13e302bba683f813d4b19c21be6e0ad3acc7adaf1",
            "accessPath": "/var/lib/dpkg/status.d/libc6",
            "annotations": {
              "evidence": "primary"
            }
          },
          {
            "path": "/usr/share/doc/libc6/copyright",
            "layerID": "sha256:318bc252656ce5b3c77fc9a13e302bba683f813d4b19c21be6e0ad3acc7adaf1",
            "accessPath": "/usr/share/doc/libc6/copyright",
            "annotations": {
              "evidence": "supporting"
            }
          },
          {
            "path": "/var/lib/dpkg/status.d/libc6.md5sums",
            "layerID": "sha256:318bc252656ce5b3c77fc9a13e302bba683f813d4b19c21be6e0ad3acc7adaf1",
            "accessPath": "/var/lib/dpkg/status.d/libc6.md5sums",
            "annotations": {
              "evidence": "supporting"
            }
          }
        ],
        "language": "",
        "licenses": [
          "BSD-2-clause",
          "BSD-3-clause-Berkeley",
          "BSD-3-clause-Carnegie",
          "BSD-3-clause-Oracle",
          "BSD-3-clause-WIDE",
          "BSD-like-Spencer",
          "BSL-1.0",
          "CORE-MATH",
          "Carnegie",
          "DEC",
          "FSFAP",
          "GPL-2",
          "GPL-2+",
          "GPL-2+-with-link-exception",
          "GPL-3",
          "GPL-3+",
          "IBM",
          "ISC",
          "Inner-Net",
          "LGPL-2",
          "LGPL-2+",
          "LGPL-2.1",
          "LGPL-2.1+",
          "LGPL-2.1+-with-link-exception",
          "LGPL-3",
          "LGPL-3+",
          "MIT-like-Lord",
          "PCRE",
          "SunPro",
          "Unicode-DFS-2016",
          "Univ-Coimbra",
          "public-domain"
        ],
        "cpes": [
          "cpe:2.3:a:libc6:libc6:2.41-12\\+deb13u2:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libc6@2.41-12%2Bdeb13u2?arch=amd64&distro=debian-13&upstream=glibc",
        "upstreams": [
          {
            "name": "glibc"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2018-5709",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2018-5709",
        "namespace": "debian:distro:debian:13",
        "severity": "Negligible",
        "urls": [],
        "description": "An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable \"dbentry->n_key_data\" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a \"u4\" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.",
        "cvss": [],
        "epss": [
          {
            "cve": "CVE-2018-5709",
            "epss": 0.01188,
            "percentile": 0.78866,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2018-5709",
            "cwe": "CWE-190",
            "source": "nvd@nist.gov",
            "type": "Primary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.0594
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2018-5709",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2018-5709",
          "namespace": "nvd:cpe",
          "severity": "High",
          "urls": [
            "https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow",
            "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E"
          ],
          "description": "An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable \"dbentry->n_key_data\" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a \"u4\" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.",
          "cvss": [
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "3.0",
              "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
              "metrics": {
                "baseScore": 7.5,
                "exploitabilityScore": 3.9,
                "impactScore": 3.6
              },
              "vendorMetadata": {}
            },
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "2.0",
              "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
              "metrics": {
                "baseScore": 5,
                "exploitabilityScore": 10,
                "impactScore": 2.9
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2018-5709",
              "epss": 0.01188,
              "percentile": 0.78866,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2018-5709",
              "cwe": "CWE-190",
              "source": "nvd@nist.gov",
              "type": "Primary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "krb5",
              "version": "1.21.3-5"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2018-5709",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "b6ee860d702b8084",
        "name": "libgssapi-krb5-2",
        "version": "1.21.3-5",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libgssapi-krb5-2",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libgssapi-krb5-2",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libgssapi-krb5-2:libgssapi-krb5-2:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libgssapi-krb5-2:libgssapi_krb5_2:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libgssapi_krb5_2:libgssapi-krb5-2:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libgssapi_krb5_2:libgssapi_krb5_2:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libgssapi-krb5:libgssapi-krb5-2:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libgssapi-krb5:libgssapi_krb5_2:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libgssapi_krb5:libgssapi-krb5-2:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libgssapi_krb5:libgssapi_krb5_2:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libgssapi:libgssapi-krb5-2:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libgssapi:libgssapi_krb5_2:1.21.3-5:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libgssapi-krb5-2@1.21.3-5?arch=amd64&distro=debian-13&upstream=krb5",
        "upstreams": [
          {
            "name": "krb5"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2018-5709",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2018-5709",
        "namespace": "debian:distro:debian:13",
        "severity": "Negligible",
        "urls": [],
        "description": "An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable \"dbentry->n_key_data\" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a \"u4\" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.",
        "cvss": [],
        "epss": [
          {
            "cve": "CVE-2018-5709",
            "epss": 0.01188,
            "percentile": 0.78866,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2018-5709",
            "cwe": "CWE-190",
            "source": "nvd@nist.gov",
            "type": "Primary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.0594
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2018-5709",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2018-5709",
          "namespace": "nvd:cpe",
          "severity": "High",
          "urls": [
            "https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow",
            "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E"
          ],
          "description": "An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable \"dbentry->n_key_data\" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a \"u4\" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.",
          "cvss": [
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "3.0",
              "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
              "metrics": {
                "baseScore": 7.5,
                "exploitabilityScore": 3.9,
                "impactScore": 3.6
              },
              "vendorMetadata": {}
            },
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "2.0",
              "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
              "metrics": {
                "baseScore": 5,
                "exploitabilityScore": 10,
                "impactScore": 2.9
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2018-5709",
              "epss": 0.01188,
              "percentile": 0.78866,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2018-5709",
              "cwe": "CWE-190",
              "source": "nvd@nist.gov",
              "type": "Primary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "krb5",
              "version": "1.21.3-5"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2018-5709",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "52ef833c1503e21a",
        "name": "libk5crypto3",
        "version": "1.21.3-5",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libk5crypto3",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libk5crypto3",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libk5crypto3:libk5crypto3:1.21.3-5:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libk5crypto3@1.21.3-5?arch=amd64&distro=debian-13&upstream=krb5",
        "upstreams": [
          {
            "name": "krb5"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2018-5709",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2018-5709",
        "namespace": "debian:distro:debian:13",
        "severity": "Negligible",
        "urls": [],
        "description": "An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable \"dbentry->n_key_data\" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a \"u4\" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.",
        "cvss": [],
        "epss": [
          {
            "cve": "CVE-2018-5709",
            "epss": 0.01188,
            "percentile": 0.78866,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2018-5709",
            "cwe": "CWE-190",
            "source": "nvd@nist.gov",
            "type": "Primary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.0594
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2018-5709",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2018-5709",
          "namespace": "nvd:cpe",
          "severity": "High",
          "urls": [
            "https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow",
            "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E"
          ],
          "description": "An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable \"dbentry->n_key_data\" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a \"u4\" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.",
          "cvss": [
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "3.0",
              "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
              "metrics": {
                "baseScore": 7.5,
                "exploitabilityScore": 3.9,
                "impactScore": 3.6
              },
              "vendorMetadata": {}
            },
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "2.0",
              "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
              "metrics": {
                "baseScore": 5,
                "exploitabilityScore": 10,
                "impactScore": 2.9
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2018-5709",
              "epss": 0.01188,
              "percentile": 0.78866,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2018-5709",
              "cwe": "CWE-190",
              "source": "nvd@nist.gov",
              "type": "Primary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "krb5",
              "version": "1.21.3-5"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2018-5709",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "d4c94f2fc66f3184",
        "name": "libkrb5-3",
        "version": "1.21.3-5",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libkrb5-3",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libkrb5-3",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libkrb5-3:libkrb5-3:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libkrb5-3:libkrb5_3:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libkrb5_3:libkrb5-3:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libkrb5_3:libkrb5_3:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libkrb5:libkrb5-3:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libkrb5:libkrb5_3:1.21.3-5:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libkrb5-3@1.21.3-5?arch=amd64&distro=debian-13&upstream=krb5",
        "upstreams": [
          {
            "name": "krb5"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2018-5709",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2018-5709",
        "namespace": "debian:distro:debian:13",
        "severity": "Negligible",
        "urls": [],
        "description": "An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable \"dbentry->n_key_data\" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a \"u4\" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.",
        "cvss": [],
        "epss": [
          {
            "cve": "CVE-2018-5709",
            "epss": 0.01188,
            "percentile": 0.78866,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2018-5709",
            "cwe": "CWE-190",
            "source": "nvd@nist.gov",
            "type": "Primary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.0594
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2018-5709",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2018-5709",
          "namespace": "nvd:cpe",
          "severity": "High",
          "urls": [
            "https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow",
            "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E"
          ],
          "description": "An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable \"dbentry->n_key_data\" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a \"u4\" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.",
          "cvss": [
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "3.0",
              "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
              "metrics": {
                "baseScore": 7.5,
                "exploitabilityScore": 3.9,
                "impactScore": 3.6
              },
              "vendorMetadata": {}
            },
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "2.0",
              "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
              "metrics": {
                "baseScore": 5,
                "exploitabilityScore": 10,
                "impactScore": 2.9
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2018-5709",
              "epss": 0.01188,
              "percentile": 0.78866,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2018-5709",
              "cwe": "CWE-190",
              "source": "nvd@nist.gov",
              "type": "Primary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "krb5",
              "version": "1.21.3-5"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2018-5709",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "56fc39be304d53f0",
        "name": "libkrb5support0",
        "version": "1.21.3-5",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libkrb5support0",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libkrb5support0",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libkrb5support0:libkrb5support0:1.21.3-5:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libkrb5support0@1.21.3-5?arch=amd64&distro=debian-13&upstream=krb5",
        "upstreams": [
          {
            "name": "krb5"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2025-13151",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2025-13151",
        "namespace": "debian:distro:debian:13",
        "severity": "High",
        "urls": [],
        "description": "Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string.",
        "cvss": [
          {
            "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "type": "Secondary",
            "version": "3.1",
            "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "metrics": {
              "baseScore": 7.5,
              "exploitabilityScore": 3.9,
              "impactScore": 3.6
            },
            "vendorMetadata": {}
          }
        ],
        "epss": [
          {
            "cve": "CVE-2025-13151",
            "epss": 0.00062,
            "percentile": 0.19196,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2025-13151",
            "cwe": "CWE-787",
            "source": "nvd@nist.gov",
            "type": "Primary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "wont-fix"
        },
        "advisories": [],
        "risk": 0.0465
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2025-13151",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2025-13151",
          "namespace": "nvd:cpe",
          "severity": "High",
          "urls": [
            "https://gitlab.com/gnutls/libtasn1",
            "https://gitlab.com/gnutls/libtasn1/-/merge_requests/121",
            "http://www.openwall.com/lists/oss-security/2026/01/08/5",
            "https://www.kb.cert.org/vuls/id/271649"
          ],
          "description": "Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string.",
          "cvss": [
            {
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "metrics": {
                "baseScore": 7.5,
                "exploitabilityScore": 3.9,
                "impactScore": 3.6
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2025-13151",
              "epss": 0.00062,
              "percentile": 0.19196,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2025-13151",
              "cwe": "CWE-787",
              "source": "nvd@nist.gov",
              "type": "Primary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-direct-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "libtasn1-6",
              "version": "4.20.0-2"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2025-13151",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "04ef2a4cf087de67",
        "name": "libtasn1-6",
        "version": "4.20.0-2",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libtasn1-6",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libtasn1-6",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libtasn1-6:libtasn1-6:4.20.0-2:*:*:*:*:*:*:*",
          "cpe:2.3:a:libtasn1-6:libtasn1_6:4.20.0-2:*:*:*:*:*:*:*",
          "cpe:2.3:a:libtasn1_6:libtasn1-6:4.20.0-2:*:*:*:*:*:*:*",
          "cpe:2.3:a:libtasn1_6:libtasn1_6:4.20.0-2:*:*:*:*:*:*:*",
          "cpe:2.3:a:libtasn1:libtasn1-6:4.20.0-2:*:*:*:*:*:*:*",
          "cpe:2.3:a:libtasn1:libtasn1_6:4.20.0-2:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libtasn1-6@4.20.0-2?arch=amd64&distro=debian-13",
        "upstreams": []
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2026-5450",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2026-5450",
        "namespace": "debian:distro:debian:13",
        "severity": "Critical",
        "urls": [],
        "description": "Calling the scanf family of functions with a %mc (malloc'd character match) in the GNU C Library version 2.7 to version 2.43 with a format width specifier with an explicit width greater than 1024 could result in a one byte heap buffer overflow.",
        "cvss": [
          {
            "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "type": "Secondary",
            "version": "3.1",
            "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "metrics": {
              "baseScore": 9.8,
              "exploitabilityScore": 3.9,
              "impactScore": 5.9
            },
            "vendorMetadata": {}
          }
        ],
        "epss": [
          {
            "cve": "CVE-2026-5450",
            "epss": 0.00049,
            "percentile": 0.1526,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2026-5450",
            "cwe": "CWE-122",
            "source": "3ff69d7a-14f2-4f67-a097-88dee7810d18",
            "type": "Secondary"
          },
          {
            "cve": "CVE-2026-5450",
            "cwe": "CWE-787",
            "source": "nvd@nist.gov",
            "type": "Primary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "wont-fix"
        },
        "advisories": [],
        "risk": 0.046060000000000004
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2026-5450",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2026-5450",
          "namespace": "nvd:cpe",
          "severity": "Critical",
          "urls": [
            "https://inbox.sourceware.org/libc-announce/b11f0003-6ec1-4bd6-b9de-9e38a4efeca3@redhat.com/T/#u",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=CVE-2026-5450"
          ],
          "description": "Calling the scanf family of functions with a %mc (malloc'd character match) in the GNU C Library version 2.7 to version 2.43 with a format width specifier with an explicit width greater than 1024 could result in a one byte heap buffer overflow.",
          "cvss": [
            {
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "metrics": {
                "baseScore": 9.8,
                "exploitabilityScore": 3.9,
                "impactScore": 5.9
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2026-5450",
              "epss": 0.00049,
              "percentile": 0.1526,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2026-5450",
              "cwe": "CWE-122",
              "source": "3ff69d7a-14f2-4f67-a097-88dee7810d18",
              "type": "Secondary"
            },
            {
              "cve": "CVE-2026-5450",
              "cwe": "CWE-787",
              "source": "nvd@nist.gov",
              "type": "Primary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "glibc",
              "version": "2.41-12+deb13u2"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2026-5450",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "5e21ad3d95f6eebc",
        "name": "libc6",
        "version": "2.41-12+deb13u2",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libc6",
            "layerID": "sha256:318bc252656ce5b3c77fc9a13e302bba683f813d4b19c21be6e0ad3acc7adaf1",
            "accessPath": "/var/lib/dpkg/status.d/libc6",
            "annotations": {
              "evidence": "primary"
            }
          },
          {
            "path": "/usr/share/doc/libc6/copyright",
            "layerID": "sha256:318bc252656ce5b3c77fc9a13e302bba683f813d4b19c21be6e0ad3acc7adaf1",
            "accessPath": "/usr/share/doc/libc6/copyright",
            "annotations": {
              "evidence": "supporting"
            }
          },
          {
            "path": "/var/lib/dpkg/status.d/libc6.md5sums",
            "layerID": "sha256:318bc252656ce5b3c77fc9a13e302bba683f813d4b19c21be6e0ad3acc7adaf1",
            "accessPath": "/var/lib/dpkg/status.d/libc6.md5sums",
            "annotations": {
              "evidence": "supporting"
            }
          }
        ],
        "language": "",
        "licenses": [
          "BSD-2-clause",
          "BSD-3-clause-Berkeley",
          "BSD-3-clause-Carnegie",
          "BSD-3-clause-Oracle",
          "BSD-3-clause-WIDE",
          "BSD-like-Spencer",
          "BSL-1.0",
          "CORE-MATH",
          "Carnegie",
          "DEC",
          "FSFAP",
          "GPL-2",
          "GPL-2+",
          "GPL-2+-with-link-exception",
          "GPL-3",
          "GPL-3+",
          "IBM",
          "ISC",
          "Inner-Net",
          "LGPL-2",
          "LGPL-2+",
          "LGPL-2.1",
          "LGPL-2.1+",
          "LGPL-2.1+-with-link-exception",
          "LGPL-3",
          "LGPL-3+",
          "MIT-like-Lord",
          "PCRE",
          "SunPro",
          "Unicode-DFS-2016",
          "Univ-Coimbra",
          "public-domain"
        ],
        "cpes": [
          "cpe:2.3:a:libc6:libc6:2.41-12\\+deb13u2:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libc6@2.41-12%2Bdeb13u2?arch=amd64&distro=debian-13&upstream=glibc",
        "upstreams": [
          {
            "name": "glibc"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2019-1010025",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2019-1010025",
        "namespace": "debian:distro:debian:13",
        "severity": "Negligible",
        "urls": [],
        "description": "GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor's position is \"ASLR bypass itself is not a vulnerability.",
        "cvss": [],
        "epss": [
          {
            "cve": "CVE-2019-1010025",
            "epss": 0.00856,
            "percentile": 0.75042,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2019-1010025",
            "cwe": "CWE-330",
            "source": "nvd@nist.gov",
            "type": "Primary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.0428
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2019-1010025",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2019-1010025",
          "namespace": "nvd:cpe",
          "severity": "Medium",
          "urls": [
            "https://security-tracker.debian.org/tracker/CVE-2019-1010025",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=22853",
            "https://support.f5.com/csp/article/K06046097",
            "https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp%3Butm_medium=RSS",
            "https://ubuntu.com/security/CVE-2019-1010025"
          ],
          "description": "GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor's position is \"ASLR bypass itself is not a vulnerability.",
          "cvss": [
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "3.0",
              "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "metrics": {
                "baseScore": 5.3,
                "exploitabilityScore": 3.9,
                "impactScore": 1.5
              },
              "vendorMetadata": {}
            },
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "2.0",
              "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
              "metrics": {
                "baseScore": 5,
                "exploitabilityScore": 10,
                "impactScore": 2.9
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2019-1010025",
              "epss": 0.00856,
              "percentile": 0.75042,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2019-1010025",
              "cwe": "CWE-330",
              "source": "nvd@nist.gov",
              "type": "Primary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "glibc",
              "version": "2.41-12+deb13u2"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2019-1010025",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "5e21ad3d95f6eebc",
        "name": "libc6",
        "version": "2.41-12+deb13u2",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libc6",
            "layerID": "sha256:318bc252656ce5b3c77fc9a13e302bba683f813d4b19c21be6e0ad3acc7adaf1",
            "accessPath": "/var/lib/dpkg/status.d/libc6",
            "annotations": {
              "evidence": "primary"
            }
          },
          {
            "path": "/usr/share/doc/libc6/copyright",
            "layerID": "sha256:318bc252656ce5b3c77fc9a13e302bba683f813d4b19c21be6e0ad3acc7adaf1",
            "accessPath": "/usr/share/doc/libc6/copyright",
            "annotations": {
              "evidence": "supporting"
            }
          },
          {
            "path": "/var/lib/dpkg/status.d/libc6.md5sums",
            "layerID": "sha256:318bc252656ce5b3c77fc9a13e302bba683f813d4b19c21be6e0ad3acc7adaf1",
            "accessPath": "/var/lib/dpkg/status.d/libc6.md5sums",
            "annotations": {
              "evidence": "supporting"
            }
          }
        ],
        "language": "",
        "licenses": [
          "BSD-2-clause",
          "BSD-3-clause-Berkeley",
          "BSD-3-clause-Carnegie",
          "BSD-3-clause-Oracle",
          "BSD-3-clause-WIDE",
          "BSD-like-Spencer",
          "BSL-1.0",
          "CORE-MATH",
          "Carnegie",
          "DEC",
          "FSFAP",
          "GPL-2",
          "GPL-2+",
          "GPL-2+-with-link-exception",
          "GPL-3",
          "GPL-3+",
          "IBM",
          "ISC",
          "Inner-Net",
          "LGPL-2",
          "LGPL-2+",
          "LGPL-2.1",
          "LGPL-2.1+",
          "LGPL-2.1+-with-link-exception",
          "LGPL-3",
          "LGPL-3+",
          "MIT-like-Lord",
          "PCRE",
          "SunPro",
          "Unicode-DFS-2016",
          "Univ-Coimbra",
          "public-domain"
        ],
        "cpes": [
          "cpe:2.3:a:libc6:libc6:2.41-12\\+deb13u2:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libc6@2.41-12%2Bdeb13u2?arch=amd64&distro=debian-13&upstream=glibc",
        "upstreams": [
          {
            "name": "glibc"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2019-9192",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2019-9192",
        "namespace": "debian:distro:debian:13",
        "severity": "Negligible",
        "urls": [],
        "description": "In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(|)(\\\\1\\\\1)*' in grep, a different issue than CVE-2018-20796. NOTE: the software maintainer disputes that this is a vulnerability because the behavior occurs only with a crafted pattern",
        "cvss": [],
        "epss": [
          {
            "cve": "CVE-2019-9192",
            "epss": 0.0079,
            "percentile": 0.73957,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2019-9192",
            "cwe": "CWE-674",
            "source": "nvd@nist.gov",
            "type": "Primary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.03950000000000001
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2019-9192",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2019-9192",
          "namespace": "nvd:cpe",
          "severity": "High",
          "urls": [
            "https://sourceware.org/bugzilla/show_bug.cgi?id=24269",
            "https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp%3Butm_medium=RSS"
          ],
          "description": "In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(|)(\\\\1\\\\1)*' in grep, a different issue than CVE-2018-20796. NOTE: the software maintainer disputes that this is a vulnerability because the behavior occurs only with a crafted pattern",
          "cvss": [
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "3.0",
              "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "metrics": {
                "baseScore": 7.5,
                "exploitabilityScore": 3.9,
                "impactScore": 3.6
              },
              "vendorMetadata": {}
            },
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "2.0",
              "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
              "metrics": {
                "baseScore": 5,
                "exploitabilityScore": 10,
                "impactScore": 2.9
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2019-9192",
              "epss": 0.0079,
              "percentile": 0.73957,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2019-9192",
              "cwe": "CWE-674",
              "source": "nvd@nist.gov",
              "type": "Primary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "glibc",
              "version": "2.41-12+deb13u2"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2019-9192",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "5e21ad3d95f6eebc",
        "name": "libc6",
        "version": "2.41-12+deb13u2",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libc6",
            "layerID": "sha256:318bc252656ce5b3c77fc9a13e302bba683f813d4b19c21be6e0ad3acc7adaf1",
            "accessPath": "/var/lib/dpkg/status.d/libc6",
            "annotations": {
              "evidence": "primary"
            }
          },
          {
            "path": "/usr/share/doc/libc6/copyright",
            "layerID": "sha256:318bc252656ce5b3c77fc9a13e302bba683f813d4b19c21be6e0ad3acc7adaf1",
            "accessPath": "/usr/share/doc/libc6/copyright",
            "annotations": {
              "evidence": "supporting"
            }
          },
          {
            "path": "/var/lib/dpkg/status.d/libc6.md5sums",
            "layerID": "sha256:318bc252656ce5b3c77fc9a13e302bba683f813d4b19c21be6e0ad3acc7adaf1",
            "accessPath": "/var/lib/dpkg/status.d/libc6.md5sums",
            "annotations": {
              "evidence": "supporting"
            }
          }
        ],
        "language": "",
        "licenses": [
          "BSD-2-clause",
          "BSD-3-clause-Berkeley",
          "BSD-3-clause-Carnegie",
          "BSD-3-clause-Oracle",
          "BSD-3-clause-WIDE",
          "BSD-like-Spencer",
          "BSL-1.0",
          "CORE-MATH",
          "Carnegie",
          "DEC",
          "FSFAP",
          "GPL-2",
          "GPL-2+",
          "GPL-2+-with-link-exception",
          "GPL-3",
          "GPL-3+",
          "IBM",
          "ISC",
          "Inner-Net",
          "LGPL-2",
          "LGPL-2+",
          "LGPL-2.1",
          "LGPL-2.1+",
          "LGPL-2.1+-with-link-exception",
          "LGPL-3",
          "LGPL-3+",
          "MIT-like-Lord",
          "PCRE",
          "SunPro",
          "Unicode-DFS-2016",
          "Univ-Coimbra",
          "public-domain"
        ],
        "cpes": [
          "cpe:2.3:a:libc6:libc6:2.41-12\\+deb13u2:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libc6@2.41-12%2Bdeb13u2?arch=amd64&distro=debian-13&upstream=glibc",
        "upstreams": [
          {
            "name": "glibc"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2026-4437",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2026-4437",
        "namespace": "debian:distro:debian:13",
        "severity": "High",
        "urls": [],
        "description": "Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.",
        "cvss": [
          {
            "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "type": "Secondary",
            "version": "3.1",
            "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "metrics": {
              "baseScore": 7.5,
              "exploitabilityScore": 3.9,
              "impactScore": 3.6
            },
            "vendorMetadata": {}
          }
        ],
        "epss": [
          {
            "cve": "CVE-2026-4437",
            "epss": 0.0005,
            "percentile": 0.15538,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2026-4437",
            "cwe": "CWE-125",
            "source": "3ff69d7a-14f2-4f67-a097-88dee7810d18",
            "type": "Secondary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "wont-fix"
        },
        "advisories": [],
        "risk": 0.0375
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2026-4437",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2026-4437",
          "namespace": "nvd:cpe",
          "severity": "High",
          "urls": [
            "https://sourceware.org/bugzilla/show_bug.cgi?id=34014"
          ],
          "description": "Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.",
          "cvss": [
            {
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "metrics": {
                "baseScore": 7.5,
                "exploitabilityScore": 3.9,
                "impactScore": 3.6
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2026-4437",
              "epss": 0.0005,
              "percentile": 0.15538,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2026-4437",
              "cwe": "CWE-125",
              "source": "3ff69d7a-14f2-4f67-a097-88dee7810d18",
              "type": "Secondary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "glibc",
              "version": "2.41-12+deb13u2"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2026-4437",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "5e21ad3d95f6eebc",
        "name": "libc6",
        "version": "2.41-12+deb13u2",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libc6",
            "layerID": "sha256:318bc252656ce5b3c77fc9a13e302bba683f813d4b19c21be6e0ad3acc7adaf1",
            "accessPath": "/var/lib/dpkg/status.d/libc6",
            "annotations": {
              "evidence": "primary"
            }
          },
          {
            "path": "/usr/share/doc/libc6/copyright",
            "layerID": "sha256:318bc252656ce5b3c77fc9a13e302bba683f813d4b19c21be6e0ad3acc7adaf1",
            "accessPath": "/usr/share/doc/libc6/copyright",
            "annotations": {
              "evidence": "supporting"
            }
          },
          {
            "path": "/var/lib/dpkg/status.d/libc6.md5sums",
            "layerID": "sha256:318bc252656ce5b3c77fc9a13e302bba683f813d4b19c21be6e0ad3acc7adaf1",
            "accessPath": "/var/lib/dpkg/status.d/libc6.md5sums",
            "annotations": {
              "evidence": "supporting"
            }
          }
        ],
        "language": "",
        "licenses": [
          "BSD-2-clause",
          "BSD-3-clause-Berkeley",
          "BSD-3-clause-Carnegie",
          "BSD-3-clause-Oracle",
          "BSD-3-clause-WIDE",
          "BSD-like-Spencer",
          "BSL-1.0",
          "CORE-MATH",
          "Carnegie",
          "DEC",
          "FSFAP",
          "GPL-2",
          "GPL-2+",
          "GPL-2+-with-link-exception",
          "GPL-3",
          "GPL-3+",
          "IBM",
          "ISC",
          "Inner-Net",
          "LGPL-2",
          "LGPL-2+",
          "LGPL-2.1",
          "LGPL-2.1+",
          "LGPL-2.1+-with-link-exception",
          "LGPL-3",
          "LGPL-3+",
          "MIT-like-Lord",
          "PCRE",
          "SunPro",
          "Unicode-DFS-2016",
          "Univ-Coimbra",
          "public-domain"
        ],
        "cpes": [
          "cpe:2.3:a:libc6:libc6:2.41-12\\+deb13u2:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libc6@2.41-12%2Bdeb13u2?arch=amd64&distro=debian-13&upstream=glibc",
        "upstreams": [
          {
            "name": "glibc"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2025-29478",
        "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2025-29478",
        "namespace": "nvd:cpe",
        "severity": "Medium",
        "urls": [
          "https://github.com/lmarch2/poc/blob/main/fluent-bit/fluent-bit.md"
        ],
        "description": "An issue in fluent-bit v.3.7.2 allows a local attacker to cause a denial of service via the cfl_list_size in cfl_list.h:165.",
        "cvss": [
          {
            "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "type": "Secondary",
            "version": "3.1",
            "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "metrics": {
              "baseScore": 5.5,
              "exploitabilityScore": 1.9,
              "impactScore": 3.6
            },
            "vendorMetadata": {}
          }
        ],
        "epss": [
          {
            "cve": "CVE-2025-29478",
            "epss": 0.00071,
            "percentile": 0.21474,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2025-29478",
            "cwe": "CWE-400",
            "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "type": "Secondary"
          }
        ],
        "fix": {
          "versions": [],
          "state": ""
        },
        "advisories": [],
        "risk": 0.037275
      },
      "relatedVulnerabilities": [],
      "matchDetails": [
        {
          "type": "cpe-match",
          "matcher": "stock-matcher",
          "searchedBy": {
            "namespace": "nvd:cpe",
            "cpes": [
              "cpe:2.3:a:treasuredata:fluent_bit:4.2.4:*:*:*:*:*:*:*"
            ],
            "package": {
              "name": "fluent-bit",
              "version": "4.2.4"
            }
          },
          "found": {
            "vulnerabilityID": "CVE-2025-29478",
            "versionConstraint": "none (unknown)",
            "cpes": [
              "cpe:2.3:a:treasuredata:fluent_bit:*:*:*:*:*:*:*:*"
            ]
          }
        }
      ],
      "artifact": {
        "id": "de556463cfd32b50",
        "name": "fluent-bit",
        "version": "4.2.4",
        "type": "binary",
        "locations": [
          {
            "path": "/fluent-bit/bin/fluent-bit",
            "layerID": "sha256:afc0456e6dd5330673122a54ed845c114384e23d647d21d04649934a4d4d15bc",
            "accessPath": "/fluent-bit/bin/fluent-bit",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:treasuredata:fluent_bit:4.2.4:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:github/fluent/fluent-bit@4.2.4",
        "upstreams": []
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2026-1965",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2026-1965",
        "namespace": "debian:distro:debian:13",
        "severity": "Medium",
        "urls": [],
        "description": "libcurl can in some circumstances reuse the wrong connection when asked to do an Negotiate-authenticated HTTP or HTTPS request.  libcurl features a pool of recent connections so that subsequent requests can reuse an existing connection to avoid overhead.  When reusing a connection a range of criterion must first be met. Due to a logical error in the code, a request that was issued by an application could wrongfully reuse an existing connection to the same server that was authenticated using different credentials. One underlying reason being that Negotiate sometimes authenticates *connections* and not *requests*, contrary to how HTTP is designed to work.  An application that allows Negotiate authentication to a server (that responds wanting Negotiate) with `user1:password1` and then does another operation to the same server also using Negotiate but with `user2:password2` (while the previous connection is still alive) - the second request wrongly reused the same connection and since it then sees that the Negotiate negotiation is already made, it just sends the request over that connection thinking it uses the user2 credentials when it is in fact still using the connection authenticated for user1...  The set of authentication methods to use is set with  `CURLOPT_HTTPAUTH`.  Applications can disable libcurl's reuse of connections and thus mitigate this problem, by using one of the following libcurl options to alter how connections are or are not reused: `CURLOPT_FRESH_CONNECT`, `CURLOPT_MAXCONNECTS` and `CURLMOPT_MAX_HOST_CONNECTIONS` (if using the curl_multi API).",
        "cvss": [
          {
            "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "type": "Secondary",
            "version": "3.1",
            "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
            "metrics": {
              "baseScore": 6.5,
              "exploitabilityScore": 2.9,
              "impactScore": 3.6
            },
            "vendorMetadata": {}
          }
        ],
        "epss": [
          {
            "cve": "CVE-2026-1965",
            "epss": 0.00062,
            "percentile": 0.19122,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2026-1965",
            "cwe": "CWE-305",
            "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "type": "Secondary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "wont-fix"
        },
        "advisories": [],
        "risk": 0.03565
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2026-1965",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2026-1965",
          "namespace": "nvd:cpe",
          "severity": "Medium",
          "urls": [
            "https://curl.se/docs/CVE-2026-1965.html",
            "https://curl.se/docs/CVE-2026-1965.json"
          ],
          "description": "libcurl can in some circumstances reuse the wrong connection when asked to do\nan Negotiate-authenticated HTTP or HTTPS request.\n\nlibcurl features a pool of recent connections so that subsequent requests can\nreuse an existing connection to avoid overhead.\n\nWhen reusing a connection a range of criterion must first be met. Due to a\nlogical error in the code, a request that was issued by an application could\nwrongfully reuse an existing connection to the same server that was\nauthenticated using different credentials. One underlying reason being that\nNegotiate sometimes authenticates *connections* and not *requests*, contrary\nto how HTTP is designed to work.\n\nAn application that allows Negotiate authentication to a server (that responds\nwanting Negotiate) with `user1:password1` and then does another operation to\nthe same server also using Negotiate but with `user2:password2` (while the\nprevious connection is still alive) - the second request wrongly reused the\nsame connection and since it then sees that the Negotiate negotiation is\nalready made, it just sends the request over that connection thinking it uses\nthe user2 credentials when it is in fact still using the connection\nauthenticated for user1...\n\nThe set of authentication methods to use is set with  `CURLOPT_HTTPAUTH`.\n\nApplications can disable libcurl's reuse of connections and thus mitigate this\nproblem, by using one of the following libcurl options to alter how\nconnections are or are not reused: `CURLOPT_FRESH_CONNECT`,\n`CURLOPT_MAXCONNECTS` and `CURLMOPT_MAX_HOST_CONNECTIONS` (if using the\ncurl_multi API).",
          "cvss": [
            {
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
              "metrics": {
                "baseScore": 6.5,
                "exploitabilityScore": 2.9,
                "impactScore": 3.6
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2026-1965",
              "epss": 0.00062,
              "percentile": 0.19122,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2026-1965",
              "cwe": "CWE-305",
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "curl",
              "version": "8.14.1-2+deb13u2"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2026-1965",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "2c9e2faa683beba2",
        "name": "libcurl4t64",
        "version": "8.14.1-2+deb13u2",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libcurl4t64",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libcurl4t64",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libcurl4t64:libcurl4t64:8.14.1-2\\+deb13u2:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libcurl4t64@8.14.1-2%2Bdeb13u2?arch=amd64&distro=debian-13&upstream=curl",
        "upstreams": [
          {
            "name": "curl"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2026-5928",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2026-5928",
        "namespace": "debian:distro:debian:13",
        "severity": "High",
        "urls": [],
        "description": "Calling the ungetwc function on a FILE stream with wide characters encoded in a character set that has overlaps between its single byte and multi-byte character encodings, in the GNU C Library version 2.43 or earlier, may result in an attempt to read bytes before an allocated buffer, potentially resulting in unintentional disclosure of neighboring data in the heap, or a program crash.  A bug in the wide character pushback implementation (_IO_wdefault_pbackfail in libio/wgenops.c) causes ungetwc() to operate on the regular character buffer (fp->_IO_read_ptr) instead of the actual wide-stream read pointer (fp->_wide_data->_IO_read_ptr). The program crash may happen in cases where fp->_IO_read_ptr is not initialized and hence points to NULL. The buffer under-read requires a special situation where the input character encoding is such that there are overlaps between single byte representations and multibyte representations in that encoding, resulting in spurious matches. The spurious match case is not possible in the standard Unicode character sets.",
        "cvss": [
          {
            "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "type": "Secondary",
            "version": "3.1",
            "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "metrics": {
              "baseScore": 7.5,
              "exploitabilityScore": 3.9,
              "impactScore": 3.6
            },
            "vendorMetadata": {}
          }
        ],
        "epss": [
          {
            "cve": "CVE-2026-5928",
            "epss": 0.00046,
            "percentile": 0.14108,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2026-5928",
            "cwe": "CWE-127",
            "source": "3ff69d7a-14f2-4f67-a097-88dee7810d18",
            "type": "Secondary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "wont-fix"
        },
        "advisories": [],
        "risk": 0.0345
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2026-5928",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2026-5928",
          "namespace": "nvd:cpe",
          "severity": "High",
          "urls": [
            "https://sourceware.org/bugzilla/show_bug.cgi?id=33998"
          ],
          "description": "Calling the ungetwc function on a FILE stream with wide characters encoded in a character set that has overlaps between its single byte and multi-byte character encodings, in the GNU C Library version 2.43 or earlier, may result in an attempt to read bytes before an allocated buffer, potentially resulting in unintentional disclosure of neighboring data in the heap, or a program crash.\n\nA bug in the wide character pushback implementation (_IO_wdefault_pbackfail in libio/wgenops.c) causes ungetwc() to operate on the regular character buffer (fp->_IO_read_ptr) instead of the actual wide-stream read pointer (fp->_wide_data->_IO_read_ptr). The program crash may happen in cases where fp->_IO_read_ptr is not initialized and hence points to NULL. The buffer under-read requires a special situation where the input character encoding is such that there are overlaps between single byte representations and multibyte representations in that encoding, resulting in spurious matches. The spurious match case is not possible in the standard Unicode character sets.",
          "cvss": [
            {
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "metrics": {
                "baseScore": 7.5,
                "exploitabilityScore": 3.9,
                "impactScore": 3.6
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2026-5928",
              "epss": 0.00046,
              "percentile": 0.14108,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2026-5928",
              "cwe": "CWE-127",
              "source": "3ff69d7a-14f2-4f67-a097-88dee7810d18",
              "type": "Secondary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "glibc",
              "version": "2.41-12+deb13u2"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2026-5928",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "5e21ad3d95f6eebc",
        "name": "libc6",
        "version": "2.41-12+deb13u2",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libc6",
            "layerID": "sha256:318bc252656ce5b3c77fc9a13e302bba683f813d4b19c21be6e0ad3acc7adaf1",
            "accessPath": "/var/lib/dpkg/status.d/libc6",
            "annotations": {
              "evidence": "primary"
            }
          },
          {
            "path": "/usr/share/doc/libc6/copyright",
            "layerID": "sha256:318bc252656ce5b3c77fc9a13e302bba683f813d4b19c21be6e0ad3acc7adaf1",
            "accessPath": "/usr/share/doc/libc6/copyright",
            "annotations": {
              "evidence": "supporting"
            }
          },
          {
            "path": "/var/lib/dpkg/status.d/libc6.md5sums",
            "layerID": "sha256:318bc252656ce5b3c77fc9a13e302bba683f813d4b19c21be6e0ad3acc7adaf1",
            "accessPath": "/var/lib/dpkg/status.d/libc6.md5sums",
            "annotations": {
              "evidence": "supporting"
            }
          }
        ],
        "language": "",
        "licenses": [
          "BSD-2-clause",
          "BSD-3-clause-Berkeley",
          "BSD-3-clause-Carnegie",
          "BSD-3-clause-Oracle",
          "BSD-3-clause-WIDE",
          "BSD-like-Spencer",
          "BSL-1.0",
          "CORE-MATH",
          "Carnegie",
          "DEC",
          "FSFAP",
          "GPL-2",
          "GPL-2+",
          "GPL-2+-with-link-exception",
          "GPL-3",
          "GPL-3+",
          "IBM",
          "ISC",
          "Inner-Net",
          "LGPL-2",
          "LGPL-2+",
          "LGPL-2.1",
          "LGPL-2.1+",
          "LGPL-2.1+-with-link-exception",
          "LGPL-3",
          "LGPL-3+",
          "MIT-like-Lord",
          "PCRE",
          "SunPro",
          "Unicode-DFS-2016",
          "Univ-Coimbra",
          "public-domain"
        ],
        "cpes": [
          "cpe:2.3:a:libc6:libc6:2.41-12\\+deb13u2:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libc6@2.41-12%2Bdeb13u2?arch=amd64&distro=debian-13&upstream=glibc",
        "upstreams": [
          {
            "name": "glibc"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2026-4046",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2026-4046",
        "namespace": "debian:distro:debian:13",
        "severity": "High",
        "urls": [],
        "description": "The iconv() function in the GNU C Library versions 2.43 and earlier may crash due to an assertion failure when converting inputs from the IBM1390 or IBM1399 character sets, which may be used to remotely crash an application.    This vulnerability can be trivially mitigated by removing the IBM1390 and IBM1399 character sets from systems that do not need them.",
        "cvss": [
          {
            "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "type": "Secondary",
            "version": "3.1",
            "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "metrics": {
              "baseScore": 7.5,
              "exploitabilityScore": 3.9,
              "impactScore": 3.6
            },
            "vendorMetadata": {}
          }
        ],
        "epss": [
          {
            "cve": "CVE-2026-4046",
            "epss": 0.00044,
            "percentile": 0.13296,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2026-4046",
            "cwe": "CWE-617",
            "source": "3ff69d7a-14f2-4f67-a097-88dee7810d18",
            "type": "Secondary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "wont-fix"
        },
        "advisories": [],
        "risk": 0.033
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2026-4046",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2026-4046",
          "namespace": "nvd:cpe",
          "severity": "High",
          "urls": [
            "https://inbox.sourceware.org/libc-announce/76814edf-cf7f-47ec-979d-2dce0a2c76bf@gotplt.org/T/#u",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=33980",
            "https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0007;hb=HEAD"
          ],
          "description": "The iconv() function in the GNU C Library versions 2.43 and earlier may crash due to an assertion failure when converting inputs from the IBM1390 or IBM1399 character sets, which may be used to remotely crash an application.\n\n\n\nThis vulnerability can be trivially mitigated by removing the IBM1390 and IBM1399 character sets from systems that do not need them.",
          "cvss": [
            {
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "metrics": {
                "baseScore": 7.5,
                "exploitabilityScore": 3.9,
                "impactScore": 3.6
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2026-4046",
              "epss": 0.00044,
              "percentile": 0.13296,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2026-4046",
              "cwe": "CWE-617",
              "source": "3ff69d7a-14f2-4f67-a097-88dee7810d18",
              "type": "Secondary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "glibc",
              "version": "2.41-12+deb13u2"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2026-4046",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "5e21ad3d95f6eebc",
        "name": "libc6",
        "version": "2.41-12+deb13u2",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libc6",
            "layerID": "sha256:318bc252656ce5b3c77fc9a13e302bba683f813d4b19c21be6e0ad3acc7adaf1",
            "accessPath": "/var/lib/dpkg/status.d/libc6",
            "annotations": {
              "evidence": "primary"
            }
          },
          {
            "path": "/usr/share/doc/libc6/copyright",
            "layerID": "sha256:318bc252656ce5b3c77fc9a13e302bba683f813d4b19c21be6e0ad3acc7adaf1",
            "accessPath": "/usr/share/doc/libc6/copyright",
            "annotations": {
              "evidence": "supporting"
            }
          },
          {
            "path": "/var/lib/dpkg/status.d/libc6.md5sums",
            "layerID": "sha256:318bc252656ce5b3c77fc9a13e302bba683f813d4b19c21be6e0ad3acc7adaf1",
            "accessPath": "/var/lib/dpkg/status.d/libc6.md5sums",
            "annotations": {
              "evidence": "supporting"
            }
          }
        ],
        "language": "",
        "licenses": [
          "BSD-2-clause",
          "BSD-3-clause-Berkeley",
          "BSD-3-clause-Carnegie",
          "BSD-3-clause-Oracle",
          "BSD-3-clause-WIDE",
          "BSD-like-Spencer",
          "BSL-1.0",
          "CORE-MATH",
          "Carnegie",
          "DEC",
          "FSFAP",
          "GPL-2",
          "GPL-2+",
          "GPL-2+-with-link-exception",
          "GPL-3",
          "GPL-3+",
          "IBM",
          "ISC",
          "Inner-Net",
          "LGPL-2",
          "LGPL-2+",
          "LGPL-2.1",
          "LGPL-2.1+",
          "LGPL-2.1+-with-link-exception",
          "LGPL-3",
          "LGPL-3+",
          "MIT-like-Lord",
          "PCRE",
          "SunPro",
          "Unicode-DFS-2016",
          "Univ-Coimbra",
          "public-domain"
        ],
        "cpes": [
          "cpe:2.3:a:libc6:libc6:2.41-12\\+deb13u2:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libc6@2.41-12%2Bdeb13u2?arch=amd64&distro=debian-13&upstream=glibc",
        "upstreams": [
          {
            "name": "glibc"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2019-1010024",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2019-1010024",
        "namespace": "debian:distro:debian:13",
        "severity": "Negligible",
        "urls": [],
        "description": "GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.",
        "cvss": [],
        "epss": [
          {
            "cve": "CVE-2019-1010024",
            "epss": 0.00646,
            "percentile": 0.70796,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2019-1010024",
            "cwe": "CWE-200",
            "source": "nvd@nist.gov",
            "type": "Primary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.0323
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2019-1010024",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2019-1010024",
          "namespace": "nvd:cpe",
          "severity": "Medium",
          "urls": [
            "http://www.securityfocus.com/bid/109162",
            "https://security-tracker.debian.org/tracker/CVE-2019-1010024",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=22852",
            "https://support.f5.com/csp/article/K06046097",
            "https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp%3Butm_medium=RSS",
            "https://ubuntu.com/security/CVE-2019-1010024"
          ],
          "description": "GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.",
          "cvss": [
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "3.0",
              "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "metrics": {
                "baseScore": 5.3,
                "exploitabilityScore": 3.9,
                "impactScore": 1.5
              },
              "vendorMetadata": {}
            },
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "2.0",
              "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
              "metrics": {
                "baseScore": 5,
                "exploitabilityScore": 10,
                "impactScore": 2.9
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2019-1010024",
              "epss": 0.00646,
              "percentile": 0.70796,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2019-1010024",
              "cwe": "CWE-200",
              "source": "nvd@nist.gov",
              "type": "Primary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "glibc",
              "version": "2.41-12+deb13u2"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2019-1010024",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "5e21ad3d95f6eebc",
        "name": "libc6",
        "version": "2.41-12+deb13u2",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libc6",
            "layerID": "sha256:318bc252656ce5b3c77fc9a13e302bba683f813d4b19c21be6e0ad3acc7adaf1",
            "accessPath": "/var/lib/dpkg/status.d/libc6",
            "annotations": {
              "evidence": "primary"
            }
          },
          {
            "path": "/usr/share/doc/libc6/copyright",
            "layerID": "sha256:318bc252656ce5b3c77fc9a13e302bba683f813d4b19c21be6e0ad3acc7adaf1",
            "accessPath": "/usr/share/doc/libc6/copyright",
            "annotations": {
              "evidence": "supporting"
            }
          },
          {
            "path": "/var/lib/dpkg/status.d/libc6.md5sums",
            "layerID": "sha256:318bc252656ce5b3c77fc9a13e302bba683f813d4b19c21be6e0ad3acc7adaf1",
            "accessPath": "/var/lib/dpkg/status.d/libc6.md5sums",
            "annotations": {
              "evidence": "supporting"
            }
          }
        ],
        "language": "",
        "licenses": [
          "BSD-2-clause",
          "BSD-3-clause-Berkeley",
          "BSD-3-clause-Carnegie",
          "BSD-3-clause-Oracle",
          "BSD-3-clause-WIDE",
          "BSD-like-Spencer",
          "BSL-1.0",
          "CORE-MATH",
          "Carnegie",
          "DEC",
          "FSFAP",
          "GPL-2",
          "GPL-2+",
          "GPL-2+-with-link-exception",
          "GPL-3",
          "GPL-3+",
          "IBM",
          "ISC",
          "Inner-Net",
          "LGPL-2",
          "LGPL-2+",
          "LGPL-2.1",
          "LGPL-2.1+",
          "LGPL-2.1+-with-link-exception",
          "LGPL-3",
          "LGPL-3+",
          "MIT-like-Lord",
          "PCRE",
          "SunPro",
          "Unicode-DFS-2016",
          "Univ-Coimbra",
          "public-domain"
        ],
        "cpes": [
          "cpe:2.3:a:libc6:libc6:2.41-12\\+deb13u2:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libc6@2.41-12%2Bdeb13u2?arch=amd64&distro=debian-13&upstream=glibc",
        "upstreams": [
          {
            "name": "glibc"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2024-2236",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2024-2236",
        "namespace": "debian:distro:debian:13",
        "severity": "Negligible",
        "urls": [],
        "description": "A timing-based side-channel flaw was found in libgcrypt's RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.",
        "cvss": [],
        "epss": [
          {
            "cve": "CVE-2024-2236",
            "epss": 0.00588,
            "percentile": 0.69209,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2024-2236",
            "cwe": "CWE-385",
            "source": "secalert@redhat.com",
            "type": "Primary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.0294
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2024-2236",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2024-2236",
          "namespace": "nvd:cpe",
          "severity": "Medium",
          "urls": [
            "https://access.redhat.com/errata/RHSA-2024:9404",
            "https://access.redhat.com/errata/RHSA-2025:3530",
            "https://access.redhat.com/errata/RHSA-2025:3534",
            "https://access.redhat.com/security/cve/CVE-2024-2236",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2245218",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2268268"
          ],
          "description": "A timing-based side-channel flaw was found in libgcrypt's RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.",
          "cvss": [
            {
              "source": "secalert@redhat.com",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
              "metrics": {
                "baseScore": 5.9,
                "exploitabilityScore": 2.3,
                "impactScore": 3.6
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2024-2236",
              "epss": 0.00588,
              "percentile": 0.69209,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2024-2236",
              "cwe": "CWE-385",
              "source": "secalert@redhat.com",
              "type": "Primary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-direct-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "libgcrypt20",
              "version": "1.11.0-7"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2024-2236",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "5826072934743d2f",
        "name": "libgcrypt20",
        "version": "1.11.0-7",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libgcrypt20",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libgcrypt20",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libgcrypt20:libgcrypt20:1.11.0-7:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libgcrypt20@1.11.0-7?arch=amd64&distro=debian-13",
        "upstreams": []
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2026-34743",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2026-34743",
        "namespace": "debian:distro:debian:13",
        "severity": "Medium",
        "urls": [],
        "description": "XZ Utils provide a general-purpose data-compression library plus command-line tools. Prior to version 5.8.3, if lzma_index_decoder() was used to decode an Index that contained no Records, the resulting lzma_index was left in a state where where a subsequent lzma_index_append() would allocate too little memory, and a buffer overflow would occur. This issue has been patched in version 5.8.3.",
        "cvss": [
          {
            "source": "nvd@nist.gov",
            "type": "Primary",
            "version": "3.1",
            "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "metrics": {
              "baseScore": 5.3,
              "exploitabilityScore": 3.9,
              "impactScore": 1.5
            },
            "vendorMetadata": {}
          }
        ],
        "epss": [
          {
            "cve": "CVE-2026-34743",
            "epss": 0.00055,
            "percentile": 0.17176,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2026-34743",
            "cwe": "CWE-122",
            "source": "security-advisories@github.com",
            "type": "Secondary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "wont-fix"
        },
        "advisories": [],
        "risk": 0.028325000000000003
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2026-34743",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2026-34743",
          "namespace": "nvd:cpe",
          "severity": "Medium",
          "urls": [
            "https://github.com/tukaani-project/xz/commit/c8c22869e780ff57c96b46939c3d79ff99395f87",
            "https://github.com/tukaani-project/xz/releases/tag/v5.8.3",
            "https://github.com/tukaani-project/xz/security/advisories/GHSA-x872-m794-cxhv",
            "http://www.openwall.com/lists/oss-security/2026/03/31/13"
          ],
          "description": "XZ Utils provide a general-purpose data-compression library plus command-line tools. Prior to version 5.8.3, if lzma_index_decoder() was used to decode an Index that contained no Records, the resulting lzma_index was left in a state where where a subsequent lzma_index_append() would allocate too little memory, and a buffer overflow would occur. This issue has been patched in version 5.8.3.",
          "cvss": [
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
              "metrics": {
                "baseScore": 5.3,
                "exploitabilityScore": 3.9,
                "impactScore": 1.5
              },
              "vendorMetadata": {}
            },
            {
              "source": "security-advisories@github.com",
              "type": "Secondary",
              "version": "4.0",
              "vector": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
              "metrics": {
                "baseScore": 1.7
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2026-34743",
              "epss": 0.00055,
              "percentile": 0.17176,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2026-34743",
              "cwe": "CWE-122",
              "source": "security-advisories@github.com",
              "type": "Secondary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "xz-utils",
              "version": "5.8.1-1"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2026-34743",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "b2c2bc2cb57ca2ec",
        "name": "liblzma5",
        "version": "5.8.1-1",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/liblzma5",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/liblzma5",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:liblzma5:liblzma5:5.8.1-1:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/liblzma5@5.8.1-1?arch=amd64&distro=debian-13&upstream=xz-utils",
        "upstreams": [
          {
            "name": "xz-utils"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2025-29477",
        "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2025-29477",
        "namespace": "nvd:cpe",
        "severity": "Medium",
        "urls": [
          "https://github.com/lmarch2/poc/blob/main/fluent-bit/fluent-bit.md"
        ],
        "description": "An issue in fluent-bit v.3.7.2 allows a local attacker to cause a denial of service via the function consume_event.",
        "cvss": [
          {
            "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "type": "Secondary",
            "version": "3.1",
            "vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H",
            "metrics": {
              "baseScore": 5.5,
              "exploitabilityScore": 0.8,
              "impactScore": 4.8
            },
            "vendorMetadata": {}
          }
        ],
        "epss": [
          {
            "cve": "CVE-2025-29477",
            "epss": 0.00053,
            "percentile": 0.16528,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2025-29477",
            "cwe": "CWE-400",
            "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "type": "Secondary"
          }
        ],
        "fix": {
          "versions": [],
          "state": ""
        },
        "advisories": [],
        "risk": 0.027825000000000003
      },
      "relatedVulnerabilities": [],
      "matchDetails": [
        {
          "type": "cpe-match",
          "matcher": "stock-matcher",
          "searchedBy": {
            "namespace": "nvd:cpe",
            "cpes": [
              "cpe:2.3:a:treasuredata:fluent_bit:4.2.4:*:*:*:*:*:*:*"
            ],
            "package": {
              "name": "fluent-bit",
              "version": "4.2.4"
            }
          },
          "found": {
            "vulnerabilityID": "CVE-2025-29477",
            "versionConstraint": "none (unknown)",
            "cpes": [
              "cpe:2.3:a:treasuredata:fluent_bit:*:*:*:*:*:*:*:*"
            ]
          }
        }
      ],
      "artifact": {
        "id": "de556463cfd32b50",
        "name": "fluent-bit",
        "version": "4.2.4",
        "type": "binary",
        "locations": [
          {
            "path": "/fluent-bit/bin/fluent-bit",
            "layerID": "sha256:afc0456e6dd5330673122a54ed845c114384e23d647d21d04649934a4d4d15bc",
            "accessPath": "/fluent-bit/bin/fluent-bit",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:treasuredata:fluent_bit:4.2.4:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:github/fluent/fluent-bit@4.2.4",
        "upstreams": []
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2018-6829",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2018-6829",
        "namespace": "debian:distro:debian:13",
        "severity": "Negligible",
        "urls": [],
        "description": "cipher/elgamal.c in Libgcrypt through 1.8.2, when used to encrypt messages directly, improperly encodes plaintexts, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for Libgcrypt's ElGamal implementation.",
        "cvss": [],
        "epss": [
          {
            "cve": "CVE-2018-6829",
            "epss": 0.00515,
            "percentile": 0.66677,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2018-6829",
            "cwe": "CWE-327",
            "source": "nvd@nist.gov",
            "type": "Primary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.025750000000000002
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2018-6829",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2018-6829",
          "namespace": "nvd:cpe",
          "severity": "High",
          "urls": [
            "https://github.com/weikengchen/attack-on-libgcrypt-elgamal",
            "https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki",
            "https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html",
            "https://www.oracle.com/security-alerts/cpujan2020.html"
          ],
          "description": "cipher/elgamal.c in Libgcrypt through 1.8.2, when used to encrypt messages directly, improperly encodes plaintexts, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for Libgcrypt's ElGamal implementation.",
          "cvss": [
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "3.0",
              "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
              "metrics": {
                "baseScore": 7.5,
                "exploitabilityScore": 3.9,
                "impactScore": 3.6
              },
              "vendorMetadata": {}
            },
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "2.0",
              "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
              "metrics": {
                "baseScore": 5,
                "exploitabilityScore": 10,
                "impactScore": 2.9
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2018-6829",
              "epss": 0.00515,
              "percentile": 0.66677,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2018-6829",
              "cwe": "CWE-327",
              "source": "nvd@nist.gov",
              "type": "Primary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-direct-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "libgcrypt20",
              "version": "1.11.0-7"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2018-6829",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "5826072934743d2f",
        "name": "libgcrypt20",
        "version": "1.11.0-7",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libgcrypt20",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libgcrypt20",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libgcrypt20:libgcrypt20:1.11.0-7:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libgcrypt20@1.11.0-7?arch=amd64&distro=debian-13",
        "upstreams": []
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2026-40225",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2026-40225",
        "namespace": "debian:distro:debian:13",
        "severity": "Medium",
        "urls": [],
        "description": "In udev in systemd before 260, local root execution can occur via malicious hardware devices and unsanitized kernel output.",
        "cvss": [
          {
            "source": "cve@mitre.org",
            "type": "Secondary",
            "version": "3.1",
            "vector": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "metrics": {
              "baseScore": 6.4,
              "exploitabilityScore": 0.6,
              "impactScore": 5.9
            },
            "vendorMetadata": {}
          }
        ],
        "epss": [
          {
            "cve": "CVE-2026-40225",
            "epss": 0.00041,
            "percentile": 0.12406,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2026-40225",
            "cwe": "CWE-669",
            "source": "cve@mitre.org",
            "type": "Primary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "wont-fix"
        },
        "advisories": [],
        "risk": 0.023370000000000002
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2026-40225",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2026-40225",
          "namespace": "nvd:cpe",
          "severity": "Medium",
          "urls": [
            "https://github.com/systemd/systemd/security/advisories/GHSA-vpfq-8p5f-jcqx"
          ],
          "description": "In udev in systemd before 260, local root execution can occur via malicious hardware devices and unsanitized kernel output.",
          "cvss": [
            {
              "source": "cve@mitre.org",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "metrics": {
                "baseScore": 6.4,
                "exploitabilityScore": 0.6,
                "impactScore": 5.9
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2026-40225",
              "epss": 0.00041,
              "percentile": 0.12406,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2026-40225",
              "cwe": "CWE-669",
              "source": "cve@mitre.org",
              "type": "Primary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "systemd",
              "version": "257.9-1~deb13u1"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2026-40225",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "4f3b916d8498c51d",
        "name": "libsystemd0",
        "version": "257.9-1~deb13u1",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libsystemd0",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libsystemd0",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libsystemd0:libsystemd0:257.9-1\\~deb13u1:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64&distro=debian-13&upstream=systemd",
        "upstreams": [
          {
            "name": "systemd"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2026-40225",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2026-40225",
        "namespace": "debian:distro:debian:13",
        "severity": "Medium",
        "urls": [],
        "description": "In udev in systemd before 260, local root execution can occur via malicious hardware devices and unsanitized kernel output.",
        "cvss": [
          {
            "source": "cve@mitre.org",
            "type": "Secondary",
            "version": "3.1",
            "vector": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "metrics": {
              "baseScore": 6.4,
              "exploitabilityScore": 0.6,
              "impactScore": 5.9
            },
            "vendorMetadata": {}
          }
        ],
        "epss": [
          {
            "cve": "CVE-2026-40225",
            "epss": 0.00041,
            "percentile": 0.12406,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2026-40225",
            "cwe": "CWE-669",
            "source": "cve@mitre.org",
            "type": "Primary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "wont-fix"
        },
        "advisories": [],
        "risk": 0.023370000000000002
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2026-40225",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2026-40225",
          "namespace": "nvd:cpe",
          "severity": "Medium",
          "urls": [
            "https://github.com/systemd/systemd/security/advisories/GHSA-vpfq-8p5f-jcqx"
          ],
          "description": "In udev in systemd before 260, local root execution can occur via malicious hardware devices and unsanitized kernel output.",
          "cvss": [
            {
              "source": "cve@mitre.org",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "metrics": {
                "baseScore": 6.4,
                "exploitabilityScore": 0.6,
                "impactScore": 5.9
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2026-40225",
              "epss": 0.00041,
              "percentile": 0.12406,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2026-40225",
              "cwe": "CWE-669",
              "source": "cve@mitre.org",
              "type": "Primary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-direct-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "systemd",
              "version": "257.9-1~deb13u1"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2026-40225",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "49db2eae5abce987",
        "name": "systemd",
        "version": "257.9-1~deb13u1",
        "type": "deb",
        "locations": [
          {
            "path": "/usr/lib/x86_64-linux-gnu/libsystemd.so.0.40.0",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/usr/lib/x86_64-linux-gnu/libsystemd.so.0.40.0",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:systemd:systemd:257.9-1\\~deb13u1:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/Debian/systemd@257.9-1~deb13u1?distro=Debian",
        "upstreams": []
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2025-14819",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2025-14819",
        "namespace": "debian:distro:debian:13",
        "severity": "Medium",
        "urls": [],
        "description": "When doing TLS related transfers with reused easy or multi handles and altering the  `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally reuse a CA store cached in memory for which the partial chain option was reversed. Contrary to the user's wishes and expectations. This could make libcurl find and accept a trust chain that it otherwise would not.",
        "cvss": [
          {
            "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "type": "Secondary",
            "version": "3.1",
            "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "metrics": {
              "baseScore": 5.3,
              "exploitabilityScore": 1.7,
              "impactScore": 3.6
            },
            "vendorMetadata": {}
          }
        ],
        "epss": [
          {
            "cve": "CVE-2025-14819",
            "epss": 0.00045,
            "percentile": 0.13821,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2025-14819",
            "cwe": "CWE-295",
            "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "type": "Secondary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "wont-fix"
        },
        "advisories": [],
        "risk": 0.023175
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2025-14819",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2025-14819",
          "namespace": "nvd:cpe",
          "severity": "Medium",
          "urls": [
            "https://curl.se/docs/CVE-2025-14819.html",
            "https://curl.se/docs/CVE-2025-14819.json",
            "http://www.openwall.com/lists/oss-security/2026/01/07/5"
          ],
          "description": "When doing TLS related transfers with reused easy or multi handles and\naltering the  `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally\nreuse a CA store cached in memory for which the partial chain option was\nreversed. Contrary to the user's wishes and expectations. This could make\nlibcurl find and accept a trust chain that it otherwise would not.",
          "cvss": [
            {
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
              "metrics": {
                "baseScore": 5.3,
                "exploitabilityScore": 1.7,
                "impactScore": 3.6
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2025-14819",
              "epss": 0.00045,
              "percentile": 0.13821,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2025-14819",
              "cwe": "CWE-295",
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "curl",
              "version": "8.14.1-2+deb13u2"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2025-14819",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "2c9e2faa683beba2",
        "name": "libcurl4t64",
        "version": "8.14.1-2+deb13u2",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libcurl4t64",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libcurl4t64",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libcurl4t64:libcurl4t64:8.14.1-2\\+deb13u2:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libcurl4t64@8.14.1-2%2Bdeb13u2?arch=amd64&distro=debian-13&upstream=curl",
        "upstreams": [
          {
            "name": "curl"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2026-3805",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2026-3805",
        "namespace": "debian:distro:debian:13",
        "severity": "High",
        "urls": [],
        "description": "When doing a second SMB request to the same host again, curl would wrongly use a data pointer pointing into already freed memory.",
        "cvss": [
          {
            "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "type": "Secondary",
            "version": "3.1",
            "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "metrics": {
              "baseScore": 7.5,
              "exploitabilityScore": 3.9,
              "impactScore": 3.6
            },
            "vendorMetadata": {}
          }
        ],
        "epss": [
          {
            "cve": "CVE-2026-3805",
            "epss": 0.00029,
            "percentile": 0.08066,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2026-3805",
            "cwe": "CWE-416",
            "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "type": "Secondary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "wont-fix"
        },
        "advisories": [],
        "risk": 0.02175
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2026-3805",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2026-3805",
          "namespace": "nvd:cpe",
          "severity": "High",
          "urls": [
            "https://curl.se/docs/CVE-2026-3805.html",
            "https://curl.se/docs/CVE-2026-3805.json",
            "https://hackerone.com/reports/3591944",
            "http://www.openwall.com/lists/oss-security/2026/03/11/4"
          ],
          "description": "When doing a second SMB request to the same host again, curl would wrongly use\na data pointer pointing into already freed memory.",
          "cvss": [
            {
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "metrics": {
                "baseScore": 7.5,
                "exploitabilityScore": 3.9,
                "impactScore": 3.6
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2026-3805",
              "epss": 0.00029,
              "percentile": 0.08066,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2026-3805",
              "cwe": "CWE-416",
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "curl",
              "version": "8.14.1-2+deb13u2"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2026-3805",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "2c9e2faa683beba2",
        "name": "libcurl4t64",
        "version": "8.14.1-2+deb13u2",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libcurl4t64",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libcurl4t64",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libcurl4t64:libcurl4t64:8.14.1-2\\+deb13u2:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libcurl4t64@8.14.1-2%2Bdeb13u2?arch=amd64&distro=debian-13&upstream=curl",
        "upstreams": [
          {
            "name": "curl"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2010-4756",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2010-4756",
        "namespace": "debian:distro:debian:13",
        "severity": "Negligible",
        "urls": [],
        "description": "The glob implementation in the GNU C Library (aka glibc or libc6) allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in STAT commands to an FTP daemon, a different vulnerability than CVE-2010-2632.",
        "cvss": [],
        "epss": [
          {
            "cve": "CVE-2010-4756",
            "epss": 0.00394,
            "percentile": 0.60333,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2010-4756",
            "cwe": "CWE-399",
            "source": "nvd@nist.gov",
            "type": "Primary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.019700000000000002
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2010-4756",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2010-4756",
          "namespace": "nvd:cpe",
          "severity": "Medium",
          "urls": [
            "http://cxib.net/stuff/glob-0day.c",
            "http://securityreason.com/achievement_securityalert/89",
            "http://securityreason.com/exploitalert/9223",
            "https://bugzilla.redhat.com/show_bug.cgi?id=681681",
            "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756",
            "https://security.netapp.com/advisory/ntap-20241108-0002/"
          ],
          "description": "The glob implementation in the GNU C Library (aka glibc or libc6) allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in STAT commands to an FTP daemon, a different vulnerability than CVE-2010-2632.",
          "cvss": [
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "2.0",
              "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
              "metrics": {
                "baseScore": 4,
                "exploitabilityScore": 8,
                "impactScore": 2.9
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2010-4756",
              "epss": 0.00394,
              "percentile": 0.60333,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2010-4756",
              "cwe": "CWE-399",
              "source": "nvd@nist.gov",
              "type": "Primary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "glibc",
              "version": "2.41-12+deb13u2"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2010-4756",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "5e21ad3d95f6eebc",
        "name": "libc6",
        "version": "2.41-12+deb13u2",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libc6",
            "layerID": "sha256:318bc252656ce5b3c77fc9a13e302bba683f813d4b19c21be6e0ad3acc7adaf1",
            "accessPath": "/var/lib/dpkg/status.d/libc6",
            "annotations": {
              "evidence": "primary"
            }
          },
          {
            "path": "/usr/share/doc/libc6/copyright",
            "layerID": "sha256:318bc252656ce5b3c77fc9a13e302bba683f813d4b19c21be6e0ad3acc7adaf1",
            "accessPath": "/usr/share/doc/libc6/copyright",
            "annotations": {
              "evidence": "supporting"
            }
          },
          {
            "path": "/var/lib/dpkg/status.d/libc6.md5sums",
            "layerID": "sha256:318bc252656ce5b3c77fc9a13e302bba683f813d4b19c21be6e0ad3acc7adaf1",
            "accessPath": "/var/lib/dpkg/status.d/libc6.md5sums",
            "annotations": {
              "evidence": "supporting"
            }
          }
        ],
        "language": "",
        "licenses": [
          "BSD-2-clause",
          "BSD-3-clause-Berkeley",
          "BSD-3-clause-Carnegie",
          "BSD-3-clause-Oracle",
          "BSD-3-clause-WIDE",
          "BSD-like-Spencer",
          "BSL-1.0",
          "CORE-MATH",
          "Carnegie",
          "DEC",
          "FSFAP",
          "GPL-2",
          "GPL-2+",
          "GPL-2+-with-link-exception",
          "GPL-3",
          "GPL-3+",
          "IBM",
          "ISC",
          "Inner-Net",
          "LGPL-2",
          "LGPL-2+",
          "LGPL-2.1",
          "LGPL-2.1+",
          "LGPL-2.1+-with-link-exception",
          "LGPL-3",
          "LGPL-3+",
          "MIT-like-Lord",
          "PCRE",
          "SunPro",
          "Unicode-DFS-2016",
          "Univ-Coimbra",
          "public-domain"
        ],
        "cpes": [
          "cpe:2.3:a:libc6:libc6:2.41-12\\+deb13u2:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libc6@2.41-12%2Bdeb13u2?arch=amd64&distro=debian-13&upstream=glibc",
        "upstreams": [
          {
            "name": "glibc"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2026-27135",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2026-27135",
        "namespace": "debian:distro:debian:13",
        "severity": "High",
        "urls": [],
        "description": "nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. Prior to version 1.68.1, the nghttp2 library stops reading the incoming data when user facing public API `nghttp2_session_terminate_session` or `nghttp2_session_terminate_session2` is called by the application. They might be called internally by the library when it detects the situation that is subject to connection error. Due to the missing internal state validation, the library keeps reading the rest of the data after one of those APIs is called. Then receiving a malformed frame that causes FRAME_SIZE_ERROR causes assertion failure. nghttp2 v1.68.1 adds missing state validation to avoid assertion failure. No known workarounds are available.",
        "cvss": [
          {
            "source": "security-advisories@github.com",
            "type": "Secondary",
            "version": "3.1",
            "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "metrics": {
              "baseScore": 7.5,
              "exploitabilityScore": 3.9,
              "impactScore": 3.6
            },
            "vendorMetadata": {}
          }
        ],
        "epss": [
          {
            "cve": "CVE-2026-27135",
            "epss": 0.00024,
            "percentile": 0.06712,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2026-27135",
            "cwe": "CWE-617",
            "source": "security-advisories@github.com",
            "type": "Secondary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.018000000000000002
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2026-27135",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2026-27135",
          "namespace": "nvd:cpe",
          "severity": "High",
          "urls": [
            "https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1",
            "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6",
            "http://www.openwall.com/lists/oss-security/2026/03/20/3"
          ],
          "description": "nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. Prior to version 1.68.1, the nghttp2 library stops reading the incoming data when user facing public API `nghttp2_session_terminate_session` or `nghttp2_session_terminate_session2` is called by the application. They might be called internally by the library when it detects the situation that is subject to connection error. Due to the missing internal state validation, the library keeps reading the rest of the data after one of those APIs is called. Then receiving a malformed frame that causes FRAME_SIZE_ERROR causes assertion failure. nghttp2 v1.68.1 adds missing state validation to avoid assertion failure. No known workarounds are available.",
          "cvss": [
            {
              "source": "security-advisories@github.com",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "metrics": {
                "baseScore": 7.5,
                "exploitabilityScore": 3.9,
                "impactScore": 3.6
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2026-27135",
              "epss": 0.00024,
              "percentile": 0.06712,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2026-27135",
              "cwe": "CWE-617",
              "source": "security-advisories@github.com",
              "type": "Secondary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "nghttp2",
              "version": "1.64.0-1.1"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2026-27135",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "fa925028c58e5356",
        "name": "libnghttp2-14",
        "version": "1.64.0-1.1",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libnghttp2-14",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libnghttp2-14",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libnghttp2-14:libnghttp2-14:1.64.0-1.1:*:*:*:*:*:*:*",
          "cpe:2.3:a:libnghttp2-14:libnghttp2_14:1.64.0-1.1:*:*:*:*:*:*:*",
          "cpe:2.3:a:libnghttp2_14:libnghttp2-14:1.64.0-1.1:*:*:*:*:*:*:*",
          "cpe:2.3:a:libnghttp2_14:libnghttp2_14:1.64.0-1.1:*:*:*:*:*:*:*",
          "cpe:2.3:a:libnghttp2:libnghttp2-14:1.64.0-1.1:*:*:*:*:*:*:*",
          "cpe:2.3:a:libnghttp2:libnghttp2_14:1.64.0-1.1:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libnghttp2-14@1.64.0-1.1?arch=amd64&distro=debian-13&upstream=nghttp2",
        "upstreams": [
          {
            "name": "nghttp2"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2026-4438",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2026-4438",
        "namespace": "debian:distro:debian:13",
        "severity": "Medium",
        "urls": [],
        "description": "Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C library version 2.34 to version 2.43 could result in an invalid DNS hostname being returned to the caller in violation of the DNS specification.",
        "cvss": [
          {
            "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "type": "Secondary",
            "version": "3.1",
            "vector": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "metrics": {
              "baseScore": 5.4,
              "exploitabilityScore": 2.9,
              "impactScore": 2.6
            },
            "vendorMetadata": {}
          }
        ],
        "epss": [
          {
            "cve": "CVE-2026-4438",
            "epss": 0.00033,
            "percentile": 0.09715,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2026-4438",
            "cwe": "CWE-20",
            "source": "3ff69d7a-14f2-4f67-a097-88dee7810d18",
            "type": "Secondary"
          },
          {
            "cve": "CVE-2026-4438",
            "cwe": "CWE-88",
            "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "type": "Secondary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "wont-fix"
        },
        "advisories": [],
        "risk": 0.017159999999999998
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2026-4438",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2026-4438",
          "namespace": "nvd:cpe",
          "severity": "Medium",
          "urls": [
            "https://sourceware.org/bugzilla/show_bug.cgi?id=34015"
          ],
          "description": "Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C library version 2.34 to version 2.43 could result in an invalid DNS hostname being returned to the caller in violation of the DNS specification.",
          "cvss": [
            {
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
              "metrics": {
                "baseScore": 5.4,
                "exploitabilityScore": 2.9,
                "impactScore": 2.6
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2026-4438",
              "epss": 0.00033,
              "percentile": 0.09715,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2026-4438",
              "cwe": "CWE-20",
              "source": "3ff69d7a-14f2-4f67-a097-88dee7810d18",
              "type": "Secondary"
            },
            {
              "cve": "CVE-2026-4438",
              "cwe": "CWE-88",
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "glibc",
              "version": "2.41-12+deb13u2"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2026-4438",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "5e21ad3d95f6eebc",
        "name": "libc6",
        "version": "2.41-12+deb13u2",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libc6",
            "layerID": "sha256:318bc252656ce5b3c77fc9a13e302bba683f813d4b19c21be6e0ad3acc7adaf1",
            "accessPath": "/var/lib/dpkg/status.d/libc6",
            "annotations": {
              "evidence": "primary"
            }
          },
          {
            "path": "/usr/share/doc/libc6/copyright",
            "layerID": "sha256:318bc252656ce5b3c77fc9a13e302bba683f813d4b19c21be6e0ad3acc7adaf1",
            "accessPath": "/usr/share/doc/libc6/copyright",
            "annotations": {
              "evidence": "supporting"
            }
          },
          {
            "path": "/var/lib/dpkg/status.d/libc6.md5sums",
            "layerID": "sha256:318bc252656ce5b3c77fc9a13e302bba683f813d4b19c21be6e0ad3acc7adaf1",
            "accessPath": "/var/lib/dpkg/status.d/libc6.md5sums",
            "annotations": {
              "evidence": "supporting"
            }
          }
        ],
        "language": "",
        "licenses": [
          "BSD-2-clause",
          "BSD-3-clause-Berkeley",
          "BSD-3-clause-Carnegie",
          "BSD-3-clause-Oracle",
          "BSD-3-clause-WIDE",
          "BSD-like-Spencer",
          "BSL-1.0",
          "CORE-MATH",
          "Carnegie",
          "DEC",
          "FSFAP",
          "GPL-2",
          "GPL-2+",
          "GPL-2+-with-link-exception",
          "GPL-3",
          "GPL-3+",
          "IBM",
          "ISC",
          "Inner-Net",
          "LGPL-2",
          "LGPL-2+",
          "LGPL-2.1",
          "LGPL-2.1+",
          "LGPL-2.1+-with-link-exception",
          "LGPL-3",
          "LGPL-3+",
          "MIT-like-Lord",
          "PCRE",
          "SunPro",
          "Unicode-DFS-2016",
          "Univ-Coimbra",
          "public-domain"
        ],
        "cpes": [
          "cpe:2.3:a:libc6:libc6:2.41-12\\+deb13u2:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libc6@2.41-12%2Bdeb13u2?arch=amd64&distro=debian-13&upstream=glibc",
        "upstreams": [
          {
            "name": "glibc"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2019-1010023",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2019-1010023",
        "namespace": "debian:distro:debian:13",
        "severity": "Negligible",
        "urls": [],
        "description": "GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.",
        "cvss": [],
        "epss": [
          {
            "cve": "CVE-2019-1010023",
            "epss": 0.00313,
            "percentile": 0.54478,
            "date": "2026-04-27"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.01565
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2019-1010023",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2019-1010023",
          "namespace": "nvd:cpe",
          "severity": "High",
          "urls": [
            "http://www.securityfocus.com/bid/109167",
            "https://security-tracker.debian.org/tracker/CVE-2019-1010023",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=22851",
            "https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp%3Butm_medium=RSS",
            "https://ubuntu.com/security/CVE-2019-1010023"
          ],
          "description": "GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.",
          "cvss": [
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "3.0",
              "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "metrics": {
                "baseScore": 8.8,
                "exploitabilityScore": 2.9,
                "impactScore": 5.9
              },
              "vendorMetadata": {}
            },
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "2.0",
              "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
              "metrics": {
                "baseScore": 6.8,
                "exploitabilityScore": 8.6,
                "impactScore": 6.5
              },
              "vendorMetadata": {}
            },
            {
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
              "metrics": {
                "baseScore": 5.4,
                "exploitabilityScore": 2.9,
                "impactScore": 2.6
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2019-1010023",
              "epss": 0.00313,
              "percentile": 0.54478,
              "date": "2026-04-27"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "glibc",
              "version": "2.41-12+deb13u2"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2019-1010023",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "5e21ad3d95f6eebc",
        "name": "libc6",
        "version": "2.41-12+deb13u2",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libc6",
            "layerID": "sha256:318bc252656ce5b3c77fc9a13e302bba683f813d4b19c21be6e0ad3acc7adaf1",
            "accessPath": "/var/lib/dpkg/status.d/libc6",
            "annotations": {
              "evidence": "primary"
            }
          },
          {
            "path": "/usr/share/doc/libc6/copyright",
            "layerID": "sha256:318bc252656ce5b3c77fc9a13e302bba683f813d4b19c21be6e0ad3acc7adaf1",
            "accessPath": "/usr/share/doc/libc6/copyright",
            "annotations": {
              "evidence": "supporting"
            }
          },
          {
            "path": "/var/lib/dpkg/status.d/libc6.md5sums",
            "layerID": "sha256:318bc252656ce5b3c77fc9a13e302bba683f813d4b19c21be6e0ad3acc7adaf1",
            "accessPath": "/var/lib/dpkg/status.d/libc6.md5sums",
            "annotations": {
              "evidence": "supporting"
            }
          }
        ],
        "language": "",
        "licenses": [
          "BSD-2-clause",
          "BSD-3-clause-Berkeley",
          "BSD-3-clause-Carnegie",
          "BSD-3-clause-Oracle",
          "BSD-3-clause-WIDE",
          "BSD-like-Spencer",
          "BSL-1.0",
          "CORE-MATH",
          "Carnegie",
          "DEC",
          "FSFAP",
          "GPL-2",
          "GPL-2+",
          "GPL-2+-with-link-exception",
          "GPL-3",
          "GPL-3+",
          "IBM",
          "ISC",
          "Inner-Net",
          "LGPL-2",
          "LGPL-2+",
          "LGPL-2.1",
          "LGPL-2.1+",
          "LGPL-2.1+-with-link-exception",
          "LGPL-3",
          "LGPL-3+",
          "MIT-like-Lord",
          "PCRE",
          "SunPro",
          "Unicode-DFS-2016",
          "Univ-Coimbra",
          "public-domain"
        ],
        "cpes": [
          "cpe:2.3:a:libc6:libc6:2.41-12\\+deb13u2:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libc6@2.41-12%2Bdeb13u2?arch=amd64&distro=debian-13&upstream=glibc",
        "upstreams": [
          {
            "name": "glibc"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2025-14524",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2025-14524",
        "namespace": "debian:distro:debian:13",
        "severity": "Medium",
        "urls": [],
        "description": "When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP, POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new target host.",
        "cvss": [
          {
            "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "type": "Secondary",
            "version": "3.1",
            "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "metrics": {
              "baseScore": 5.3,
              "exploitabilityScore": 1.7,
              "impactScore": 3.6
            },
            "vendorMetadata": {}
          }
        ],
        "epss": [
          {
            "cve": "CVE-2025-14524",
            "epss": 0.00026,
            "percentile": 0.07221,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2025-14524",
            "cwe": "CWE-601",
            "source": "nvd@nist.gov",
            "type": "Primary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "wont-fix"
        },
        "advisories": [],
        "risk": 0.01339
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2025-14524",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2025-14524",
          "namespace": "nvd:cpe",
          "severity": "Medium",
          "urls": [
            "https://curl.se/docs/CVE-2025-14524.html",
            "https://curl.se/docs/CVE-2025-14524.json",
            "https://hackerone.com/reports/3459417",
            "http://www.openwall.com/lists/oss-security/2026/01/07/4"
          ],
          "description": "When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer\nperforms a cross-protocol redirect to a second URL that uses an IMAP, LDAP,\nPOP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new\ntarget host.",
          "cvss": [
            {
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
              "metrics": {
                "baseScore": 5.3,
                "exploitabilityScore": 1.7,
                "impactScore": 3.6
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2025-14524",
              "epss": 0.00026,
              "percentile": 0.07221,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2025-14524",
              "cwe": "CWE-601",
              "source": "nvd@nist.gov",
              "type": "Primary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "curl",
              "version": "8.14.1-2+deb13u2"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2025-14524",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "2c9e2faa683beba2",
        "name": "libcurl4t64",
        "version": "8.14.1-2+deb13u2",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libcurl4t64",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libcurl4t64",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libcurl4t64:libcurl4t64:8.14.1-2\\+deb13u2:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libcurl4t64@8.14.1-2%2Bdeb13u2?arch=amd64&distro=debian-13&upstream=curl",
        "upstreams": [
          {
            "name": "curl"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2026-3784",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2026-3784",
        "namespace": "debian:distro:debian:13",
        "severity": "Medium",
        "urls": [],
        "description": "curl would wrongly reuse an existing HTTP proxy connection doing CONNECT to a server, even if the new request uses different credentials for the HTTP proxy. The proper behavior is to create or use a separate connection.",
        "cvss": [
          {
            "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "type": "Secondary",
            "version": "3.1",
            "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "metrics": {
              "baseScore": 6.5,
              "exploitabilityScore": 3.9,
              "impactScore": 2.6
            },
            "vendorMetadata": {}
          }
        ],
        "epss": [
          {
            "cve": "CVE-2026-3784",
            "epss": 0.00022,
            "percentile": 0.06118,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2026-3784",
            "cwe": "CWE-305",
            "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "type": "Secondary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "wont-fix"
        },
        "advisories": [],
        "risk": 0.012649999999999998
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2026-3784",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2026-3784",
          "namespace": "nvd:cpe",
          "severity": "Medium",
          "urls": [
            "https://curl.se/docs/CVE-2026-3784.html",
            "https://curl.se/docs/CVE-2026-3784.json",
            "https://hackerone.com/reports/3584903",
            "http://www.openwall.com/lists/oss-security/2026/03/11/3"
          ],
          "description": "curl would wrongly reuse an existing HTTP proxy connection doing CONNECT to a\nserver, even if the new request uses different credentials for the HTTP proxy.\nThe proper behavior is to create or use a separate connection.",
          "cvss": [
            {
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
              "metrics": {
                "baseScore": 6.5,
                "exploitabilityScore": 3.9,
                "impactScore": 2.6
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2026-3784",
              "epss": 0.00022,
              "percentile": 0.06118,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2026-3784",
              "cwe": "CWE-305",
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "curl",
              "version": "8.14.1-2+deb13u2"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2026-3784",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "2c9e2faa683beba2",
        "name": "libcurl4t64",
        "version": "8.14.1-2+deb13u2",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libcurl4t64",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libcurl4t64",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libcurl4t64:libcurl4t64:8.14.1-2\\+deb13u2:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libcurl4t64@8.14.1-2%2Bdeb13u2?arch=amd64&distro=debian-13&upstream=curl",
        "upstreams": [
          {
            "name": "curl"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2024-26458",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2024-26458",
        "namespace": "debian:distro:debian:13",
        "severity": "Negligible",
        "urls": [],
        "description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.",
        "cvss": [],
        "epss": [
          {
            "cve": "CVE-2024-26458",
            "epss": 0.0025,
            "percentile": 0.4823,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2024-26458",
            "cwe": "CWE-401",
            "source": "nvd@nist.gov",
            "type": "Primary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.0125
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2024-26458",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2024-26458",
          "namespace": "nvd:cpe",
          "severity": "Medium",
          "urls": [
            "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_1.md",
            "https://security.netapp.com/advisory/ntap-20240415-0010/"
          ],
          "description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.",
          "cvss": [
            {
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "metrics": {
                "baseScore": 5.3,
                "exploitabilityScore": 3.9,
                "impactScore": 1.5
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2024-26458",
              "epss": 0.0025,
              "percentile": 0.4823,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2024-26458",
              "cwe": "CWE-401",
              "source": "nvd@nist.gov",
              "type": "Primary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "krb5",
              "version": "1.21.3-5"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2024-26458",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "b6ee860d702b8084",
        "name": "libgssapi-krb5-2",
        "version": "1.21.3-5",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libgssapi-krb5-2",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libgssapi-krb5-2",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libgssapi-krb5-2:libgssapi-krb5-2:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libgssapi-krb5-2:libgssapi_krb5_2:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libgssapi_krb5_2:libgssapi-krb5-2:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libgssapi_krb5_2:libgssapi_krb5_2:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libgssapi-krb5:libgssapi-krb5-2:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libgssapi-krb5:libgssapi_krb5_2:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libgssapi_krb5:libgssapi-krb5-2:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libgssapi_krb5:libgssapi_krb5_2:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libgssapi:libgssapi-krb5-2:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libgssapi:libgssapi_krb5_2:1.21.3-5:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libgssapi-krb5-2@1.21.3-5?arch=amd64&distro=debian-13&upstream=krb5",
        "upstreams": [
          {
            "name": "krb5"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2024-26458",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2024-26458",
        "namespace": "debian:distro:debian:13",
        "severity": "Negligible",
        "urls": [],
        "description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.",
        "cvss": [],
        "epss": [
          {
            "cve": "CVE-2024-26458",
            "epss": 0.0025,
            "percentile": 0.4823,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2024-26458",
            "cwe": "CWE-401",
            "source": "nvd@nist.gov",
            "type": "Primary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.0125
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2024-26458",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2024-26458",
          "namespace": "nvd:cpe",
          "severity": "Medium",
          "urls": [
            "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_1.md",
            "https://security.netapp.com/advisory/ntap-20240415-0010/"
          ],
          "description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.",
          "cvss": [
            {
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "metrics": {
                "baseScore": 5.3,
                "exploitabilityScore": 3.9,
                "impactScore": 1.5
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2024-26458",
              "epss": 0.0025,
              "percentile": 0.4823,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2024-26458",
              "cwe": "CWE-401",
              "source": "nvd@nist.gov",
              "type": "Primary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "krb5",
              "version": "1.21.3-5"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2024-26458",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "52ef833c1503e21a",
        "name": "libk5crypto3",
        "version": "1.21.3-5",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libk5crypto3",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libk5crypto3",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libk5crypto3:libk5crypto3:1.21.3-5:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libk5crypto3@1.21.3-5?arch=amd64&distro=debian-13&upstream=krb5",
        "upstreams": [
          {
            "name": "krb5"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2024-26458",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2024-26458",
        "namespace": "debian:distro:debian:13",
        "severity": "Negligible",
        "urls": [],
        "description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.",
        "cvss": [],
        "epss": [
          {
            "cve": "CVE-2024-26458",
            "epss": 0.0025,
            "percentile": 0.4823,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2024-26458",
            "cwe": "CWE-401",
            "source": "nvd@nist.gov",
            "type": "Primary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.0125
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2024-26458",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2024-26458",
          "namespace": "nvd:cpe",
          "severity": "Medium",
          "urls": [
            "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_1.md",
            "https://security.netapp.com/advisory/ntap-20240415-0010/"
          ],
          "description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.",
          "cvss": [
            {
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "metrics": {
                "baseScore": 5.3,
                "exploitabilityScore": 3.9,
                "impactScore": 1.5
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2024-26458",
              "epss": 0.0025,
              "percentile": 0.4823,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2024-26458",
              "cwe": "CWE-401",
              "source": "nvd@nist.gov",
              "type": "Primary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "krb5",
              "version": "1.21.3-5"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2024-26458",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "d4c94f2fc66f3184",
        "name": "libkrb5-3",
        "version": "1.21.3-5",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libkrb5-3",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libkrb5-3",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libkrb5-3:libkrb5-3:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libkrb5-3:libkrb5_3:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libkrb5_3:libkrb5-3:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libkrb5_3:libkrb5_3:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libkrb5:libkrb5-3:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libkrb5:libkrb5_3:1.21.3-5:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libkrb5-3@1.21.3-5?arch=amd64&distro=debian-13&upstream=krb5",
        "upstreams": [
          {
            "name": "krb5"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2024-26458",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2024-26458",
        "namespace": "debian:distro:debian:13",
        "severity": "Negligible",
        "urls": [],
        "description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.",
        "cvss": [],
        "epss": [
          {
            "cve": "CVE-2024-26458",
            "epss": 0.0025,
            "percentile": 0.4823,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2024-26458",
            "cwe": "CWE-401",
            "source": "nvd@nist.gov",
            "type": "Primary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.0125
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2024-26458",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2024-26458",
          "namespace": "nvd:cpe",
          "severity": "Medium",
          "urls": [
            "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_1.md",
            "https://security.netapp.com/advisory/ntap-20240415-0010/"
          ],
          "description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.",
          "cvss": [
            {
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "metrics": {
                "baseScore": 5.3,
                "exploitabilityScore": 3.9,
                "impactScore": 1.5
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2024-26458",
              "epss": 0.0025,
              "percentile": 0.4823,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2024-26458",
              "cwe": "CWE-401",
              "source": "nvd@nist.gov",
              "type": "Primary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "krb5",
              "version": "1.21.3-5"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2024-26458",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "56fc39be304d53f0",
        "name": "libkrb5support0",
        "version": "1.21.3-5",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libkrb5support0",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libkrb5support0",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libkrb5support0:libkrb5support0:1.21.3-5:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libkrb5support0@1.21.3-5?arch=amd64&distro=debian-13&upstream=krb5",
        "upstreams": [
          {
            "name": "krb5"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2026-3783",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2026-3783",
        "namespace": "debian:distro:debian:13",
        "severity": "Medium",
        "urls": [],
        "description": "When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a redirect to a second URL, curl could leak that token to the second hostname under some circumstances.  If the hostname that the first request is redirected to has information in the used .netrc file, with either of the `machine` or `default` keywords, curl would pass on the bearer token set for the first host also to the second one.",
        "cvss": [
          {
            "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "type": "Secondary",
            "version": "3.1",
            "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "metrics": {
              "baseScore": 5.3,
              "exploitabilityScore": 3.9,
              "impactScore": 1.5
            },
            "vendorMetadata": {}
          }
        ],
        "epss": [
          {
            "cve": "CVE-2026-3783",
            "epss": 0.00023,
            "percentile": 0.06411,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2026-3783",
            "cwe": "CWE-522",
            "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "type": "Secondary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "wont-fix"
        },
        "advisories": [],
        "risk": 0.011845000000000001
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2026-3783",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2026-3783",
          "namespace": "nvd:cpe",
          "severity": "Medium",
          "urls": [
            "https://curl.se/docs/CVE-2026-3783.html",
            "https://curl.se/docs/CVE-2026-3783.json",
            "https://hackerone.com/reports/3583983",
            "http://www.openwall.com/lists/oss-security/2026/03/11/2"
          ],
          "description": "When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer\nperforms a redirect to a second URL, curl could leak that token to the second\nhostname under some circumstances.\n\nIf the hostname that the first request is redirected to has information in the\nused .netrc file, with either of the `machine` or `default` keywords, curl\nwould pass on the bearer token set for the first host also to the second one.",
          "cvss": [
            {
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "metrics": {
                "baseScore": 5.3,
                "exploitabilityScore": 3.9,
                "impactScore": 1.5
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2026-3783",
              "epss": 0.00023,
              "percentile": 0.06411,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2026-3783",
              "cwe": "CWE-522",
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "curl",
              "version": "8.14.1-2+deb13u2"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2026-3783",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "2c9e2faa683beba2",
        "name": "libcurl4t64",
        "version": "8.14.1-2+deb13u2",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libcurl4t64",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libcurl4t64",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libcurl4t64:libcurl4t64:8.14.1-2\\+deb13u2:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libcurl4t64@8.14.1-2%2Bdeb13u2?arch=amd64&distro=debian-13&upstream=curl",
        "upstreams": [
          {
            "name": "curl"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2020-15719",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2020-15719",
        "namespace": "debian:distro:debian:13",
        "severity": "Negligible",
        "urls": [],
        "description": "libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectAltName (SAN). This is fixed in, for example, openldap-2.4.46-10.el8 in Red Hat Enterprise Linux.",
        "cvss": [],
        "epss": [
          {
            "cve": "CVE-2020-15719",
            "epss": 0.00216,
            "percentile": 0.43986,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2020-15719",
            "cwe": "CWE-295",
            "source": "nvd@nist.gov",
            "type": "Primary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.0108
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2020-15719",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2020-15719",
          "namespace": "nvd:cpe",
          "severity": "Medium",
          "urls": [
            "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html",
            "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html",
            "https://access.redhat.com/errata/RHBA-2019:3674",
            "https://bugs.openldap.org/show_bug.cgi?id=9266",
            "https://bugzilla.redhat.com/show_bug.cgi?id=1740070",
            "https://kc.mcafee.com/corporate/index?page=content&id=SB10365",
            "https://www.oracle.com/security-alerts/cpuapr2022.html"
          ],
          "description": "libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectAltName (SAN). This is fixed in, for example, openldap-2.4.46-10.el8 in Red Hat Enterprise Linux.",
          "cvss": [
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
              "metrics": {
                "baseScore": 4.2,
                "exploitabilityScore": 1.7,
                "impactScore": 2.6
              },
              "vendorMetadata": {}
            },
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "2.0",
              "vector": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
              "metrics": {
                "baseScore": 4,
                "exploitabilityScore": 5,
                "impactScore": 5
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2020-15719",
              "epss": 0.00216,
              "percentile": 0.43986,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2020-15719",
              "cwe": "CWE-295",
              "source": "nvd@nist.gov",
              "type": "Primary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "openldap",
              "version": "2.6.10+dfsg-1"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2020-15719",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "46230cf5226e2e82",
        "name": "libldap2",
        "version": "2.6.10+dfsg-1",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libldap2",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libldap2",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libldap2:libldap2:2.6.10\\+dfsg-1:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libldap2@2.6.10%2Bdfsg-1?arch=amd64&distro=debian-13&upstream=openldap",
        "upstreams": [
          {
            "name": "openldap"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2026-29111",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2026-29111",
        "namespace": "debian:distro:debian:13",
        "severity": "Medium",
        "urls": [],
        "description": "systemd, a system and service manager, (as PID 1) hits an assert and freezes execution when an unprivileged IPC API call is made with spurious data. On version v249 and older the effect is not an assert, but stack overwriting, with the attacker controlled content. From version v250 and newer this is not possible as the safety check causes an assert instead. This IPC call was added in v239, so versions older than that are not affected. Versions 260-rc1, 259.2, 258.5, and 257.11 contain patches. No known workarounds are available.",
        "cvss": [
          {
            "source": "security-advisories@github.com",
            "type": "Secondary",
            "version": "3.1",
            "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "metrics": {
              "baseScore": 5.5,
              "exploitabilityScore": 1.9,
              "impactScore": 3.6
            },
            "vendorMetadata": {}
          }
        ],
        "epss": [
          {
            "cve": "CVE-2026-29111",
            "epss": 0.0002,
            "percentile": 0.05537,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2026-29111",
            "cwe": "CWE-269",
            "source": "security-advisories@github.com",
            "type": "Primary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "wont-fix"
        },
        "advisories": [],
        "risk": 0.0105
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2026-29111",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2026-29111",
          "namespace": "nvd:cpe",
          "severity": "Medium",
          "urls": [
            "https://github.com/systemd/systemd/commit/1d22f706bd04f45f8422e17fbde3f56ece17758a",
            "https://github.com/systemd/systemd/commit/20021e7686426052e3a7505425d7e12085feb2a6",
            "https://github.com/systemd/systemd/commit/21167006574d6b83813c7596759b474f56562412",
            "https://github.com/systemd/systemd/commit/3cee294fe8cf4fa0eff933ab21416d099942cabd",
            "https://github.com/systemd/systemd/commit/42aee39107fbdd7db1ccd402a2151822b2805e9f",
            "https://github.com/systemd/systemd/commit/54588d2dedff54bfb6036670820650e4ea74628f",
            "https://github.com/systemd/systemd/commit/7ac3220213690e8a8d6d2a6e81e43bd1dce01d69",
            "https://github.com/systemd/systemd/commit/80acea4ef80a4bb78560ed970c34952299b890d6",
            "https://github.com/systemd/systemd/commit/b5fd14693057e5f2c9b4a49603be64ec3608ff6c",
            "https://github.com/systemd/systemd/commit/efa6ba2ab625aaa160ac435a09e6482fc63bdbe8",
            "https://github.com/systemd/systemd/security/advisories/GHSA-gx6q-6f99-m764"
          ],
          "description": "systemd, a system and service manager, (as PID 1) hits an assert and freezes execution when an unprivileged IPC API call is made with spurious data. On version v249 and older the effect is not an assert, but stack overwriting, with the attacker controlled content. From version v250 and newer this is not possible as the safety check causes an assert instead. This IPC call was added in v239, so versions older than that are not affected. Versions 260-rc1, 259.2, 258.5, and 257.11 contain patches. No known workarounds are available.",
          "cvss": [
            {
              "source": "security-advisories@github.com",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
              "metrics": {
                "baseScore": 5.5,
                "exploitabilityScore": 1.9,
                "impactScore": 3.6
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2026-29111",
              "epss": 0.0002,
              "percentile": 0.05537,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2026-29111",
              "cwe": "CWE-269",
              "source": "security-advisories@github.com",
              "type": "Primary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "systemd",
              "version": "257.9-1~deb13u1"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2026-29111",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "4f3b916d8498c51d",
        "name": "libsystemd0",
        "version": "257.9-1~deb13u1",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libsystemd0",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libsystemd0",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libsystemd0:libsystemd0:257.9-1\\~deb13u1:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64&distro=debian-13&upstream=systemd",
        "upstreams": [
          {
            "name": "systemd"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2026-29111",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2026-29111",
        "namespace": "debian:distro:debian:13",
        "severity": "Medium",
        "urls": [],
        "description": "systemd, a system and service manager, (as PID 1) hits an assert and freezes execution when an unprivileged IPC API call is made with spurious data. On version v249 and older the effect is not an assert, but stack overwriting, with the attacker controlled content. From version v250 and newer this is not possible as the safety check causes an assert instead. This IPC call was added in v239, so versions older than that are not affected. Versions 260-rc1, 259.2, 258.5, and 257.11 contain patches. No known workarounds are available.",
        "cvss": [
          {
            "source": "security-advisories@github.com",
            "type": "Secondary",
            "version": "3.1",
            "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "metrics": {
              "baseScore": 5.5,
              "exploitabilityScore": 1.9,
              "impactScore": 3.6
            },
            "vendorMetadata": {}
          }
        ],
        "epss": [
          {
            "cve": "CVE-2026-29111",
            "epss": 0.0002,
            "percentile": 0.05537,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2026-29111",
            "cwe": "CWE-269",
            "source": "security-advisories@github.com",
            "type": "Primary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "wont-fix"
        },
        "advisories": [],
        "risk": 0.0105
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2026-29111",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2026-29111",
          "namespace": "nvd:cpe",
          "severity": "Medium",
          "urls": [
            "https://github.com/systemd/systemd/commit/1d22f706bd04f45f8422e17fbde3f56ece17758a",
            "https://github.com/systemd/systemd/commit/20021e7686426052e3a7505425d7e12085feb2a6",
            "https://github.com/systemd/systemd/commit/21167006574d6b83813c7596759b474f56562412",
            "https://github.com/systemd/systemd/commit/3cee294fe8cf4fa0eff933ab21416d099942cabd",
            "https://github.com/systemd/systemd/commit/42aee39107fbdd7db1ccd402a2151822b2805e9f",
            "https://github.com/systemd/systemd/commit/54588d2dedff54bfb6036670820650e4ea74628f",
            "https://github.com/systemd/systemd/commit/7ac3220213690e8a8d6d2a6e81e43bd1dce01d69",
            "https://github.com/systemd/systemd/commit/80acea4ef80a4bb78560ed970c34952299b890d6",
            "https://github.com/systemd/systemd/commit/b5fd14693057e5f2c9b4a49603be64ec3608ff6c",
            "https://github.com/systemd/systemd/commit/efa6ba2ab625aaa160ac435a09e6482fc63bdbe8",
            "https://github.com/systemd/systemd/security/advisories/GHSA-gx6q-6f99-m764"
          ],
          "description": "systemd, a system and service manager, (as PID 1) hits an assert and freezes execution when an unprivileged IPC API call is made with spurious data. On version v249 and older the effect is not an assert, but stack overwriting, with the attacker controlled content. From version v250 and newer this is not possible as the safety check causes an assert instead. This IPC call was added in v239, so versions older than that are not affected. Versions 260-rc1, 259.2, 258.5, and 257.11 contain patches. No known workarounds are available.",
          "cvss": [
            {
              "source": "security-advisories@github.com",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
              "metrics": {
                "baseScore": 5.5,
                "exploitabilityScore": 1.9,
                "impactScore": 3.6
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2026-29111",
              "epss": 0.0002,
              "percentile": 0.05537,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2026-29111",
              "cwe": "CWE-269",
              "source": "security-advisories@github.com",
              "type": "Primary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-direct-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "systemd",
              "version": "257.9-1~deb13u1"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2026-29111",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "49db2eae5abce987",
        "name": "systemd",
        "version": "257.9-1~deb13u1",
        "type": "deb",
        "locations": [
          {
            "path": "/usr/lib/x86_64-linux-gnu/libsystemd.so.0.40.0",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/usr/lib/x86_64-linux-gnu/libsystemd.so.0.40.0",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:systemd:systemd:257.9-1\\~deb13u1:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/Debian/systemd@257.9-1~deb13u1?distro=Debian",
        "upstreams": []
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2023-31437",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2023-31437",
        "namespace": "debian:distro:debian:13",
        "severity": "Negligible",
        "urls": [],
        "description": "An issue was discovered in systemd 253. An attacker can modify a sealed log file such that, in some views, not all existing and sealed log messages are displayed. NOTE: the vendor reportedly sent \"a reply denying that any of the finding was a security vulnerability.\"",
        "cvss": [],
        "epss": [
          {
            "cve": "CVE-2023-31437",
            "epss": 0.0017,
            "percentile": 0.38,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2023-31437",
            "cwe": "CWE-354",
            "source": "nvd@nist.gov",
            "type": "Primary"
          },
          {
            "cve": "CVE-2023-31437",
            "cwe": "CWE-354",
            "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "type": "Secondary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.0085
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2023-31437",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2023-31437",
          "namespace": "nvd:cpe",
          "severity": "Medium",
          "urls": [
            "https://github.com/kastel-security/Journald",
            "https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf",
            "https://github.com/systemd/systemd/releases"
          ],
          "description": "An issue was discovered in systemd 253. An attacker can modify a sealed log file such that, in some views, not all existing and sealed log messages are displayed. NOTE: the vendor reportedly sent \"a reply denying that any of the finding was a security vulnerability.\"",
          "cvss": [
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "metrics": {
                "baseScore": 5.3,
                "exploitabilityScore": 3.9,
                "impactScore": 1.5
              },
              "vendorMetadata": {}
            },
            {
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "metrics": {
                "baseScore": 5.3,
                "exploitabilityScore": 3.9,
                "impactScore": 1.5
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2023-31437",
              "epss": 0.0017,
              "percentile": 0.38,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2023-31437",
              "cwe": "CWE-354",
              "source": "nvd@nist.gov",
              "type": "Primary"
            },
            {
              "cve": "CVE-2023-31437",
              "cwe": "CWE-354",
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "systemd",
              "version": "257.9-1~deb13u1"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2023-31437",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "4f3b916d8498c51d",
        "name": "libsystemd0",
        "version": "257.9-1~deb13u1",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libsystemd0",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libsystemd0",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libsystemd0:libsystemd0:257.9-1\\~deb13u1:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64&distro=debian-13&upstream=systemd",
        "upstreams": [
          {
            "name": "systemd"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2023-31437",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2023-31437",
        "namespace": "debian:distro:debian:13",
        "severity": "Negligible",
        "urls": [],
        "description": "An issue was discovered in systemd 253. An attacker can modify a sealed log file such that, in some views, not all existing and sealed log messages are displayed. NOTE: the vendor reportedly sent \"a reply denying that any of the finding was a security vulnerability.\"",
        "cvss": [],
        "epss": [
          {
            "cve": "CVE-2023-31437",
            "epss": 0.0017,
            "percentile": 0.38,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2023-31437",
            "cwe": "CWE-354",
            "source": "nvd@nist.gov",
            "type": "Primary"
          },
          {
            "cve": "CVE-2023-31437",
            "cwe": "CWE-354",
            "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "type": "Secondary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.0085
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2023-31437",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2023-31437",
          "namespace": "nvd:cpe",
          "severity": "Medium",
          "urls": [
            "https://github.com/kastel-security/Journald",
            "https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf",
            "https://github.com/systemd/systemd/releases"
          ],
          "description": "An issue was discovered in systemd 253. An attacker can modify a sealed log file such that, in some views, not all existing and sealed log messages are displayed. NOTE: the vendor reportedly sent \"a reply denying that any of the finding was a security vulnerability.\"",
          "cvss": [
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "metrics": {
                "baseScore": 5.3,
                "exploitabilityScore": 3.9,
                "impactScore": 1.5
              },
              "vendorMetadata": {}
            },
            {
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "metrics": {
                "baseScore": 5.3,
                "exploitabilityScore": 3.9,
                "impactScore": 1.5
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2023-31437",
              "epss": 0.0017,
              "percentile": 0.38,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2023-31437",
              "cwe": "CWE-354",
              "source": "nvd@nist.gov",
              "type": "Primary"
            },
            {
              "cve": "CVE-2023-31437",
              "cwe": "CWE-354",
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-direct-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "systemd",
              "version": "257.9-1~deb13u1"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2023-31437",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "49db2eae5abce987",
        "name": "systemd",
        "version": "257.9-1~deb13u1",
        "type": "deb",
        "locations": [
          {
            "path": "/usr/lib/x86_64-linux-gnu/libsystemd.so.0.40.0",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/usr/lib/x86_64-linux-gnu/libsystemd.so.0.40.0",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:systemd:systemd:257.9-1\\~deb13u1:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/Debian/systemd@257.9-1~deb13u1?distro=Debian",
        "upstreams": []
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2026-4105",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2026-4105",
        "namespace": "debian:distro:debian:13",
        "severity": "Medium",
        "urls": [],
        "description": "A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system.",
        "cvss": [
          {
            "source": "secalert@redhat.com",
            "type": "Primary",
            "version": "3.1",
            "vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "metrics": {
              "baseScore": 6.7,
              "exploitabilityScore": 0.8,
              "impactScore": 5.9
            },
            "vendorMetadata": {}
          }
        ],
        "epss": [
          {
            "cve": "CVE-2026-4105",
            "epss": 0.00012,
            "percentile": 0.01719,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2026-4105",
            "cwe": "CWE-284",
            "source": "secalert@redhat.com",
            "type": "Primary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "wont-fix"
        },
        "advisories": [],
        "risk": 0.00702
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2026-4105",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2026-4105",
          "namespace": "nvd:cpe",
          "severity": "Medium",
          "urls": [
            "https://access.redhat.com/security/cve/CVE-2026-4105",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2447262",
            "https://github.com/systemd/systemd/security/advisories/GHSA-4h6x-r8vx-3862"
          ],
          "description": "A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system.",
          "cvss": [
            {
              "source": "secalert@redhat.com",
              "type": "Primary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
              "metrics": {
                "baseScore": 6.7,
                "exploitabilityScore": 0.8,
                "impactScore": 5.9
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2026-4105",
              "epss": 0.00012,
              "percentile": 0.01719,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2026-4105",
              "cwe": "CWE-284",
              "source": "secalert@redhat.com",
              "type": "Primary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "systemd",
              "version": "257.9-1~deb13u1"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2026-4105",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "4f3b916d8498c51d",
        "name": "libsystemd0",
        "version": "257.9-1~deb13u1",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libsystemd0",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libsystemd0",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libsystemd0:libsystemd0:257.9-1\\~deb13u1:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64&distro=debian-13&upstream=systemd",
        "upstreams": [
          {
            "name": "systemd"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2026-4105",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2026-4105",
        "namespace": "debian:distro:debian:13",
        "severity": "Medium",
        "urls": [],
        "description": "A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system.",
        "cvss": [
          {
            "source": "secalert@redhat.com",
            "type": "Primary",
            "version": "3.1",
            "vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "metrics": {
              "baseScore": 6.7,
              "exploitabilityScore": 0.8,
              "impactScore": 5.9
            },
            "vendorMetadata": {}
          }
        ],
        "epss": [
          {
            "cve": "CVE-2026-4105",
            "epss": 0.00012,
            "percentile": 0.01719,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2026-4105",
            "cwe": "CWE-284",
            "source": "secalert@redhat.com",
            "type": "Primary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "wont-fix"
        },
        "advisories": [],
        "risk": 0.00702
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2026-4105",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2026-4105",
          "namespace": "nvd:cpe",
          "severity": "Medium",
          "urls": [
            "https://access.redhat.com/security/cve/CVE-2026-4105",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2447262",
            "https://github.com/systemd/systemd/security/advisories/GHSA-4h6x-r8vx-3862"
          ],
          "description": "A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system.",
          "cvss": [
            {
              "source": "secalert@redhat.com",
              "type": "Primary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
              "metrics": {
                "baseScore": 6.7,
                "exploitabilityScore": 0.8,
                "impactScore": 5.9
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2026-4105",
              "epss": 0.00012,
              "percentile": 0.01719,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2026-4105",
              "cwe": "CWE-284",
              "source": "secalert@redhat.com",
              "type": "Primary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-direct-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "systemd",
              "version": "257.9-1~deb13u1"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2026-4105",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "49db2eae5abce987",
        "name": "systemd",
        "version": "257.9-1~deb13u1",
        "type": "deb",
        "locations": [
          {
            "path": "/usr/lib/x86_64-linux-gnu/libsystemd.so.0.40.0",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/usr/lib/x86_64-linux-gnu/libsystemd.so.0.40.0",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:systemd:systemd:257.9-1\\~deb13u1:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/Debian/systemd@257.9-1~deb13u1?distro=Debian",
        "upstreams": []
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2026-41989",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2026-41989",
        "namespace": "debian:distro:debian:13",
        "severity": "Medium",
        "urls": [],
        "description": "Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.",
        "cvss": [
          {
            "source": "cve@mitre.org",
            "type": "Secondary",
            "version": "3.1",
            "vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H",
            "metrics": {
              "baseScore": 6.7,
              "exploitabilityScore": 1.5,
              "impactScore": 5.2
            },
            "vendorMetadata": {}
          }
        ],
        "epss": [
          {
            "cve": "CVE-2026-41989",
            "epss": 0.00012,
            "percentile": 0.01692,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2026-41989",
            "cwe": "CWE-787",
            "source": "cve@mitre.org",
            "type": "Primary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.00702
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2026-41989",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2026-41989",
          "namespace": "nvd:cpe",
          "severity": "Medium",
          "urls": [
            "https://dev.gnupg.org/T8211",
            "https://lists.gnupg.org/pipermail/gnupg-announce/2026q2/000503.html",
            "https://www.openwall.com/lists/oss-security/2026/04/21/1"
          ],
          "description": "Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.",
          "cvss": [
            {
              "source": "cve@mitre.org",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H",
              "metrics": {
                "baseScore": 6.7,
                "exploitabilityScore": 1.5,
                "impactScore": 5.2
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2026-41989",
              "epss": 0.00012,
              "percentile": 0.01692,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2026-41989",
              "cwe": "CWE-787",
              "source": "cve@mitre.org",
              "type": "Primary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-direct-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "libgcrypt20",
              "version": "1.11.0-7"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2026-41989",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "5826072934743d2f",
        "name": "libgcrypt20",
        "version": "1.11.0-7",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libgcrypt20",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libgcrypt20",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libgcrypt20:libgcrypt20:1.11.0-7:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libgcrypt20@1.11.0-7?arch=amd64&distro=debian-13",
        "upstreams": []
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2023-31438",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2023-31438",
        "namespace": "debian:distro:debian:13",
        "severity": "Negligible",
        "urls": [],
        "description": "An issue was discovered in systemd 253. An attacker can truncate a sealed log file and then resume log sealing such that checking the integrity shows no error, despite modifications. NOTE: the vendor reportedly sent \"a reply denying that any of the finding was a security vulnerability.\"",
        "cvss": [],
        "epss": [
          {
            "cve": "CVE-2023-31438",
            "epss": 0.00134,
            "percentile": 0.32652,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2023-31438",
            "cwe": "CWE-354",
            "source": "nvd@nist.gov",
            "type": "Primary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.0067
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2023-31438",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2023-31438",
          "namespace": "nvd:cpe",
          "severity": "Medium",
          "urls": [
            "https://github.com/kastel-security/Journald",
            "https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf",
            "https://github.com/systemd/systemd/pull/28886",
            "https://github.com/systemd/systemd/releases"
          ],
          "description": "An issue was discovered in systemd 253. An attacker can truncate a sealed log file and then resume log sealing such that checking the integrity shows no error, despite modifications. NOTE: the vendor reportedly sent \"a reply denying that any of the finding was a security vulnerability.\"",
          "cvss": [
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "metrics": {
                "baseScore": 5.3,
                "exploitabilityScore": 3.9,
                "impactScore": 1.5
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2023-31438",
              "epss": 0.00134,
              "percentile": 0.32652,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2023-31438",
              "cwe": "CWE-354",
              "source": "nvd@nist.gov",
              "type": "Primary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "systemd",
              "version": "257.9-1~deb13u1"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2023-31438",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "4f3b916d8498c51d",
        "name": "libsystemd0",
        "version": "257.9-1~deb13u1",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libsystemd0",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libsystemd0",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libsystemd0:libsystemd0:257.9-1\\~deb13u1:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64&distro=debian-13&upstream=systemd",
        "upstreams": [
          {
            "name": "systemd"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2023-31438",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2023-31438",
        "namespace": "debian:distro:debian:13",
        "severity": "Negligible",
        "urls": [],
        "description": "An issue was discovered in systemd 253. An attacker can truncate a sealed log file and then resume log sealing such that checking the integrity shows no error, despite modifications. NOTE: the vendor reportedly sent \"a reply denying that any of the finding was a security vulnerability.\"",
        "cvss": [],
        "epss": [
          {
            "cve": "CVE-2023-31438",
            "epss": 0.00134,
            "percentile": 0.32652,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2023-31438",
            "cwe": "CWE-354",
            "source": "nvd@nist.gov",
            "type": "Primary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.0067
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2023-31438",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2023-31438",
          "namespace": "nvd:cpe",
          "severity": "Medium",
          "urls": [
            "https://github.com/kastel-security/Journald",
            "https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf",
            "https://github.com/systemd/systemd/pull/28886",
            "https://github.com/systemd/systemd/releases"
          ],
          "description": "An issue was discovered in systemd 253. An attacker can truncate a sealed log file and then resume log sealing such that checking the integrity shows no error, despite modifications. NOTE: the vendor reportedly sent \"a reply denying that any of the finding was a security vulnerability.\"",
          "cvss": [
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "metrics": {
                "baseScore": 5.3,
                "exploitabilityScore": 3.9,
                "impactScore": 1.5
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2023-31438",
              "epss": 0.00134,
              "percentile": 0.32652,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2023-31438",
              "cwe": "CWE-354",
              "source": "nvd@nist.gov",
              "type": "Primary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-direct-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "systemd",
              "version": "257.9-1~deb13u1"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2023-31438",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "49db2eae5abce987",
        "name": "systemd",
        "version": "257.9-1~deb13u1",
        "type": "deb",
        "locations": [
          {
            "path": "/usr/lib/x86_64-linux-gnu/libsystemd.so.0.40.0",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/usr/lib/x86_64-linux-gnu/libsystemd.so.0.40.0",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:systemd:systemd:257.9-1\\~deb13u1:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/Debian/systemd@257.9-1~deb13u1?distro=Debian",
        "upstreams": []
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2019-1010022",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2019-1010022",
        "namespace": "debian:distro:debian:13",
        "severity": "Negligible",
        "urls": [],
        "description": "GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.",
        "cvss": [],
        "epss": [
          {
            "cve": "CVE-2019-1010022",
            "epss": 0.00131,
            "percentile": 0.32341,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2019-1010022",
            "cwe": "CWE-119",
            "source": "nvd@nist.gov",
            "type": "Primary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.00655
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2019-1010022",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2019-1010022",
          "namespace": "nvd:cpe",
          "severity": "Critical",
          "urls": [
            "https://security-tracker.debian.org/tracker/CVE-2019-1010022",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=22850",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3",
            "https://ubuntu.com/security/CVE-2019-1010022"
          ],
          "description": "GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.",
          "cvss": [
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "3.0",
              "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "metrics": {
                "baseScore": 9.8,
                "exploitabilityScore": 3.9,
                "impactScore": 5.9
              },
              "vendorMetadata": {}
            },
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "2.0",
              "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
              "metrics": {
                "baseScore": 7.5,
                "exploitabilityScore": 10,
                "impactScore": 6.5
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2019-1010022",
              "epss": 0.00131,
              "percentile": 0.32341,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2019-1010022",
              "cwe": "CWE-119",
              "source": "nvd@nist.gov",
              "type": "Primary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "glibc",
              "version": "2.41-12+deb13u2"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2019-1010022",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "5e21ad3d95f6eebc",
        "name": "libc6",
        "version": "2.41-12+deb13u2",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libc6",
            "layerID": "sha256:318bc252656ce5b3c77fc9a13e302bba683f813d4b19c21be6e0ad3acc7adaf1",
            "accessPath": "/var/lib/dpkg/status.d/libc6",
            "annotations": {
              "evidence": "primary"
            }
          },
          {
            "path": "/usr/share/doc/libc6/copyright",
            "layerID": "sha256:318bc252656ce5b3c77fc9a13e302bba683f813d4b19c21be6e0ad3acc7adaf1",
            "accessPath": "/usr/share/doc/libc6/copyright",
            "annotations": {
              "evidence": "supporting"
            }
          },
          {
            "path": "/var/lib/dpkg/status.d/libc6.md5sums",
            "layerID": "sha256:318bc252656ce5b3c77fc9a13e302bba683f813d4b19c21be6e0ad3acc7adaf1",
            "accessPath": "/var/lib/dpkg/status.d/libc6.md5sums",
            "annotations": {
              "evidence": "supporting"
            }
          }
        ],
        "language": "",
        "licenses": [
          "BSD-2-clause",
          "BSD-3-clause-Berkeley",
          "BSD-3-clause-Carnegie",
          "BSD-3-clause-Oracle",
          "BSD-3-clause-WIDE",
          "BSD-like-Spencer",
          "BSL-1.0",
          "CORE-MATH",
          "Carnegie",
          "DEC",
          "FSFAP",
          "GPL-2",
          "GPL-2+",
          "GPL-2+-with-link-exception",
          "GPL-3",
          "GPL-3+",
          "IBM",
          "ISC",
          "Inner-Net",
          "LGPL-2",
          "LGPL-2+",
          "LGPL-2.1",
          "LGPL-2.1+",
          "LGPL-2.1+-with-link-exception",
          "LGPL-3",
          "LGPL-3+",
          "MIT-like-Lord",
          "PCRE",
          "SunPro",
          "Unicode-DFS-2016",
          "Univ-Coimbra",
          "public-domain"
        ],
        "cpes": [
          "cpe:2.3:a:libc6:libc6:2.41-12\\+deb13u2:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libc6@2.41-12%2Bdeb13u2?arch=amd64&distro=debian-13&upstream=glibc",
        "upstreams": [
          {
            "name": "glibc"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2023-31439",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2023-31439",
        "namespace": "debian:distro:debian:13",
        "severity": "Negligible",
        "urls": [],
        "description": "An issue was discovered in systemd 253. An attacker can modify the contents of past events in a sealed log file and then adjust the file such that checking the integrity shows no error, despite modifications. NOTE: the vendor reportedly sent \"a reply denying that any of the finding was a security vulnerability.\"",
        "cvss": [],
        "epss": [
          {
            "cve": "CVE-2023-31439",
            "epss": 0.00125,
            "percentile": 0.31427,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2023-31439",
            "cwe": "CWE-354",
            "source": "nvd@nist.gov",
            "type": "Primary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.00625
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2023-31439",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2023-31439",
          "namespace": "nvd:cpe",
          "severity": "Medium",
          "urls": [
            "https://github.com/kastel-security/Journald",
            "https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf",
            "https://github.com/systemd/systemd/pull/28885",
            "https://github.com/systemd/systemd/releases"
          ],
          "description": "An issue was discovered in systemd 253. An attacker can modify the contents of past events in a sealed log file and then adjust the file such that checking the integrity shows no error, despite modifications. NOTE: the vendor reportedly sent \"a reply denying that any of the finding was a security vulnerability.\"",
          "cvss": [
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "metrics": {
                "baseScore": 5.3,
                "exploitabilityScore": 3.9,
                "impactScore": 1.5
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2023-31439",
              "epss": 0.00125,
              "percentile": 0.31427,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2023-31439",
              "cwe": "CWE-354",
              "source": "nvd@nist.gov",
              "type": "Primary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "systemd",
              "version": "257.9-1~deb13u1"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2023-31439",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "4f3b916d8498c51d",
        "name": "libsystemd0",
        "version": "257.9-1~deb13u1",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libsystemd0",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libsystemd0",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libsystemd0:libsystemd0:257.9-1\\~deb13u1:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64&distro=debian-13&upstream=systemd",
        "upstreams": [
          {
            "name": "systemd"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2023-31439",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2023-31439",
        "namespace": "debian:distro:debian:13",
        "severity": "Negligible",
        "urls": [],
        "description": "An issue was discovered in systemd 253. An attacker can modify the contents of past events in a sealed log file and then adjust the file such that checking the integrity shows no error, despite modifications. NOTE: the vendor reportedly sent \"a reply denying that any of the finding was a security vulnerability.\"",
        "cvss": [],
        "epss": [
          {
            "cve": "CVE-2023-31439",
            "epss": 0.00125,
            "percentile": 0.31427,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2023-31439",
            "cwe": "CWE-354",
            "source": "nvd@nist.gov",
            "type": "Primary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.00625
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2023-31439",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2023-31439",
          "namespace": "nvd:cpe",
          "severity": "Medium",
          "urls": [
            "https://github.com/kastel-security/Journald",
            "https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf",
            "https://github.com/systemd/systemd/pull/28885",
            "https://github.com/systemd/systemd/releases"
          ],
          "description": "An issue was discovered in systemd 253. An attacker can modify the contents of past events in a sealed log file and then adjust the file such that checking the integrity shows no error, despite modifications. NOTE: the vendor reportedly sent \"a reply denying that any of the finding was a security vulnerability.\"",
          "cvss": [
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "metrics": {
                "baseScore": 5.3,
                "exploitabilityScore": 3.9,
                "impactScore": 1.5
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2023-31439",
              "epss": 0.00125,
              "percentile": 0.31427,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2023-31439",
              "cwe": "CWE-354",
              "source": "nvd@nist.gov",
              "type": "Primary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-direct-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "systemd",
              "version": "257.9-1~deb13u1"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2023-31439",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "49db2eae5abce987",
        "name": "systemd",
        "version": "257.9-1~deb13u1",
        "type": "deb",
        "locations": [
          {
            "path": "/usr/lib/x86_64-linux-gnu/libsystemd.so.0.40.0",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/usr/lib/x86_64-linux-gnu/libsystemd.so.0.40.0",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:systemd:systemd:257.9-1\\~deb13u1:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/Debian/systemd@257.9-1~deb13u1?distro=Debian",
        "upstreams": []
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2025-13034",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2025-13034",
        "namespace": "debian:distro:debian:13",
        "severity": "Medium",
        "urls": [],
        "description": "When using `CURLOPT_PINNEDPUBLICKEY` option with libcurl or `--pinnedpubkey` with the curl tool,curl should check the public key of the server certificate to verify the peer.  This check was skipped in a certain condition that would then make curl allow the connection without performing the proper check, thus not noticing a possible impostor. To skip this check, the connection had to be done with QUIC with ngtcp2 built to use GnuTLS and the user had to explicitly disable the standard certificate verification.",
        "cvss": [
          {
            "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "type": "Secondary",
            "version": "3.1",
            "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "metrics": {
              "baseScore": 5.9,
              "exploitabilityScore": 2.3,
              "impactScore": 3.6
            },
            "vendorMetadata": {}
          }
        ],
        "epss": [
          {
            "cve": "CVE-2025-13034",
            "epss": 0.00011,
            "percentile": 0.01302,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2025-13034",
            "cwe": "CWE-295",
            "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "type": "Secondary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "wont-fix"
        },
        "advisories": [],
        "risk": 0.005995
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2025-13034",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2025-13034",
          "namespace": "nvd:cpe",
          "severity": "Medium",
          "urls": [
            "https://curl.se/docs/CVE-2025-13034.html",
            "https://curl.se/docs/CVE-2025-13034.json"
          ],
          "description": "When using `CURLOPT_PINNEDPUBLICKEY` option with libcurl or `--pinnedpubkey`\nwith the curl tool,curl should check the public key of the server certificate\nto verify the peer.\n\nThis check was skipped in a certain condition that would then make curl allow\nthe connection without performing the proper check, thus not noticing a\npossible impostor. To skip this check, the connection had to be done with QUIC\nwith ngtcp2 built to use GnuTLS and the user had to explicitly disable the\nstandard certificate verification.",
          "cvss": [
            {
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
              "metrics": {
                "baseScore": 5.9,
                "exploitabilityScore": 2.3,
                "impactScore": 3.6
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2025-13034",
              "epss": 0.00011,
              "percentile": 0.01302,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2025-13034",
              "cwe": "CWE-295",
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "curl",
              "version": "8.14.1-2+deb13u2"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2025-13034",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "2c9e2faa683beba2",
        "name": "libcurl4t64",
        "version": "8.14.1-2+deb13u2",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libcurl4t64",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libcurl4t64",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libcurl4t64:libcurl4t64:8.14.1-2\\+deb13u2:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libcurl4t64@8.14.1-2%2Bdeb13u2?arch=amd64&distro=debian-13&upstream=curl",
        "upstreams": [
          {
            "name": "curl"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2017-14159",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2017-14159",
        "namespace": "debian:distro:debian:13",
        "severity": "Negligible",
        "urls": [],
        "description": "slapd in OpenLDAP 2.4.45 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a \"kill `cat /pathname`\" command, as demonstrated by openldap-initscript.",
        "cvss": [],
        "epss": [
          {
            "cve": "CVE-2017-14159",
            "epss": 0.00111,
            "percentile": 0.29252,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2017-14159",
            "cwe": "CWE-665",
            "source": "nvd@nist.gov",
            "type": "Primary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.005550000000000001
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2017-14159",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2017-14159",
          "namespace": "nvd:cpe",
          "severity": "Medium",
          "urls": [
            "http://www.openldap.org/its/index.cgi?findid=8703",
            "https://www.oracle.com/security-alerts/cpuapr2022.html"
          ],
          "description": "slapd in OpenLDAP 2.4.45 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a \"kill `cat /pathname`\" command, as demonstrated by openldap-initscript.",
          "cvss": [
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
              "metrics": {
                "baseScore": 4.7,
                "exploitabilityScore": 1.1,
                "impactScore": 3.6
              },
              "vendorMetadata": {}
            },
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "2.0",
              "vector": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
              "metrics": {
                "baseScore": 1.9,
                "exploitabilityScore": 3.4,
                "impactScore": 2.9
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2017-14159",
              "epss": 0.00111,
              "percentile": 0.29252,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2017-14159",
              "cwe": "CWE-665",
              "source": "nvd@nist.gov",
              "type": "Primary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "openldap",
              "version": "2.6.10+dfsg-1"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2017-14159",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "46230cf5226e2e82",
        "name": "libldap2",
        "version": "2.6.10+dfsg-1",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libldap2",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libldap2",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libldap2:libldap2:2.6.10\\+dfsg-1:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libldap2@2.6.10%2Bdfsg-1?arch=amd64&distro=debian-13&upstream=openldap",
        "upstreams": [
          {
            "name": "openldap"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2026-40226",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2026-40226",
        "namespace": "debian:distro:debian:13",
        "severity": "Medium",
        "urls": [],
        "description": "In nspawn in systemd 233 through 259 before 260, an escape-to-host action can occur via a crafted optional config file.",
        "cvss": [
          {
            "source": "cve@mitre.org",
            "type": "Secondary",
            "version": "3.1",
            "vector": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "metrics": {
              "baseScore": 6.4,
              "exploitabilityScore": 0.5,
              "impactScore": 5.9
            },
            "vendorMetadata": {}
          }
        ],
        "epss": [
          {
            "cve": "CVE-2026-40226",
            "epss": 0.00009,
            "percentile": 0.00992,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2026-40226",
            "cwe": "CWE-348",
            "source": "cve@mitre.org",
            "type": "Primary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "wont-fix"
        },
        "advisories": [],
        "risk": 0.005130000000000001
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2026-40226",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2026-40226",
          "namespace": "nvd:cpe",
          "severity": "Medium",
          "urls": [
            "https://github.com/systemd/systemd/security/advisories/GHSA-9mj4-rrc3-gjcx"
          ],
          "description": "In nspawn in systemd 233 through 259 before 260, an escape-to-host action can occur via a crafted optional config file.",
          "cvss": [
            {
              "source": "cve@mitre.org",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "metrics": {
                "baseScore": 6.4,
                "exploitabilityScore": 0.5,
                "impactScore": 5.9
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2026-40226",
              "epss": 0.00009,
              "percentile": 0.00992,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2026-40226",
              "cwe": "CWE-348",
              "source": "cve@mitre.org",
              "type": "Primary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "systemd",
              "version": "257.9-1~deb13u1"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2026-40226",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "4f3b916d8498c51d",
        "name": "libsystemd0",
        "version": "257.9-1~deb13u1",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libsystemd0",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libsystemd0",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libsystemd0:libsystemd0:257.9-1\\~deb13u1:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64&distro=debian-13&upstream=systemd",
        "upstreams": [
          {
            "name": "systemd"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2026-40226",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2026-40226",
        "namespace": "debian:distro:debian:13",
        "severity": "Medium",
        "urls": [],
        "description": "In nspawn in systemd 233 through 259 before 260, an escape-to-host action can occur via a crafted optional config file.",
        "cvss": [
          {
            "source": "cve@mitre.org",
            "type": "Secondary",
            "version": "3.1",
            "vector": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "metrics": {
              "baseScore": 6.4,
              "exploitabilityScore": 0.5,
              "impactScore": 5.9
            },
            "vendorMetadata": {}
          }
        ],
        "epss": [
          {
            "cve": "CVE-2026-40226",
            "epss": 0.00009,
            "percentile": 0.00992,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2026-40226",
            "cwe": "CWE-348",
            "source": "cve@mitre.org",
            "type": "Primary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "wont-fix"
        },
        "advisories": [],
        "risk": 0.005130000000000001
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2026-40226",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2026-40226",
          "namespace": "nvd:cpe",
          "severity": "Medium",
          "urls": [
            "https://github.com/systemd/systemd/security/advisories/GHSA-9mj4-rrc3-gjcx"
          ],
          "description": "In nspawn in systemd 233 through 259 before 260, an escape-to-host action can occur via a crafted optional config file.",
          "cvss": [
            {
              "source": "cve@mitre.org",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "metrics": {
                "baseScore": 6.4,
                "exploitabilityScore": 0.5,
                "impactScore": 5.9
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2026-40226",
              "epss": 0.00009,
              "percentile": 0.00992,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2026-40226",
              "cwe": "CWE-348",
              "source": "cve@mitre.org",
              "type": "Primary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-direct-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "systemd",
              "version": "257.9-1~deb13u1"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2026-40226",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "49db2eae5abce987",
        "name": "systemd",
        "version": "257.9-1~deb13u1",
        "type": "deb",
        "locations": [
          {
            "path": "/usr/lib/x86_64-linux-gnu/libsystemd.so.0.40.0",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/usr/lib/x86_64-linux-gnu/libsystemd.so.0.40.0",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:systemd:systemd:257.9-1\\~deb13u1:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/Debian/systemd@257.9-1~deb13u1?distro=Debian",
        "upstreams": []
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2026-27171",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2026-27171",
        "namespace": "debian:distro:debian:13",
        "severity": "Medium",
        "urls": [],
        "description": "zlib before 1.3.2 allows CPU consumption via crc32_combine64 and crc32_combine_gen64 because x2nmodp can do right shifts within a loop that has no termination condition.",
        "cvss": [
          {
            "source": "nvd@nist.gov",
            "type": "Primary",
            "version": "3.1",
            "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "metrics": {
              "baseScore": 5.5,
              "exploitabilityScore": 1.9,
              "impactScore": 3.6
            },
            "vendorMetadata": {}
          }
        ],
        "epss": [
          {
            "cve": "CVE-2026-27171",
            "epss": 0.00009,
            "percentile": 0.00839,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2026-27171",
            "cwe": "CWE-1284",
            "source": "cve@mitre.org",
            "type": "Secondary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "wont-fix"
        },
        "advisories": [],
        "risk": 0.004725
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2026-27171",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2026-27171",
          "namespace": "nvd:cpe",
          "severity": "Medium",
          "urls": [
            "https://7asecurity.com/blog/2026/02/zlib-7asecurity-audit/",
            "https://7asecurity.com/reports/pentest-report-zlib-RC1.1.pdf",
            "https://github.com/madler/zlib/issues/904",
            "https://github.com/madler/zlib/releases/tag/v1.3.2",
            "https://ostif.org/zlib-audit-complete/"
          ],
          "description": "zlib before 1.3.2 allows CPU consumption via crc32_combine64 and crc32_combine_gen64 because x2nmodp can do right shifts within a loop that has no termination condition.",
          "cvss": [
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
              "metrics": {
                "baseScore": 5.5,
                "exploitabilityScore": 1.9,
                "impactScore": 3.6
              },
              "vendorMetadata": {}
            },
            {
              "source": "cve@mitre.org",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
              "metrics": {
                "baseScore": 2.9,
                "exploitabilityScore": 1.5,
                "impactScore": 1.5
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2026-27171",
              "epss": 0.00009,
              "percentile": 0.00839,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2026-27171",
              "cwe": "CWE-1284",
              "source": "cve@mitre.org",
              "type": "Secondary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "zlib",
              "version": "1:1.3.dfsg+really1.3.1-1"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2026-27171",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "9624b8abfaf8a472",
        "name": "zlib1g",
        "version": "1:1.3.dfsg+really1.3.1-1+b1",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/zlib1g",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/zlib1g",
            "annotations": {
              "evidence": "primary"
            }
          },
          {
            "path": "/usr/share/doc/zlib1g/copyright",
            "layerID": "sha256:e4ba966d7f0527dfe0fcb559e4e18d4da42c4e6beae924719255e0dedb554ed0",
            "accessPath": "/usr/share/doc/zlib1g/copyright",
            "annotations": {
              "evidence": "supporting"
            }
          },
          {
            "path": "/var/lib/dpkg/status.d/zlib1g.md5sums",
            "layerID": "sha256:e4ba966d7f0527dfe0fcb559e4e18d4da42c4e6beae924719255e0dedb554ed0",
            "accessPath": "/var/lib/dpkg/status.d/zlib1g.md5sums",
            "annotations": {
              "evidence": "supporting"
            }
          }
        ],
        "language": "",
        "licenses": [
          "Zlib"
        ],
        "cpes": [
          "cpe:2.3:a:zlib1g:zlib1g:1\\:1.3.dfsg\\+really1.3.1-1\\+b1:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/zlib1g@1%3A1.3.dfsg%2Breally1.3.1-1%2Bb1?arch=amd64&distro=debian-13&upstream=zlib%401%3A1.3.dfsg%2Breally1.3.1-1",
        "upstreams": [
          {
            "name": "zlib",
            "version": "1:1.3.dfsg+really1.3.1-1"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2026-40228",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2026-40228",
        "namespace": "debian:distro:debian:13",
        "severity": "Low",
        "urls": [],
        "description": "In systemd 259, systemd-journald can send ANSI escape sequences to the terminals of arbitrary users when a \"logger -p emerg\" command is executed, if ForwardToWall=yes is set.",
        "cvss": [
          {
            "source": "nvd@nist.gov",
            "type": "Primary",
            "version": "3.1",
            "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
            "metrics": {
              "baseScore": 3.3,
              "exploitabilityScore": 1.9,
              "impactScore": 1.5
            },
            "vendorMetadata": {}
          }
        ],
        "epss": [
          {
            "cve": "CVE-2026-40228",
            "epss": 0.00014,
            "percentile": 0.02545,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2026-40228",
            "cwe": "CWE-669",
            "source": "cve@mitre.org",
            "type": "Primary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "wont-fix"
        },
        "advisories": [],
        "risk": 0.004409999999999999
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2026-40228",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2026-40228",
          "namespace": "nvd:cpe",
          "severity": "Low",
          "urls": [
            "https://www.openwall.com/lists/oss-security/2026/04/08/1"
          ],
          "description": "In systemd 259, systemd-journald can send ANSI escape sequences to the terminals of arbitrary users when a \"logger -p emerg\" command is executed, if ForwardToWall=yes is set.",
          "cvss": [
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
              "metrics": {
                "baseScore": 3.3,
                "exploitabilityScore": 1.9,
                "impactScore": 1.5
              },
              "vendorMetadata": {}
            },
            {
              "source": "cve@mitre.org",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "metrics": {
                "baseScore": 2.9,
                "exploitabilityScore": 1.5,
                "impactScore": 1.5
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2026-40228",
              "epss": 0.00014,
              "percentile": 0.02545,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2026-40228",
              "cwe": "CWE-669",
              "source": "cve@mitre.org",
              "type": "Primary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "systemd",
              "version": "257.9-1~deb13u1"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2026-40228",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "4f3b916d8498c51d",
        "name": "libsystemd0",
        "version": "257.9-1~deb13u1",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libsystemd0",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libsystemd0",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libsystemd0:libsystemd0:257.9-1\\~deb13u1:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64&distro=debian-13&upstream=systemd",
        "upstreams": [
          {
            "name": "systemd"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2026-40228",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2026-40228",
        "namespace": "debian:distro:debian:13",
        "severity": "Low",
        "urls": [],
        "description": "In systemd 259, systemd-journald can send ANSI escape sequences to the terminals of arbitrary users when a \"logger -p emerg\" command is executed, if ForwardToWall=yes is set.",
        "cvss": [
          {
            "source": "nvd@nist.gov",
            "type": "Primary",
            "version": "3.1",
            "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
            "metrics": {
              "baseScore": 3.3,
              "exploitabilityScore": 1.9,
              "impactScore": 1.5
            },
            "vendorMetadata": {}
          }
        ],
        "epss": [
          {
            "cve": "CVE-2026-40228",
            "epss": 0.00014,
            "percentile": 0.02545,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2026-40228",
            "cwe": "CWE-669",
            "source": "cve@mitre.org",
            "type": "Primary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "wont-fix"
        },
        "advisories": [],
        "risk": 0.004409999999999999
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2026-40228",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2026-40228",
          "namespace": "nvd:cpe",
          "severity": "Low",
          "urls": [
            "https://www.openwall.com/lists/oss-security/2026/04/08/1"
          ],
          "description": "In systemd 259, systemd-journald can send ANSI escape sequences to the terminals of arbitrary users when a \"logger -p emerg\" command is executed, if ForwardToWall=yes is set.",
          "cvss": [
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
              "metrics": {
                "baseScore": 3.3,
                "exploitabilityScore": 1.9,
                "impactScore": 1.5
              },
              "vendorMetadata": {}
            },
            {
              "source": "cve@mitre.org",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "metrics": {
                "baseScore": 2.9,
                "exploitabilityScore": 1.5,
                "impactScore": 1.5
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2026-40228",
              "epss": 0.00014,
              "percentile": 0.02545,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2026-40228",
              "cwe": "CWE-669",
              "source": "cve@mitre.org",
              "type": "Primary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-direct-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "systemd",
              "version": "257.9-1~deb13u1"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2026-40228",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "49db2eae5abce987",
        "name": "systemd",
        "version": "257.9-1~deb13u1",
        "type": "deb",
        "locations": [
          {
            "path": "/usr/lib/x86_64-linux-gnu/libsystemd.so.0.40.0",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/usr/lib/x86_64-linux-gnu/libsystemd.so.0.40.0",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:systemd:systemd:257.9-1\\~deb13u1:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/Debian/systemd@257.9-1~deb13u1?distro=Debian",
        "upstreams": []
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2025-15224",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2025-15224",
        "namespace": "debian:distro:debian:13",
        "severity": "Negligible",
        "urls": [],
        "description": "When doing SSH-based transfers using either SCP or SFTP, and asked to do public key authentication, curl would wrongly still ask and authenticate using a locally running SSH agent.",
        "cvss": [],
        "epss": [
          {
            "cve": "CVE-2025-15224",
            "epss": 0.00084,
            "percentile": 0.24368,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2025-15224",
            "cwe": "CWE-287",
            "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "type": "Secondary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.004200000000000001
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2025-15224",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2025-15224",
          "namespace": "nvd:cpe",
          "severity": "Low",
          "urls": [
            "https://curl.se/docs/CVE-2025-15224.html",
            "https://curl.se/docs/CVE-2025-15224.json",
            "https://hackerone.com/reports/3480925",
            "http://www.openwall.com/lists/oss-security/2026/01/07/7"
          ],
          "description": "When doing SSH-based transfers using either SCP or SFTP, and asked to do\npublic key authentication, curl would wrongly still ask and authenticate using\na locally running SSH agent.",
          "cvss": [
            {
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
              "metrics": {
                "baseScore": 3.1,
                "exploitabilityScore": 1.7,
                "impactScore": 1.5
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2025-15224",
              "epss": 0.00084,
              "percentile": 0.24368,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2025-15224",
              "cwe": "CWE-287",
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "curl",
              "version": "8.14.1-2+deb13u2"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2025-15224",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "2c9e2faa683beba2",
        "name": "libcurl4t64",
        "version": "8.14.1-2+deb13u2",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libcurl4t64",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libcurl4t64",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libcurl4t64:libcurl4t64:8.14.1-2\\+deb13u2:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libcurl4t64@8.14.1-2%2Bdeb13u2?arch=amd64&distro=debian-13&upstream=curl",
        "upstreams": [
          {
            "name": "curl"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2024-26461",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2024-26461",
        "namespace": "debian:distro:debian:13",
        "severity": "Negligible",
        "urls": [],
        "description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.",
        "cvss": [],
        "epss": [
          {
            "cve": "CVE-2024-26461",
            "epss": 0.00081,
            "percentile": 0.23771,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2024-26461",
            "cwe": "CWE-770",
            "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "type": "Secondary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.00405
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2024-26461",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2024-26461",
          "namespace": "nvd:cpe",
          "severity": "High",
          "urls": [
            "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md",
            "https://security.netapp.com/advisory/ntap-20240415-0011/"
          ],
          "description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.",
          "cvss": [
            {
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "metrics": {
                "baseScore": 7.5,
                "exploitabilityScore": 3.9,
                "impactScore": 3.6
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2024-26461",
              "epss": 0.00081,
              "percentile": 0.23771,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2024-26461",
              "cwe": "CWE-770",
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "krb5",
              "version": "1.21.3-5"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2024-26461",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "b6ee860d702b8084",
        "name": "libgssapi-krb5-2",
        "version": "1.21.3-5",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libgssapi-krb5-2",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libgssapi-krb5-2",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libgssapi-krb5-2:libgssapi-krb5-2:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libgssapi-krb5-2:libgssapi_krb5_2:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libgssapi_krb5_2:libgssapi-krb5-2:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libgssapi_krb5_2:libgssapi_krb5_2:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libgssapi-krb5:libgssapi-krb5-2:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libgssapi-krb5:libgssapi_krb5_2:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libgssapi_krb5:libgssapi-krb5-2:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libgssapi_krb5:libgssapi_krb5_2:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libgssapi:libgssapi-krb5-2:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libgssapi:libgssapi_krb5_2:1.21.3-5:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libgssapi-krb5-2@1.21.3-5?arch=amd64&distro=debian-13&upstream=krb5",
        "upstreams": [
          {
            "name": "krb5"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2024-26461",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2024-26461",
        "namespace": "debian:distro:debian:13",
        "severity": "Negligible",
        "urls": [],
        "description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.",
        "cvss": [],
        "epss": [
          {
            "cve": "CVE-2024-26461",
            "epss": 0.00081,
            "percentile": 0.23771,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2024-26461",
            "cwe": "CWE-770",
            "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "type": "Secondary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.00405
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2024-26461",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2024-26461",
          "namespace": "nvd:cpe",
          "severity": "High",
          "urls": [
            "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md",
            "https://security.netapp.com/advisory/ntap-20240415-0011/"
          ],
          "description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.",
          "cvss": [
            {
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "metrics": {
                "baseScore": 7.5,
                "exploitabilityScore": 3.9,
                "impactScore": 3.6
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2024-26461",
              "epss": 0.00081,
              "percentile": 0.23771,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2024-26461",
              "cwe": "CWE-770",
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "krb5",
              "version": "1.21.3-5"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2024-26461",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "52ef833c1503e21a",
        "name": "libk5crypto3",
        "version": "1.21.3-5",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libk5crypto3",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libk5crypto3",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libk5crypto3:libk5crypto3:1.21.3-5:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libk5crypto3@1.21.3-5?arch=amd64&distro=debian-13&upstream=krb5",
        "upstreams": [
          {
            "name": "krb5"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2024-26461",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2024-26461",
        "namespace": "debian:distro:debian:13",
        "severity": "Negligible",
        "urls": [],
        "description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.",
        "cvss": [],
        "epss": [
          {
            "cve": "CVE-2024-26461",
            "epss": 0.00081,
            "percentile": 0.23771,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2024-26461",
            "cwe": "CWE-770",
            "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "type": "Secondary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.00405
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2024-26461",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2024-26461",
          "namespace": "nvd:cpe",
          "severity": "High",
          "urls": [
            "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md",
            "https://security.netapp.com/advisory/ntap-20240415-0011/"
          ],
          "description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.",
          "cvss": [
            {
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "metrics": {
                "baseScore": 7.5,
                "exploitabilityScore": 3.9,
                "impactScore": 3.6
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2024-26461",
              "epss": 0.00081,
              "percentile": 0.23771,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2024-26461",
              "cwe": "CWE-770",
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "krb5",
              "version": "1.21.3-5"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2024-26461",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "d4c94f2fc66f3184",
        "name": "libkrb5-3",
        "version": "1.21.3-5",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libkrb5-3",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libkrb5-3",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libkrb5-3:libkrb5-3:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libkrb5-3:libkrb5_3:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libkrb5_3:libkrb5-3:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libkrb5_3:libkrb5_3:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libkrb5:libkrb5-3:1.21.3-5:*:*:*:*:*:*:*",
          "cpe:2.3:a:libkrb5:libkrb5_3:1.21.3-5:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libkrb5-3@1.21.3-5?arch=amd64&distro=debian-13&upstream=krb5",
        "upstreams": [
          {
            "name": "krb5"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2024-26461",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2024-26461",
        "namespace": "debian:distro:debian:13",
        "severity": "Negligible",
        "urls": [],
        "description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.",
        "cvss": [],
        "epss": [
          {
            "cve": "CVE-2024-26461",
            "epss": 0.00081,
            "percentile": 0.23771,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2024-26461",
            "cwe": "CWE-770",
            "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "type": "Secondary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.00405
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2024-26461",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2024-26461",
          "namespace": "nvd:cpe",
          "severity": "High",
          "urls": [
            "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md",
            "https://security.netapp.com/advisory/ntap-20240415-0011/"
          ],
          "description": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.",
          "cvss": [
            {
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "metrics": {
                "baseScore": 7.5,
                "exploitabilityScore": 3.9,
                "impactScore": 3.6
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2024-26461",
              "epss": 0.00081,
              "percentile": 0.23771,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2024-26461",
              "cwe": "CWE-770",
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "krb5",
              "version": "1.21.3-5"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2024-26461",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "56fc39be304d53f0",
        "name": "libkrb5support0",
        "version": "1.21.3-5",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libkrb5support0",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libkrb5support0",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libkrb5support0:libkrb5support0:1.21.3-5:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libkrb5support0@1.21.3-5?arch=amd64&distro=debian-13&upstream=krb5",
        "upstreams": [
          {
            "name": "krb5"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2026-4878",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2026-4878",
        "namespace": "debian:distro:debian:13",
        "severity": "High",
        "urls": [],
        "description": "A flaw was found in libcap. A local unprivileged user can exploit a Time-of-check-to-time-of-use (TOCTOU) race condition in the `cap_set_file()` function. This allows an attacker with write access to a parent directory to redirect file capability updates to an attacker-controlled file. By doing so, capabilities can be injected into or stripped from unintended executables, leading to privilege escalation.",
        "cvss": [
          {
            "source": "nvd@nist.gov",
            "type": "Primary",
            "version": "3.1",
            "vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "metrics": {
              "baseScore": 7,
              "exploitabilityScore": 1.1,
              "impactScore": 5.9
            },
            "vendorMetadata": {}
          }
        ],
        "epss": [
          {
            "cve": "CVE-2026-4878",
            "epss": 0.00004,
            "percentile": 0.0017,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2026-4878",
            "cwe": "CWE-367",
            "source": "secalert@redhat.com",
            "type": "Secondary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "wont-fix"
        },
        "advisories": [],
        "risk": 0.0029
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2026-4878",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2026-4878",
          "namespace": "nvd:cpe",
          "severity": "High",
          "urls": [
            "https://access.redhat.com/errata/RHSA-2026:7473",
            "https://access.redhat.com/security/cve/CVE-2026-4878",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2447554",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2451615",
            "http://www.openwall.com/lists/oss-security/2026/04/07/14",
            "http://www.openwall.com/lists/oss-security/2026/04/07/4",
            "http://www.openwall.com/lists/oss-security/2026/04/08/9",
            "http://www.openwall.com/lists/oss-security/2026/04/09/5",
            "http://www.openwall.com/lists/oss-security/2026/04/09/6"
          ],
          "description": "A flaw was found in libcap. A local unprivileged user can exploit a Time-of-check-to-time-of-use (TOCTOU) race condition in the `cap_set_file()` function. This allows an attacker with write access to a parent directory to redirect file capability updates to an attacker-controlled file. By doing so, capabilities can be injected into or stripped from unintended executables, leading to privilege escalation.",
          "cvss": [
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "metrics": {
                "baseScore": 7,
                "exploitabilityScore": 1.1,
                "impactScore": 5.9
              },
              "vendorMetadata": {}
            },
            {
              "source": "secalert@redhat.com",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
              "metrics": {
                "baseScore": 6.7,
                "exploitabilityScore": 0.8,
                "impactScore": 5.9
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2026-4878",
              "epss": 0.00004,
              "percentile": 0.0017,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2026-4878",
              "cwe": "CWE-367",
              "source": "secalert@redhat.com",
              "type": "Secondary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-direct-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "libcap2",
              "version": "1:2.75-10+b8"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2026-4878",
            "versionConstraint": "none (unknown)"
          }
        },
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "libcap2",
              "version": "1:2.75-10"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2026-4878",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "db4fc91f0556f532",
        "name": "libcap2",
        "version": "1:2.75-10+b8",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libcap2",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libcap2",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libcap2:libcap2:1\\:2.75-10\\+b8:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libcap2@1%3A2.75-10%2Bb8?arch=amd64&distro=debian-13&upstream=libcap2%401%3A2.75-10",
        "upstreams": [
          {
            "name": "libcap2",
            "version": "1:2.75-10"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2013-4392",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2013-4392",
        "namespace": "debian:distro:debian:13",
        "severity": "Negligible",
        "urls": [],
        "description": "systemd, when updating file permissions, allows local users to change the permissions and SELinux security contexts for arbitrary files via a symlink attack on unspecified files.",
        "cvss": [],
        "epss": [
          {
            "cve": "CVE-2013-4392",
            "epss": 0.00042,
            "percentile": 0.12677,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2013-4392",
            "cwe": "CWE-59",
            "source": "nvd@nist.gov",
            "type": "Primary"
          },
          {
            "cve": "CVE-2013-4392",
            "cwe": "CWE-59",
            "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "type": "Secondary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.0021000000000000003
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2013-4392",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2013-4392",
          "namespace": "nvd:cpe",
          "severity": "Low",
          "urls": [
            "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357",
            "http://www.openwall.com/lists/oss-security/2013/10/01/9",
            "https://bugzilla.redhat.com/show_bug.cgi?id=859060"
          ],
          "description": "systemd, when updating file permissions, allows local users to change the permissions and SELinux security contexts for arbitrary files via a symlink attack on unspecified files.",
          "cvss": [
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "2.0",
              "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
              "metrics": {
                "baseScore": 3.3,
                "exploitabilityScore": 3.4,
                "impactScore": 5
              },
              "vendorMetadata": {}
            },
            {
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
              "metrics": {
                "baseScore": 5,
                "exploitabilityScore": 1.4,
                "impactScore": 3.6
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2013-4392",
              "epss": 0.00042,
              "percentile": 0.12677,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2013-4392",
              "cwe": "CWE-59",
              "source": "nvd@nist.gov",
              "type": "Primary"
            },
            {
              "cve": "CVE-2013-4392",
              "cwe": "CWE-59",
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "systemd",
              "version": "257.9-1~deb13u1"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2013-4392",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "4f3b916d8498c51d",
        "name": "libsystemd0",
        "version": "257.9-1~deb13u1",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libsystemd0",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libsystemd0",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libsystemd0:libsystemd0:257.9-1\\~deb13u1:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64&distro=debian-13&upstream=systemd",
        "upstreams": [
          {
            "name": "systemd"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2013-4392",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2013-4392",
        "namespace": "debian:distro:debian:13",
        "severity": "Negligible",
        "urls": [],
        "description": "systemd, when updating file permissions, allows local users to change the permissions and SELinux security contexts for arbitrary files via a symlink attack on unspecified files.",
        "cvss": [],
        "epss": [
          {
            "cve": "CVE-2013-4392",
            "epss": 0.00042,
            "percentile": 0.12677,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2013-4392",
            "cwe": "CWE-59",
            "source": "nvd@nist.gov",
            "type": "Primary"
          },
          {
            "cve": "CVE-2013-4392",
            "cwe": "CWE-59",
            "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "type": "Secondary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.0021000000000000003
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2013-4392",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2013-4392",
          "namespace": "nvd:cpe",
          "severity": "Low",
          "urls": [
            "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357",
            "http://www.openwall.com/lists/oss-security/2013/10/01/9",
            "https://bugzilla.redhat.com/show_bug.cgi?id=859060"
          ],
          "description": "systemd, when updating file permissions, allows local users to change the permissions and SELinux security contexts for arbitrary files via a symlink attack on unspecified files.",
          "cvss": [
            {
              "source": "nvd@nist.gov",
              "type": "Primary",
              "version": "2.0",
              "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
              "metrics": {
                "baseScore": 3.3,
                "exploitabilityScore": 3.4,
                "impactScore": 5
              },
              "vendorMetadata": {}
            },
            {
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
              "metrics": {
                "baseScore": 5,
                "exploitabilityScore": 1.4,
                "impactScore": 3.6
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2013-4392",
              "epss": 0.00042,
              "percentile": 0.12677,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2013-4392",
              "cwe": "CWE-59",
              "source": "nvd@nist.gov",
              "type": "Primary"
            },
            {
              "cve": "CVE-2013-4392",
              "cwe": "CWE-59",
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-direct-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "systemd",
              "version": "257.9-1~deb13u1"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2013-4392",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "49db2eae5abce987",
        "name": "systemd",
        "version": "257.9-1~deb13u1",
        "type": "deb",
        "locations": [
          {
            "path": "/usr/lib/x86_64-linux-gnu/libsystemd.so.0.40.0",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/usr/lib/x86_64-linux-gnu/libsystemd.so.0.40.0",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:systemd:systemd:257.9-1\\~deb13u1:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/Debian/systemd@257.9-1~deb13u1?distro=Debian",
        "upstreams": []
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2025-15079",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2025-15079",
        "namespace": "debian:distro:debian:13",
        "severity": "Negligible",
        "urls": [],
        "description": "When doing SSH-based transfers using either SCP or SFTP, and setting the known_hosts file, libcurl could still mistakenly accept connecting to hosts *not present* in the specified file if they were added as recognized in the libssh *global* known_hosts file.",
        "cvss": [],
        "epss": [
          {
            "cve": "CVE-2025-15079",
            "epss": 0.00035,
            "percentile": 0.10291,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2025-15079",
            "cwe": "CWE-297",
            "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "type": "Secondary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.0017500000000000003
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2025-15079",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2025-15079",
          "namespace": "nvd:cpe",
          "severity": "Medium",
          "urls": [
            "https://curl.se/docs/CVE-2025-15079.html",
            "https://curl.se/docs/CVE-2025-15079.json",
            "https://hackerone.com/reports/3477116",
            "http://www.openwall.com/lists/oss-security/2026/01/07/6"
          ],
          "description": "When doing SSH-based transfers using either SCP or SFTP, and setting the\nknown_hosts file, libcurl could still mistakenly accept connecting to hosts\n*not present* in the specified file if they were added as recognized in the\nlibssh *global* known_hosts file.",
          "cvss": [
            {
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
              "metrics": {
                "baseScore": 5.3,
                "exploitabilityScore": 1.7,
                "impactScore": 3.6
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2025-15079",
              "epss": 0.00035,
              "percentile": 0.10291,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2025-15079",
              "cwe": "CWE-297",
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "curl",
              "version": "8.14.1-2+deb13u2"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2025-15079",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "2c9e2faa683beba2",
        "name": "libcurl4t64",
        "version": "8.14.1-2+deb13u2",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libcurl4t64",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libcurl4t64",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libcurl4t64:libcurl4t64:8.14.1-2\\+deb13u2:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libcurl4t64@8.14.1-2%2Bdeb13u2?arch=amd64&distro=debian-13&upstream=curl",
        "upstreams": [
          {
            "name": "curl"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2025-10966",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2025-10966",
        "namespace": "debian:distro:debian:13",
        "severity": "Negligible",
        "urls": [],
        "description": "curl's code for managing SSH connections when SFTP was done using the wolfSSH powered backend was flawed and missed host verification mechanisms.  This prevents curl from detecting MITM attackers and more.",
        "cvss": [],
        "epss": [
          {
            "cve": "CVE-2025-10966",
            "epss": 0.00026,
            "percentile": 0.07109,
            "date": "2026-04-27"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.0013
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2025-10966",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2025-10966",
          "namespace": "nvd:cpe",
          "severity": "Medium",
          "urls": [
            "https://curl.se/docs/CVE-2025-10966.html",
            "https://curl.se/docs/CVE-2025-10966.json",
            "https://hackerone.com/reports/3355218",
            "http://www.openwall.com/lists/oss-security/2025/11/05/2",
            "https://github.com/curl/curl/commit/b011e3fcfb06d6c0278595ee2ee297036fbe9793"
          ],
          "description": "curl's code for managing SSH connections when SFTP was done using the wolfSSH\npowered backend was flawed and missed host verification mechanisms.\n\nThis prevents curl from detecting MITM attackers and more.",
          "cvss": [
            {
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
              "metrics": {
                "baseScore": 4.3,
                "exploitabilityScore": 2.9,
                "impactScore": 1.5
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2025-10966",
              "epss": 0.00026,
              "percentile": 0.07109,
              "date": "2026-04-27"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "curl",
              "version": "8.14.1-2+deb13u2"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2025-10966",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "2c9e2faa683beba2",
        "name": "libcurl4t64",
        "version": "8.14.1-2+deb13u2",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libcurl4t64",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libcurl4t64",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libcurl4t64:libcurl4t64:8.14.1-2\\+deb13u2:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libcurl4t64@8.14.1-2%2Bdeb13u2?arch=amd64&distro=debian-13&upstream=curl",
        "upstreams": [
          {
            "name": "curl"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2026-22185",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2026-22185",
        "namespace": "debian:distro:debian:13",
        "severity": "Negligible",
        "urls": [],
        "description": "OpenLDAP Lightning Memory-Mapped Database (LMDB) versions up to and including 0.9.14, prior to commit 8e1fda8, contain a heap buffer underflow in the readline() function of mdb_load. When processing malformed input containing an embedded NUL byte, an unsigned offset calculation can underflow and cause an out-of-bounds read of one byte before the allocated heap buffer. This can cause mdb_load to crash, leading to a limited denial-of-service condition.",
        "cvss": [],
        "epss": [
          {
            "cve": "CVE-2026-22185",
            "epss": 0.00021,
            "percentile": 0.05794,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2026-22185",
            "cwe": "CWE-125",
            "source": "disclosure@vulncheck.com",
            "type": "Secondary"
          },
          {
            "cve": "CVE-2026-22185",
            "cwe": "CWE-191",
            "source": "disclosure@vulncheck.com",
            "type": "Secondary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.0010500000000000002
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2026-22185",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2026-22185",
          "namespace": "nvd:cpe",
          "severity": "Medium",
          "urls": [
            "https://bugs.openldap.org/show_bug.cgi?id=10421",
            "https://seclists.org/fulldisclosure/2026/Jan/5",
            "https://seclists.org/fulldisclosure/2026/Jan/8",
            "https://www.openldap.org/",
            "https://www.vulncheck.com/advisories/openldap-lmdb-mdb-load-heap-buffer-underflow-in-readline"
          ],
          "description": "OpenLDAP Lightning Memory-Mapped Database (LMDB) versions up to and including 0.9.14, prior to commit 8e1fda8, contain a heap buffer underflow in the readline() function of mdb_load. When processing malformed input containing an embedded NUL byte, an unsigned offset calculation can underflow and cause an out-of-bounds read of one byte before the allocated heap buffer. This can cause mdb_load to crash, leading to a limited denial-of-service condition.",
          "cvss": [
            {
              "source": "disclosure@vulncheck.com",
              "type": "Secondary",
              "version": "4.0",
              "vector": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
              "metrics": {
                "baseScore": 4.6
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2026-22185",
              "epss": 0.00021,
              "percentile": 0.05794,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2026-22185",
              "cwe": "CWE-125",
              "source": "disclosure@vulncheck.com",
              "type": "Secondary"
            },
            {
              "cve": "CVE-2026-22185",
              "cwe": "CWE-191",
              "source": "disclosure@vulncheck.com",
              "type": "Secondary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "openldap",
              "version": "2.6.10+dfsg-1"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2026-22185",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "46230cf5226e2e82",
        "name": "libldap2",
        "version": "2.6.10+dfsg-1",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libldap2",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libldap2",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libldap2:libldap2:2.6.10\\+dfsg-1:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libldap2@2.6.10%2Bdfsg-1?arch=amd64&distro=debian-13&upstream=openldap",
        "upstreams": [
          {
            "name": "openldap"
          }
        ]
      }
    },
    {
      "vulnerability": {
        "id": "CVE-2025-14017",
        "dataSource": "https://security-tracker.debian.org/tracker/CVE-2025-14017",
        "namespace": "debian:distro:debian:13",
        "severity": "Negligible",
        "urls": [],
        "description": "When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl, changing TLS options in one thread would inadvertently change them globally and therefore possibly also affect other concurrently setup transfers.  Disabling certificate verification for a specific transfer could unintentionally disable the feature for other threads as well.",
        "cvss": [],
        "epss": [
          {
            "cve": "CVE-2025-14017",
            "epss": 0.00007,
            "percentile": 0.0062,
            "date": "2026-04-27"
          }
        ],
        "cwes": [
          {
            "cve": "CVE-2025-14017",
            "cwe": "NVD-CWE-Other",
            "source": "nvd@nist.gov",
            "type": "Primary"
          }
        ],
        "fix": {
          "versions": [],
          "state": "not-fixed"
        },
        "advisories": [],
        "risk": 0.00035
      },
      "relatedVulnerabilities": [
        {
          "id": "CVE-2025-14017",
          "dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2025-14017",
          "namespace": "nvd:cpe",
          "severity": "Medium",
          "urls": [
            "https://curl.se/docs/CVE-2025-14017.html",
            "https://curl.se/docs/CVE-2025-14017.json",
            "http://www.openwall.com/lists/oss-security/2026/01/07/3"
          ],
          "description": "When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl,\nchanging TLS options in one thread would inadvertently change them globally\nand therefore possibly also affect other concurrently setup transfers.\n\nDisabling certificate verification for a specific transfer could\nunintentionally disable the feature for other threads as well.",
          "cvss": [
            {
              "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
              "type": "Secondary",
              "version": "3.1",
              "vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
              "metrics": {
                "baseScore": 6.3,
                "exploitabilityScore": 1.1,
                "impactScore": 5.2
              },
              "vendorMetadata": {}
            }
          ],
          "epss": [
            {
              "cve": "CVE-2025-14017",
              "epss": 0.00007,
              "percentile": 0.0062,
              "date": "2026-04-27"
            }
          ],
          "cwes": [
            {
              "cve": "CVE-2025-14017",
              "cwe": "NVD-CWE-Other",
              "source": "nvd@nist.gov",
              "type": "Primary"
            }
          ]
        }
      ],
      "matchDetails": [
        {
          "type": "exact-indirect-match",
          "matcher": "dpkg-matcher",
          "searchedBy": {
            "distro": {
              "type": "debian",
              "version": "13"
            },
            "package": {
              "name": "curl",
              "version": "8.14.1-2+deb13u2"
            },
            "namespace": "debian:distro:debian:13"
          },
          "found": {
            "vulnerabilityID": "CVE-2025-14017",
            "versionConstraint": "none (unknown)"
          }
        }
      ],
      "artifact": {
        "id": "2c9e2faa683beba2",
        "name": "libcurl4t64",
        "version": "8.14.1-2+deb13u2",
        "type": "deb",
        "locations": [
          {
            "path": "/var/lib/dpkg/status.d/libcurl4t64",
            "layerID": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
            "accessPath": "/var/lib/dpkg/status.d/libcurl4t64",
            "annotations": {
              "evidence": "primary"
            }
          }
        ],
        "language": "",
        "licenses": [],
        "cpes": [
          "cpe:2.3:a:libcurl4t64:libcurl4t64:8.14.1-2\\+deb13u2:*:*:*:*:*:*:*"
        ],
        "purl": "pkg:deb/debian/libcurl4t64@8.14.1-2%2Bdeb13u2?arch=amd64&distro=debian-13&upstream=curl",
        "upstreams": [
          {
            "name": "curl"
          }
        ]
      }
    }
  ],
  "source": {
    "type": "image",
    "target": {
      "userInput": "ghcr.io/fluent/fluent-bit:4.2.4",
      "imageID": "sha256:5315323714cfe363f81fa6f6388437c5e9a928efe77091ef8914a223026b6a40",
      "manifestDigest": "sha256:c848b2d60b11d0edc6d01d393098fd58d0c26b41c422a9ca13652266ca7eefb9",
      "mediaType": "application/vnd.docker.distribution.manifest.v2+json",
      "tags": [
        "ghcr.io/fluent/fluent-bit:4.2.4"
      ],
      "imageSize": 115018644,
      "layers": [
        {
          "mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
          "digest": "sha256:82c60ccaf916322916d16bcdb4223f93acc1f68e2087dba4ddf64990b1dc27fb",
          "size": 273007
        },
        {
          "mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
          "digest": "sha256:621c35e751a51a9a9dc3e80aa0b7fe8be2a93402ea6ccd307d30852cd7776cda",
          "size": 23235
        },
        {
          "mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
          "digest": "sha256:ac2a91ec876dfaf2145e14b0b43ce6b3ea3d4edb28a0df9d91c52f2efbb8e1a7",
          "size": 758021
        },
        {
          "mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
          "digest": "sha256:f15316efa9979a44eee43172e640630f60407180eff3d985274befd600bb227d",
          "size": 820241
        },
        {
          "mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
          "digest": "sha256:275a30dd8ce958b21daa9ad962c6fbc09f98306ee2f486b65c9075dc257b1412",
          "size": 88832
        },
        {
          "mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
          "digest": "sha256:4d049f83d9cf21d1f5cc0e11deaf36df02790d0e60c1a3829538fb4b61685368",
          "size": 0
        },
        {
          "mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
          "digest": "sha256:af5aa97ebe6ce1604747ec1e21af7136ded391bcabe4acef882e718a87c86bcc",
          "size": 149
        },
        {
          "mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
          "digest": "sha256:6f1cdceb6a3146f0ccb986521156bef8a422cdbb0863396f7f751f575ba308f4",
          "size": 0
        },
        {
          "mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
          "digest": "sha256:bd3cdfae1d3fdd83a2231d608969b38b82349777c2fff9a7c12d54f8ac5c9b38",
          "size": 64
        },
        {
          "mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
          "digest": "sha256:4cde6b0bb6f50a5f255eef7b2a42162c661cf776b803225dcac9a659e396bb6b",
          "size": 0
        },
        {
          "mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
          "digest": "sha256:ad51d0769d16ba578106a177987dfe3d2e02c1668c852b795b2f6b024068242a",
          "size": 497
        },
        {
          "mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
          "digest": "sha256:187cfc6d1e3e8a40a5e64653bcd3239c140807dcf1c09e48021178705a5a6139",
          "size": 344
        },
        {
          "mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
          "digest": "sha256:5fd2536c39c0700be8b7b4344e375196da2f126842fd8ede66996a18860a3890",
          "size": 243389
        },
        {
          "mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
          "digest": "sha256:318bc252656ce5b3c77fc9a13e302bba683f813d4b19c21be6e0ad3acc7adaf1",
          "size": 13027108
        },
        {
          "mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
          "digest": "sha256:1a6e423bca2d12ae8428c7b3a06be964f6166ecd4d90d8d30bfcc99c40740dc7",
          "size": 7995268
        },
        {
          "mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
          "digest": "sha256:c0e409312adc366898967307565f692bb33d43a439d3de48e27d14b742389725",
          "size": 855198
        },
        {
          "mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
          "digest": "sha256:e4ba966d7f0527dfe0fcb559e4e18d4da42c4e6beae924719255e0dedb554ed0",
          "size": 160500
        },
        {
          "mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
          "digest": "sha256:1f5d28bd51650f429293f7730ede274b81dc0744aa918bc887133c4ad610258c",
          "size": 348649
        },
        {
          "mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
          "digest": "sha256:6e18ad80f3d64a8cbbcd1ff2e8a0d5ce7282cf664e816b86183a59d30a618e8a",
          "size": 2643383
        },
        {
          "mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
          "digest": "sha256:c16b2ec4b1493bad1b1de23d659c899e60abb166bda756d02792f0a03ba54a43",
          "size": 183637
        },
        {
          "mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
          "digest": "sha256:7db505d90756626f425c6c5468eca565c82f589b144ecaa4f411ad9bbf79e614",
          "size": 106287
        },
        {
          "mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
          "digest": "sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3",
          "size": 18011939
        },
        {
          "mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
          "digest": "sha256:6e44283802933cda950b734ee01ba8ec30be4494cba25e078f38d3afb7f310d6",
          "size": 225539
        },
        {
          "mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
          "digest": "sha256:afc0456e6dd5330673122a54ed845c114384e23d647d21d04649934a4d4d15bc",
          "size": 69253357
        }
      ],
      "manifest": "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",
      "config": "{"architecture":"amd64","config":{"User":"0","ExposedPorts":{"2020/tcp":{}},"Env":["PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin","SSL_CERT_FILE=/etc/ssl/certs/ca-certificates.crt","FLUENT_BIT_VERSION=4.2.4"],"Entrypoint":["/fluent-bit/bin/fluent-bit"],"Cmd":["/fluent-bit/bin/fluent-bit","-c","/fluent-bit/etc/fluent-bit.conf"],"WorkingDir":"/","Labels":{"author":"Eduardo Silva \u003ceduardo.silva@chronosphere.io\u003e","description":"Fluent Bit multi-architecture container image","org.opencontainers.image.authors":"Eduardo Silva \u003ceduardo.silva@chronosphere.io\u003e","org.opencontainers.image.description":"Fluent Bit container image","org.opencontainers.image.documentation":"https://docs.fluentbit.io/","org.opencontainers.image.licenses":"Apache-2.0","org.opencontainers.image.source":"https://github.com/fluent/fluent-bit","org.opencontainers.image.title":"Fluent Bit","org.opencontainers.image.vendor":"Fluent Organization","org.opencontainers.image.version":"4.2.4","vendor":"Fluent Organization","version":"4.2.4"},"ArgsEscaped":true},"created":"2026-04-10T07:08:01.733750195Z","history":[{"created":"1970-01-01T00:00:00Z","created_by":"bazel build @trixie//base-files/amd64:data_statusd"},{"created":"1970-01-01T00:00:00Z","created_by":"bazel build @trixie//netbase/amd64:data_statusd"},{"created":"1970-01-01T00:00:00Z","created_by":"bazel build @trixie//tzdata/amd64:data_statusd"},{"created":"1970-01-01T00:00:00Z","created_by":"bazel build @trixie//tzdata-legacy/amd64:data_statusd"},{"created":"1970-01-01T00:00:00Z","created_by":"bazel build @trixie//media-types/amd64:data_statusd"},{"created":"1970-01-01T00:00:00Z","created_by":"bazel build //common:rootfs"},{"created":"1970-01-01T00:00:00Z","created_by":"bazel build //common:passwd"},{"created":"1970-01-01T00:00:00Z","created_by":"bazel build //common:home"},{"created":"1970-01-01T00:00:00Z","created_by":"bazel build //common:group"},{"created":"1970-01-01T00:00:00Z","created_by":"bazel build //common:tmp"},{"created":"1970-01-01T00:00:00Z","created_by":"bazel build //static:nsswitch"},{"created":"1970-01-01T00:00:00Z","created_by":"bazel build //common:os_release_debian13"},{"created":"1970-01-01T00:00:00Z","created_by":"bazel build //common:cacerts_debian13_amd64"},{"created":"1970-01-01T00:00:00Z","created_by":"bazel build @trixie//libc6/amd64:data_statusd"},{"created":"1970-01-01T00:00:00Z","created_by":"bazel build @trixie//libssl3t64/amd64:data_statusd"},{"created":"1970-01-01T00:00:00Z","created_by":"bazel build @trixie//libzstd1/amd64:data_statusd"},{"created":"1970-01-01T00:00:00Z","created_by":"bazel build @trixie//zlib1g/amd64:data_statusd"},{"created":"1970-01-01T00:00:00Z","created_by":"bazel build @trixie//libgomp1/amd64:data_statusd"},{"created":"1970-01-01T00:00:00Z","created_by":"bazel build @trixie//libstdc++6/amd64:data_statusd"},{"created":"1970-01-01T00:00:00Z","created_by":"bazel build @trixie//libgcc-s1/amd64:data_statusd"},{"created":"1970-01-01T00:00:00Z","created_by":"bazel build @trixie//gcc-14-base/amd64:data_statusd"},{"created":"2026-04-10T07:03:36.985702919Z","created_by":"ARG RELEASE_VERSION=4.2.4","comment":"buildkit.dockerfile.v0","empty_layer":true},{"created":"2026-04-10T07:03:36.985702919Z","created_by":"ENV FLUENT_BIT_VERSION=4.2.4","comment":"buildkit.dockerfile.v0","empty_layer":true},{"created":"2026-04-10T07:03:36.985702919Z","created_by":"LABEL description=Fluent Bit multi-architecture container image vendor=Fluent Organization version=4.2.4 author=Eduardo Silva \u003ceduardo.silva@chronosphere.io\u003e org.opencontainers.image.description=Fluent Bit container image org.opencontainers.image.title=Fluent Bit org.opencontainers.image.licenses=Apache-2.0 org.opencontainers.image.vendor=Fluent Organization org.opencontainers.image.version=4.2.4 org.opencontainers.image.source=https://github.com/fluent/fluent-bit org.opencontainers.image.documentation=https://docs.fluentbit.io/ org.opencontainers.image.authors=Eduardo Silva \u003ceduardo.silva@chronosphere.io\u003e","comment":"buildkit.dockerfile.v0","empty_layer":true},{"created":"2026-04-10T07:03:36.985702919Z","created_by":"COPY /dpkg / # buildkit","comment":"buildkit.dockerfile.v0"},{"created":"2026-04-10T07:08:01.666114287Z","created_by":"COPY /etc/ssl/certs /etc/ssl/certs # buildkit","comment":"buildkit.dockerfile.v0"},{"created":"2026-04-10T07:08:01.733750195Z","created_by":"COPY /fluent-bit /fluent-bit # buildkit","comment":"buildkit.dockerfile.v0"},{"created":"2026-04-10T07:08:01.733750195Z","created_by":"EXPOSE [2020/tcp]","comment":"buildkit.dockerfile.v0","empty_layer":true},{"created":"2026-04-10T07:08:01.733750195Z","created_by":"ENTRYPOINT [\"/fluent-bit/bin/fluent-bit\"]","comment":"buildkit.dockerfile.v0","empty_layer":true},{"created":"2026-04-10T07:08:01.733750195Z","created_by":"CMD [\"/fluent-bit/bin/fluent-bit\" \"-c\" \"/fluent-bit/etc/fluent-bit.conf\"]","comment":"buildkit.dockerfile.v0","empty_layer":true}],"os":"linux","rootfs":{"type":"layers","diff_ids":["sha256:82c60ccaf916322916d16bcdb4223f93acc1f68e2087dba4ddf64990b1dc27fb","sha256:621c35e751a51a9a9dc3e80aa0b7fe8be2a93402ea6ccd307d30852cd7776cda","sha256:ac2a91ec876dfaf2145e14b0b43ce6b3ea3d4edb28a0df9d91c52f2efbb8e1a7","sha256:f15316efa9979a44eee43172e640630f60407180eff3d985274befd600bb227d","sha256:275a30dd8ce958b21daa9ad962c6fbc09f98306ee2f486b65c9075dc257b1412","sha256:4d049f83d9cf21d1f5cc0e11deaf36df02790d0e60c1a3829538fb4b61685368","sha256:af5aa97ebe6ce1604747ec1e21af7136ded391bcabe4acef882e718a87c86bcc","sha256:6f1cdceb6a3146f0ccb986521156bef8a422cdbb0863396f7f751f575ba308f4","sha256:bd3cdfae1d3fdd83a2231d608969b38b82349777c2fff9a7c12d54f8ac5c9b38","sha256:4cde6b0bb6f50a5f255eef7b2a42162c661cf776b803225dcac9a659e396bb6b","sha256:ad51d0769d16ba578106a177987dfe3d2e02c1668c852b795b2f6b024068242a","sha256:187cfc6d1e3e8a40a5e64653bcd3239c140807dcf1c09e48021178705a5a6139","sha256:5fd2536c39c0700be8b7b4344e375196da2f126842fd8ede66996a18860a3890","sha256:318bc252656ce5b3c77fc9a13e302bba683f813d4b19c21be6e0ad3acc7adaf1","sha256:1a6e423bca2d12ae8428c7b3a06be964f6166ecd4d90d8d30bfcc99c40740dc7","sha256:c0e409312adc366898967307565f692bb33d43a439d3de48e27d14b742389725","sha256:e4ba966d7f0527dfe0fcb559e4e18d4da42c4e6beae924719255e0dedb554ed0","sha256:1f5d28bd51650f429293f7730ede274b81dc0744aa918bc887133c4ad610258c","sha256:6e18ad80f3d64a8cbbcd1ff2e8a0d5ce7282cf664e816b86183a59d30a618e8a","sha256:c16b2ec4b1493bad1b1de23d659c899e60abb166bda756d02792f0a03ba54a43","sha256:7db505d90756626f425c6c5468eca565c82f589b144ecaa4f411ad9bbf79e614","sha256:73c462bbf110b45d1a57a4d592f0cec743bc1bf41281b698149f276b7abaa3b3","sha256:6e44283802933cda950b734ee01ba8ec30be4494cba25e078f38d3afb7f310d6","sha256:afc0456e6dd5330673122a54ed845c114384e23d647d21d04649934a4d4d15bc"]}}",
      "repoDigests": [
        "ghcr.io/fluent/fluent-bit@sha256:f0d24db349929c1b9fd655384278c687993070c3ba325490f130fae12aa9d60c"
      ],
      "architecture": "amd64",
      "os": "linux",
      "labels": {
        "author": "Eduardo Silva <eduardo.silva@chronosphere.io>",
        "description": "Fluent Bit multi-architecture container image",
        "org.opencontainers.image.authors": "Eduardo Silva <eduardo.silva@chronosphere.io>",
        "org.opencontainers.image.description": "Fluent Bit container image",
        "org.opencontainers.image.documentation": "https://docs.fluentbit.io/",
        "org.opencontainers.image.licenses": "Apache-2.0",
        "org.opencontainers.image.source": "https://github.com/fluent/fluent-bit",
        "org.opencontainers.image.title": "Fluent Bit",
        "org.opencontainers.image.vendor": "Fluent Organization",
        "org.opencontainers.image.version": "4.2.4",
        "vendor": "Fluent Organization",
        "version": "4.2.4"
      }
    }
  },
  "distro": {
    "name": "debian",
    "version": "13",
    "idLike": []
  },
  "descriptor": {
    "name": "grype",
    "version": "0.111.1",
    "configuration": {
      "output": [
        "json"
      ],
      "file": "security/oss/grype-4.2.4.json",
      "pretty": true,
      "distro": "",
      "add-cpes-if-none": false,
      "output-template-file": "",
      "check-for-app-update": true,
      "only-fixed": false,
      "only-notfixed": false,
      "ignore-wontfix": "",
      "platform": "",
      "search": {
        "scope": "squashed",
        "unindexed-archives": false,
        "indexed-archives": true
      },
      "ignore": [
        {
          "vulnerability": "",
          "include-aliases": false,
          "reason": "",
          "namespace": "",
          "fix-state": "",
          "package": {
            "name": "kernel-headers",
            "version": "",
            "language": "",
            "type": "rpm",
            "location": "",
            "upstream-name": "kernel"
          },
          "vex-status": "",
          "vex-justification": "",
          "match-type": "exact-indirect-match"
        },
        {
          "vulnerability": "",
          "include-aliases": false,
          "reason": "",
          "namespace": "",
          "fix-state": "",
          "package": {
            "name": "linux(-.*)?-headers-.*",
            "version": "",
            "language": "",
            "type": "deb",
            "location": "",
            "upstream-name": "linux.*"
          },
          "vex-status": "",
          "vex-justification": "",
          "match-type": "exact-indirect-match"
        },
        {
          "vulnerability": "",
          "include-aliases": false,
          "reason": "",
          "namespace": "",
          "fix-state": "",
          "package": {
            "name": "linux-libc-dev",
            "version": "",
            "language": "",
            "type": "deb",
            "location": "",
            "upstream-name": "linux"
          },
          "vex-status": "",
          "vex-justification": "",
          "match-type": "exact-indirect-match"
        }
      ],
      "exclude": [],
      "externalSources": {
        "enable": false,
        "maven": {
          "searchUpstreamBySha1": true,
          "baseUrl": "https://search.maven.org/solrsearch/select",
          "rateLimit": 300000000
        }
      },
      "match": {
        "java": {
          "using-cpes": false
        },
        "jvm": {
          "using-cpes": true
        },
        "dotnet": {
          "using-cpes": false
        },
        "golang": {
          "using-cpes": false,
          "always-use-cpe-for-stdlib": true,
          "allow-main-module-pseudo-version-comparison": false
        },
        "javascript": {
          "using-cpes": false
        },
        "python": {
          "using-cpes": false
        },
        "ruby": {
          "using-cpes": false
        },
        "rust": {
          "using-cpes": false
        },
        "hex": {
          "using-cpes": false
        },
        "stock": {
          "using-cpes": true
        },
        "dpkg": {
          "using-cpes": false,
          "missing-epoch-strategy": "zero",
          "use-cpes-for-eol": false
        },
        "rpm": {
          "using-cpes": false,
          "missing-epoch-strategy": "auto",
          "use-cpes-for-eol": false
        }
      },
      "fail-on-severity": "",
      "registry": {
        "insecure-skip-tls-verify": false,
        "insecure-use-http": false,
        "ca-cert": ""
      },
      "show-suppressed": false,
      "by-cve": false,
      "SortBy": {
        "sort-by": "risk"
      },
      "name": "",
      "default-image-pull-source": "",
      "from": null,
      "vex-documents": [],
      "vex-add": [],
      "match-upstream-kernel-headers": false,
      "fix-channel": {
        "redhat-eus": {
          "apply": "auto",
          "versions": ">= 8.0"
        }
      },
      "timestamp": false,
      "alerts": {
        "enable-eol-distro-warnings": true
      },
      "db": {
        "cache-dir": ".cache/grype/db",
        "update-url": "https://grype.anchore.io/databases",
        "ca-cert": "",
        "auto-update": true,
        "validate-by-hash-on-start": true,
        "validate-age": true,
        "max-allowed-built-age": 432000000000000,
        "require-update-check": false,
        "update-available-timeout": 30000000000,
        "update-download-timeout": 300000000000,
        "max-update-check-frequency": 7200000000000
      },
      "exp": {},
      "dev": {
        "db": {
          "debug": false
        }
      }
    },
    "db": {
      "status": {
        "schemaVersion": "v6.1.4",
        "from": "https://grype.anchore.io/databases/v6/vulnerability-db_v6.1.4_2026-04-27T08:59:18Z_1777360662.tar.zst?checksum=sha256%3A0a48647b7ac49772836147a2e1eedb50e3c966ac4544e5cf518a8a68f0212781",
        "built": "2026-04-28T07:17:42Z",
        "path": ".cache/grype/db/6/vulnerability.db",
        "valid": true
      },
      "providers": {
        "alma": {
          "captured": "2026-04-28T00:44:16Z",
          "input": "xxh64:1b46f6f1ee9783b6"
        },
        "alpine": {
          "captured": "2026-04-28T00:44:31Z",
          "input": "xxh64:e7e6b44920a79618"
        },
        "amazon": {
          "captured": "2026-04-28T00:44:29Z",
          "input": "xxh64:d7af2299a168043e"
        },
        "arch": {
          "captured": "2026-04-28T00:44:23Z",
          "input": "xxh64:b477def28ae2ac9a"
        },
        "bitnami": {
          "captured": "2026-04-28T00:44:23Z",
          "input": "xxh64:bf825eb216550847"
        },
        "chainguard": {
          "captured": "2026-04-28T00:44:28Z",
          "input": "xxh64:c1948cf75cf09b8b"
        },
        "chainguard-libraries": {
          "captured": "2026-04-28T00:44:27Z",
          "input": "xxh64:fd0f7aa3082d6474"
        },
        "debian": {
          "captured": "2026-04-28T00:44:31Z",
          "input": "xxh64:4a7fabd5a110a725"
        },
        "echo": {
          "captured": "2026-04-28T00:44:25Z",
          "input": "xxh64:1b6382ce8ce1e22a"
        },
        "eol": {
          "captured": "2026-04-28T00:44:25Z",
          "input": "xxh64:b7a4b43a6a52ac24"
        },
        "epss": {
          "captured": "2026-04-28T00:44:32Z",
          "input": "xxh64:ae1b1638ba052826"
        },
        "fedora": {
          "captured": "2026-04-28T00:44:28Z",
          "input": "xxh64:e1a96127d44681d2"
        },
        "github": {
          "captured": "2026-04-28T00:44:18Z",
          "input": "xxh64:6653f4759bc9281c"
        },
        "hummingbird": {
          "captured": "2026-04-28T00:44:30Z",
          "input": "xxh64:032936e8aac13dbe"
        },
        "kev": {
          "captured": "2026-04-28T00:44:14Z",
          "input": "xxh64:101e117c2b00eee3"
        },
        "mariner": {
          "captured": "2026-04-28T00:44:22Z",
          "input": "xxh64:b85c25c624bac779"
        },
        "minimos": {
          "captured": "2026-04-28T00:44:20Z",
          "input": "xxh64:1f84cd7f40d31860"
        },
        "nvd": {
          "captured": "2026-04-28T00:44:31Z",
          "input": "xxh64:316bdc9ed5aca652"
        },
        "oracle": {
          "captured": "2026-04-28T00:44:16Z",
          "input": "xxh64:8ba7df6278dab7ac"
        },
        "photon": {
          "captured": "2026-04-28T00:44:19Z",
          "input": "xxh64:abce0747dda045c3"
        },
        "rhel": {
          "captured": "2026-04-28T00:44:58Z",
          "input": "xxh64:e23a0c7aa22bee56"
        },
        "secureos": {
          "captured": "2026-04-28T00:44:24Z",
          "input": "xxh64:666df02c7462c081"
        },
        "sles": {
          "captured": "2026-04-28T00:44:09Z",
          "input": "xxh64:ae9d6b81358bc27d"
        },
        "ubuntu": {
          "captured": "2026-04-27T08:59:18Z",
          "input": "xxh64:17f8dd2bb345319a"
        },
        "wolfi": {
          "captured": "2026-04-28T00:44:26Z",
          "input": "xxh64:21a164b2f36d51b0"
        }
      }
    }
  }
}
