{"@context":"https://openvex.dev/ns/v0.2.0","@id":"pkg:docker/operator@1.25.0","author":"security@datadoghq.com","author_role":"Vulnerability Management","last_updated":"2026-05-14T11:46:25.768821523Z","statements":[{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:35:02.972555Z","products":[{"@id":"pkg:rpm/redhat/ncurses-base@6.2-12.20210508.el9?arch=noarch\u0026distro=rhel-9.7\u0026upstream=ncurses-6.2-12.20210508.el9.src.rpm"},{"@id":"pkg:rpm/redhat/ncurses-libs@6.2-12.20210508.el9?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=ncurses-6.2-12.20210508.el9.src.rpm"},{"@id":"pkg:rpm/redhat/ncurses-libs@6.2-12.20210508.el9?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=ncurses-6.2-12.20210508.el9.src.rpm"}],"status":"affected","timestamp":"2026-05-14T11:32:35.519094Z","vulnerability":{"name":"CVE-2023-50495"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:32:35.517958Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:35.517958Z","products":[{"@id":"pkg:rpm/redhat/coreutils-single@8.32-39.el9?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=coreutils-8.32-39.el9.src.rpm"},{"@id":"pkg:rpm/redhat/coreutils-single@8.32-39.el9?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=coreutils-8.32-39.el9.src.rpm"}],"status":"under_investigation","timestamp":"2026-05-14T11:32:35.517957Z","vulnerability":{"name":"CVE-2025-5278"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:32:35.518055Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:35.518055Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"under_investigation","timestamp":"2026-05-14T11:32:35.518054Z","vulnerability":{"name":"CVE-2026-39820"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:32:35.518118Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:35.518118Z","products":[{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.10?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.10.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.10?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.10.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.10?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.10.src.rpm"},{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.10?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.10.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.10?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.10.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.10?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.10.src.rpm"}],"status":"under_investigation","timestamp":"2026-05-14T11:32:35.518118Z","vulnerability":{"name":"CVE-2026-4437"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:32:35.518171Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:35.518171Z","products":[{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.10?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.10.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.10?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.10.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.10?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.10.src.rpm"},{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.10?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.10.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.10?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.10.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.10?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.10.src.rpm"}],"status":"under_investigation","timestamp":"2026-05-14T11:32:35.51817Z","vulnerability":{"name":"CVE-2026-4046"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:32:35.518235Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:35.518235Z","products":[{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.10?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.10.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.10?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.10.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.10?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.10.src.rpm"},{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.10?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.10.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.10?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.10.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.10?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.10.src.rpm"}],"status":"under_investigation","timestamp":"2026-05-14T11:32:35.518234Z","vulnerability":{"name":"CVE-2026-5435"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:32:35.518507Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:35.518506Z","products":[{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.10?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.10.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.10?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.10.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.10?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.10.src.rpm"},{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.10?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.10.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.10?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.10.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.10?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.10.src.rpm"}],"status":"under_investigation","timestamp":"2026-05-14T11:32:35.518506Z","vulnerability":{"name":"CVE-2026-5450"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:32:35.520085Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:35.520085Z","products":[{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.10?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.10.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.10?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.10.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.10?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.10.src.rpm"},{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.10?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.10.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.10?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.10.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.10?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.10.src.rpm"}],"status":"under_investigation","timestamp":"2026-05-14T11:32:35.520084Z","vulnerability":{"name":"CVE-2026-5928"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:32:35.520837Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:35.520835Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"under_investigation","timestamp":"2026-05-14T11:32:35.520835Z","vulnerability":{"name":"CVE-2026-42499"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:32:35.521023Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:35.521023Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"under_investigation","timestamp":"2026-05-14T11:32:35.521023Z","vulnerability":{"name":"CVE-2026-33814"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:32:35.521136Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:35.521135Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"under_investigation","timestamp":"2026-05-14T11:32:35.521135Z","vulnerability":{"name":"CVE-2026-39836"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:32:35.521189Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:35.521189Z","products":[{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.10?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.10.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.10?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.10.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.10?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.10.src.rpm"},{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.10?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.10.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.10?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.10.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.10?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.10.src.rpm"}],"status":"under_investigation","timestamp":"2026-05-14T11:32:35.521189Z","vulnerability":{"name":"CVE-2026-4438"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:32:35.523327Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:35.523326Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"under_investigation","timestamp":"2026-05-14T11:32:35.523326Z","vulnerability":{"name":"CVE-2026-33811"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:32:35.523477Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:35.523477Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"under_investigation","timestamp":"2026-05-14T11:32:35.523477Z","vulnerability":{"name":"CVE-2026-39826"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:32:35.523533Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:35.523533Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"under_investigation","timestamp":"2026-05-14T11:32:35.523533Z","vulnerability":{"name":"CVE-2026-39817"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:32:35.523586Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:35.523586Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"under_investigation","timestamp":"2026-05-14T11:32:35.523585Z","vulnerability":{"name":"CVE-2026-42501"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:32:35.524146Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:35.524146Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"under_investigation","timestamp":"2026-05-14T11:32:35.524146Z","vulnerability":{"name":"CVE-2026-39825"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:32:35.52468Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:35.52468Z","products":[{"@id":"pkg:golang/helm.sh/helm/v3@v3.18.5"}],"status":"under_investigation","timestamp":"2026-05-14T11:32:35.52468Z","vulnerability":{"name":"CVE-2026-35206"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:32:35.524889Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:35.524889Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"under_investigation","timestamp":"2026-05-14T11:32:35.524889Z","vulnerability":{"name":"CVE-2026-39823"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:32:35.525695Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:35.525695Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"under_investigation","timestamp":"2026-05-14T11:32:35.525695Z","vulnerability":{"name":"CVE-2026-39819"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:35.588454Z","products":[{"@id":"pkg:golang/stdlib@1.25.7"}],"status":"fixed","timestamp":"2026-05-14T11:32:35.588454Z","vulnerability":{"name":"CVE-2026-25679"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:35.588853Z","products":[{"@id":"pkg:golang/google.golang.org/grpc@v1.69.4"}],"status":"fixed","timestamp":"2026-05-14T11:32:35.588852Z","vulnerability":{"name":"CVE-2026-33186"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:35.588987Z","products":[{"@id":"pkg:golang/stdlib@1.25.7"}],"status":"fixed","timestamp":"2026-05-14T11:32:35.588986Z","vulnerability":{"name":"CVE-2026-27142"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:35.589119Z","products":[{"@id":"pkg:golang/stdlib@1.25.7"}],"status":"fixed","timestamp":"2026-05-14T11:32:35.589119Z","vulnerability":{"name":"CVE-2026-27139"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:35:02.972525Z","products":[{"@id":"pkg:golang/go.opentelemetry.io/otel@v1.39.0"}],"status":"affected","timestamp":"2026-05-14T11:32:35.518015Z","vulnerability":{"name":"CVE-2026-29181"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:35:02.972561Z","products":[{"@id":"pkg:rpm/redhat/libgcc@11.5.0-11.el9?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=gcc-11.5.0-11.el9.src.rpm"},{"@id":"pkg:rpm/redhat/libgcc@11.5.0-11.el9?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=gcc-11.5.0-11.el9.src.rpm"}],"status":"affected","timestamp":"2026-05-14T11:32:35.52093Z","vulnerability":{"name":"CVE-2022-27943"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:35:02.972566Z","products":[{"@id":"pkg:rpm/redhat/pcre2@10.40-6.el9?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=pcre2-10.40-6.el9.src.rpm"},{"@id":"pkg:rpm/redhat/pcre2-syntax@10.40-6.el9?arch=noarch\u0026distro=rhel-9.7\u0026upstream=pcre2-10.40-6.el9.src.rpm"},{"@id":"pkg:rpm/redhat/pcre2@10.40-6.el9?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=pcre2-10.40-6.el9.src.rpm"}],"status":"affected","timestamp":"2026-05-14T11:32:35.520976Z","vulnerability":{"name":"CVE-2022-41409"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:35:02.97257Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"affected","timestamp":"2026-05-14T11:32:35.52108Z","vulnerability":{"name":"CVE-2026-27143"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:35:02.972573Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"affected","timestamp":"2026-05-14T11:32:35.521929Z","vulnerability":{"name":"CVE-2026-32281"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:35:02.972578Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"affected","timestamp":"2026-05-14T11:32:35.522593Z","vulnerability":{"name":"CVE-2026-32280"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:35:02.972582Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"affected","timestamp":"2026-05-14T11:32:35.522951Z","vulnerability":{"name":"CVE-2026-32283"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:35:02.972591Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"affected","timestamp":"2026-05-14T11:32:35.52339Z","vulnerability":{"name":"CVE-2026-27140"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"This vulnerability is not exploitable in our environment, as the affected function is not used by the application. The binary does not link against or invoke the vulnerable component (cap_set_file function).","justification":"vulnerable_code_not_present","last_updated":"2026-05-14T11:35:02.972603Z","products":[{"@id":"pkg:rpm/redhat/libcap@2.48-10.el9?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=libcap-2.48-10.el9.src.rpm"},{"@id":"pkg:rpm/redhat/libcap@2.48-10.el9?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=libcap-2.48-10.el9.src.rpm"}],"status":"affected","timestamp":"2026-05-14T11:32:35.525077Z","vulnerability":{"name":"CVE-2026-4878"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:35:02.972596Z","products":[{"@id":"pkg:golang/go.opentelemetry.io/otel/sdk@v1.39.0"}],"status":"affected","timestamp":"2026-05-14T11:32:35.523448Z","vulnerability":{"name":"CVE-2026-24051"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"The vulnerability exploits the BSD-specific kenv command in the OpenTelemetry Go SDK resource detection. This code is gated by Go OS build constraints and is only compiled on BSD/Solaris targets. The operator binary is built with GOOS=linux, so the vulnerable code is excluded from the compiled binary and is not present in the image.","justification":"vulnerable_code_not_present","last_updated":"2026-05-14T11:35:02.972606Z","products":[{"@id":"pkg:golang/go.opentelemetry.io/otel/sdk@v1.39.0"}],"status":"affected","timestamp":"2026-05-14T11:32:35.52526Z","vulnerability":{"name":"CVE-2026-39883"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:35:02.972609Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"affected","timestamp":"2026-05-14T11:32:35.525418Z","vulnerability":{"name":"CVE-2026-32289"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:35:02.972614Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"affected","timestamp":"2026-05-14T11:32:35.525581Z","vulnerability":{"name":"CVE-2026-32282"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:35:02.972617Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"affected","timestamp":"2026-05-14T11:32:35.525638Z","vulnerability":{"name":"CVE-2026-27144"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:35:02.97262Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"affected","timestamp":"2026-05-14T11:32:35.526221Z","vulnerability":{"name":"CVE-2026-32288"}}],"timestamp":"2026-04-06T11:28:56.654587849Z","tooling":"","version":10}