{"@context":"https://openvex.dev/ns/v0.2.0","@id":"pkg:docker/operator@1.26.0","author":"security@datadoghq.com","author_role":"Vulnerability Management","last_updated":"2026-05-14T11:46:25.010628146Z","statements":[{"action_statement":"","action_statement_timestamp":"2026-05-11T11:09:51.843905Z","impact_statement":"","justification":"","last_updated":"2026-05-11T11:09:51.843905Z","products":[{"@id":"pkg:rpm/redhat/coreutils-single@9.5-6.el10?arch=x86_64\u0026distro=rhel-10.1\u0026upstream=coreutils-9.5-6.el10.src.rpm"},{"@id":"pkg:rpm/redhat/coreutils-single@9.5-6.el10?arch=aarch64\u0026distro=rhel-10.1\u0026upstream=coreutils-9.5-6.el10.src.rpm"}],"status":"under_investigation","timestamp":"2026-05-11T11:09:51.843904Z","vulnerability":{"name":"CVE-2025-5278"}},{"action_statement":"","action_statement_timestamp":"2026-05-11T11:09:51.843953Z","impact_statement":"","justification":"","last_updated":"2026-05-11T11:09:51.843952Z","products":[{"@id":"pkg:rpm/redhat/glibc@2.39-58.el10_1.7?arch=x86_64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.39-58.el10_1.7?arch=x86_64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.39-58.el10_1.7?arch=x86_64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"},{"@id":"pkg:rpm/redhat/glibc@2.39-58.el10_1.7?arch=aarch64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.39-58.el10_1.7?arch=aarch64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.39-58.el10_1.7?arch=aarch64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"}],"status":"under_investigation","timestamp":"2026-05-11T11:09:51.843952Z","vulnerability":{"name":"CVE-2026-4437"}},{"action_statement":"","action_statement_timestamp":"2026-05-11T11:09:51.844063Z","impact_statement":"","justification":"","last_updated":"2026-05-11T11:09:51.844063Z","products":[{"@id":"pkg:golang/stdlib@1.25.9"}],"status":"under_investigation","timestamp":"2026-05-11T11:09:51.844063Z","vulnerability":{"name":"CVE-2026-39820"}},{"action_statement":"","action_statement_timestamp":"2026-05-11T11:09:51.844157Z","impact_statement":"","justification":"","last_updated":"2026-05-11T11:09:51.844156Z","products":[{"@id":"pkg:rpm/redhat/glibc@2.39-58.el10_1.7?arch=x86_64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.39-58.el10_1.7?arch=x86_64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.39-58.el10_1.7?arch=x86_64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"},{"@id":"pkg:rpm/redhat/glibc@2.39-58.el10_1.7?arch=aarch64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.39-58.el10_1.7?arch=aarch64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.39-58.el10_1.7?arch=aarch64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"}],"status":"under_investigation","timestamp":"2026-05-11T11:09:51.844156Z","vulnerability":{"name":"CVE-2025-15281"}},{"action_statement":"","action_statement_timestamp":"2026-05-11T11:09:51.844248Z","impact_statement":"","justification":"","last_updated":"2026-05-11T11:09:51.844248Z","products":[{"@id":"pkg:rpm/redhat/glibc@2.39-58.el10_1.7?arch=x86_64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.39-58.el10_1.7?arch=x86_64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.39-58.el10_1.7?arch=x86_64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"},{"@id":"pkg:rpm/redhat/glibc@2.39-58.el10_1.7?arch=aarch64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.39-58.el10_1.7?arch=aarch64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.39-58.el10_1.7?arch=aarch64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"}],"status":"under_investigation","timestamp":"2026-05-11T11:09:51.844248Z","vulnerability":{"name":"CVE-2026-4046"}},{"action_statement":"","action_statement_timestamp":"2026-05-11T11:09:51.844315Z","impact_statement":"","justification":"","last_updated":"2026-05-11T11:09:51.844315Z","products":[{"@id":"pkg:rpm/redhat/glibc@2.39-58.el10_1.7?arch=x86_64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.39-58.el10_1.7?arch=x86_64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.39-58.el10_1.7?arch=x86_64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"},{"@id":"pkg:rpm/redhat/glibc@2.39-58.el10_1.7?arch=aarch64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.39-58.el10_1.7?arch=aarch64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.39-58.el10_1.7?arch=aarch64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"}],"status":"under_investigation","timestamp":"2026-05-11T11:09:51.844314Z","vulnerability":{"name":"CVE-2026-5435"}},{"action_statement":"","action_statement_timestamp":"2026-05-11T11:09:51.844386Z","impact_statement":"","justification":"","last_updated":"2026-05-11T11:09:51.844386Z","products":[{"@id":"pkg:rpm/redhat/glibc@2.39-58.el10_1.7?arch=x86_64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.39-58.el10_1.7?arch=x86_64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.39-58.el10_1.7?arch=x86_64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"},{"@id":"pkg:rpm/redhat/glibc@2.39-58.el10_1.7?arch=aarch64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.39-58.el10_1.7?arch=aarch64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.39-58.el10_1.7?arch=aarch64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"}],"status":"under_investigation","timestamp":"2026-05-11T11:09:51.844386Z","vulnerability":{"name":"CVE-2026-5450"}},{"action_statement":"","action_statement_timestamp":"2026-05-11T11:09:51.844458Z","impact_statement":"","justification":"","last_updated":"2026-05-11T11:09:51.844457Z","products":[{"@id":"pkg:rpm/redhat/glibc@2.39-58.el10_1.7?arch=x86_64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.39-58.el10_1.7?arch=x86_64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.39-58.el10_1.7?arch=x86_64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"},{"@id":"pkg:rpm/redhat/glibc@2.39-58.el10_1.7?arch=aarch64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.39-58.el10_1.7?arch=aarch64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.39-58.el10_1.7?arch=aarch64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"}],"status":"under_investigation","timestamp":"2026-05-11T11:09:51.844457Z","vulnerability":{"name":"CVE-2026-5928"}},{"action_statement":"","action_statement_timestamp":"2026-05-11T11:09:51.844532Z","impact_statement":"","justification":"","last_updated":"2026-05-11T11:09:51.844532Z","products":[{"@id":"pkg:golang/stdlib@1.25.9"}],"status":"under_investigation","timestamp":"2026-05-11T11:09:51.844532Z","vulnerability":{"name":"CVE-2026-42499"}},{"action_statement":"","action_statement_timestamp":"2026-05-11T11:09:51.844609Z","impact_statement":"","justification":"","last_updated":"2026-05-11T11:09:51.844609Z","products":[{"@id":"pkg:rpm/redhat/glibc@2.39-58.el10_1.7?arch=x86_64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.39-58.el10_1.7?arch=x86_64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.39-58.el10_1.7?arch=x86_64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"},{"@id":"pkg:rpm/redhat/glibc@2.39-58.el10_1.7?arch=aarch64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.39-58.el10_1.7?arch=aarch64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.39-58.el10_1.7?arch=aarch64\u0026distro=rhel-10.1\u0026upstream=glibc-2.39-58.el10_1.7.src.rpm"}],"status":"under_investigation","timestamp":"2026-05-11T11:09:51.844609Z","vulnerability":{"name":"CVE-2026-4438"}},{"action_statement":"","action_statement_timestamp":"2026-05-11T11:09:51.844688Z","impact_statement":"","justification":"","last_updated":"2026-05-11T11:09:51.844688Z","products":[{"@id":"pkg:golang/stdlib@1.25.9"}],"status":"under_investigation","timestamp":"2026-05-11T11:09:51.844687Z","vulnerability":{"name":"CVE-2026-33814"}},{"action_statement":"","action_statement_timestamp":"2026-05-11T11:09:51.844755Z","impact_statement":"","justification":"","last_updated":"2026-05-11T11:09:51.844755Z","products":[{"@id":"pkg:golang/stdlib@1.25.9"}],"status":"under_investigation","timestamp":"2026-05-11T11:09:51.844755Z","vulnerability":{"name":"CVE-2026-33811"}},{"action_statement":"","action_statement_timestamp":"2026-05-11T11:09:51.844827Z","impact_statement":"","justification":"","last_updated":"2026-05-11T11:09:51.844827Z","products":[{"@id":"pkg:golang/stdlib@1.25.9"}],"status":"under_investigation","timestamp":"2026-05-11T11:09:51.844826Z","vulnerability":{"name":"CVE-2026-39836"}},{"action_statement":"","action_statement_timestamp":"2026-05-11T11:09:51.844889Z","impact_statement":"","justification":"","last_updated":"2026-05-11T11:09:51.844889Z","products":[{"@id":"pkg:golang/stdlib@1.25.9"}],"status":"under_investigation","timestamp":"2026-05-11T11:09:51.844889Z","vulnerability":{"name":"CVE-2026-42501"}},{"action_statement":"","action_statement_timestamp":"2026-05-11T11:09:51.844957Z","impact_statement":"","justification":"","last_updated":"2026-05-11T11:09:51.844957Z","products":[{"@id":"pkg:golang/stdlib@1.25.9"}],"status":"under_investigation","timestamp":"2026-05-11T11:09:51.844956Z","vulnerability":{"name":"CVE-2026-39817"}},{"action_statement":"","action_statement_timestamp":"2026-05-11T11:09:51.845028Z","impact_statement":"","justification":"","last_updated":"2026-05-11T11:09:51.845028Z","products":[{"@id":"pkg:golang/stdlib@1.25.9"}],"status":"under_investigation","timestamp":"2026-05-11T11:09:51.845027Z","vulnerability":{"name":"CVE-2026-39826"}},{"action_statement":"","action_statement_timestamp":"2026-05-11T11:09:51.845126Z","impact_statement":"","justification":"","last_updated":"2026-05-11T11:09:51.845126Z","products":[{"@id":"pkg:golang/helm.sh/helm/v3@v3.18.5"}],"status":"under_investigation","timestamp":"2026-05-11T11:09:51.845126Z","vulnerability":{"name":"CVE-2026-35206"}},{"action_statement":"","action_statement_timestamp":"2026-05-11T11:09:51.845161Z","impact_statement":"","justification":"","last_updated":"2026-05-11T11:09:51.845161Z","products":[{"@id":"pkg:golang/stdlib@1.25.9"}],"status":"under_investigation","timestamp":"2026-05-11T11:09:51.845161Z","vulnerability":{"name":"CVE-2026-39823"}},{"action_statement":"","action_statement_timestamp":"2026-05-11T11:09:51.845251Z","impact_statement":"","justification":"","last_updated":"2026-05-11T11:09:51.845251Z","products":[{"@id":"pkg:golang/stdlib@1.25.9"}],"status":"under_investigation","timestamp":"2026-05-11T11:09:51.845251Z","vulnerability":{"name":"CVE-2026-39825"}},{"action_statement":"","action_statement_timestamp":"2026-05-11T11:09:51.845363Z","impact_statement":"","justification":"","last_updated":"2026-05-11T11:09:51.845363Z","products":[{"@id":"pkg:golang/stdlib@1.25.9"}],"status":"under_investigation","timestamp":"2026-05-11T11:09:51.845363Z","vulnerability":{"name":"CVE-2026-39819"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-11T11:09:51.906798Z","products":[{"@id":"pkg:golang/go.opentelemetry.io/otel@v1.39.0"}],"status":"fixed","timestamp":"2026-05-11T11:09:51.906798Z","vulnerability":{"name":"CVE-2026-29181"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-11T11:09:51.906828Z","products":[{"@id":"pkg:rpm/redhat/ncurses-base@6.2-12.20210508.el9?arch=noarch\u0026distro=rhel-9.7\u0026upstream=ncurses-6.2-12.20210508.el9.src.rpm"},{"@id":"pkg:rpm/redhat/ncurses-libs@6.2-12.20210508.el9?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=ncurses-6.2-12.20210508.el9.src.rpm"},{"@id":"pkg:rpm/redhat/ncurses-libs@6.2-12.20210508.el9?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=ncurses-6.2-12.20210508.el9.src.rpm"}],"status":"fixed","timestamp":"2026-05-11T11:09:51.906828Z","vulnerability":{"name":"CVE-2023-50495"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-11T11:09:51.906833Z","products":[{"@id":"pkg:rpm/redhat/libgcc@11.5.0-11.el9?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=gcc-11.5.0-11.el9.src.rpm"},{"@id":"pkg:rpm/redhat/libgcc@11.5.0-11.el9?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=gcc-11.5.0-11.el9.src.rpm"}],"status":"fixed","timestamp":"2026-05-11T11:09:51.906833Z","vulnerability":{"name":"CVE-2022-27943"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-11T11:09:51.906838Z","products":[{"@id":"pkg:rpm/redhat/pcre2@10.40-6.el9?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=pcre2-10.40-6.el9.src.rpm"},{"@id":"pkg:rpm/redhat/pcre2-syntax@10.40-6.el9?arch=noarch\u0026distro=rhel-9.7\u0026upstream=pcre2-10.40-6.el9.src.rpm"},{"@id":"pkg:rpm/redhat/pcre2@10.40-6.el9?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=pcre2-10.40-6.el9.src.rpm"}],"status":"fixed","timestamp":"2026-05-11T11:09:51.906837Z","vulnerability":{"name":"CVE-2022-41409"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-11T11:09:51.906841Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"fixed","timestamp":"2026-05-11T11:09:51.906841Z","vulnerability":{"name":"CVE-2026-27143"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-11T11:09:51.906844Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"fixed","timestamp":"2026-05-11T11:09:51.906844Z","vulnerability":{"name":"CVE-2026-32281"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-11T11:09:51.906854Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"fixed","timestamp":"2026-05-11T11:09:51.906854Z","vulnerability":{"name":"CVE-2026-32280"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-11T11:09:51.906863Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"fixed","timestamp":"2026-05-11T11:09:51.906863Z","vulnerability":{"name":"CVE-2026-32283"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-11T11:09:51.906866Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"fixed","timestamp":"2026-05-11T11:09:51.906866Z","vulnerability":{"name":"CVE-2026-27140"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-11T11:09:51.906869Z","products":[{"@id":"pkg:golang/go.opentelemetry.io/otel/sdk@v1.39.0"}],"status":"fixed","timestamp":"2026-05-11T11:09:51.906869Z","vulnerability":{"name":"CVE-2026-24051"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-11T11:09:51.906873Z","products":[{"@id":"pkg:golang/go.opentelemetry.io/otel/sdk@v1.39.0"}],"status":"fixed","timestamp":"2026-05-11T11:09:51.906873Z","vulnerability":{"name":"CVE-2026-39883"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-11T11:09:51.906876Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"fixed","timestamp":"2026-05-11T11:09:51.906876Z","vulnerability":{"name":"CVE-2026-32289"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-11T11:09:51.906878Z","products":[{"@id":"pkg:rpm/redhat/libcap@2.48-10.el9?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=libcap-2.48-10.el9.src.rpm"},{"@id":"pkg:rpm/redhat/libcap@2.48-10.el9?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=libcap-2.48-10.el9.src.rpm"}],"status":"fixed","timestamp":"2026-05-11T11:09:51.906878Z","vulnerability":{"name":"CVE-2026-4878"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-11T11:09:51.906882Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"fixed","timestamp":"2026-05-11T11:09:51.906882Z","vulnerability":{"name":"CVE-2026-32282"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-11T11:09:51.906884Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"fixed","timestamp":"2026-05-11T11:09:51.906884Z","vulnerability":{"name":"CVE-2026-27144"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-11T11:09:51.90689Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"fixed","timestamp":"2026-05-11T11:09:51.90689Z","vulnerability":{"name":"CVE-2026-32288"}}],"timestamp":"2026-05-07T11:35:06.075891796Z","tooling":"","version":3}