{"@context":"https://openvex.dev/ns/v0.2.0","@id":"pkg:docker/serverless-init@1.9.9","author":"security@datadoghq.com","author_role":"Vulnerability Management","last_updated":"2026-05-14T11:43:18.435047255Z","statements":[{"action_statement":"","action_statement_timestamp":"2026-05-14T11:32:27.207738Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:27.207738Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"under_investigation","timestamp":"2026-05-14T11:32:27.207737Z","vulnerability":{"name":"CVE-2026-39820"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:32:27.207979Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:27.207979Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"under_investigation","timestamp":"2026-05-14T11:32:27.207979Z","vulnerability":{"name":"CVE-2026-42499"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:32:27.208027Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:27.208027Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"under_investigation","timestamp":"2026-05-14T11:32:27.208027Z","vulnerability":{"name":"CVE-2026-33814"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:32:27.208277Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:27.208277Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"under_investigation","timestamp":"2026-05-14T11:32:27.208277Z","vulnerability":{"name":"CVE-2026-39836"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:32:27.208782Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:27.208781Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"under_investigation","timestamp":"2026-05-14T11:32:27.20878Z","vulnerability":{"name":"CVE-2026-33811"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:32:27.208883Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:27.208883Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"under_investigation","timestamp":"2026-05-14T11:32:27.208883Z","vulnerability":{"name":"CVE-2026-39826"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:32:27.208976Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:27.208975Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"under_investigation","timestamp":"2026-05-14T11:32:27.208975Z","vulnerability":{"name":"CVE-2026-39817"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:32:27.209084Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:27.209084Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"under_investigation","timestamp":"2026-05-14T11:32:27.209084Z","vulnerability":{"name":"CVE-2026-42501"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:32:27.209115Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:27.209115Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"under_investigation","timestamp":"2026-05-14T11:32:27.209114Z","vulnerability":{"name":"CVE-2026-39825"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:32:27.209202Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:27.209202Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"under_investigation","timestamp":"2026-05-14T11:32:27.209202Z","vulnerability":{"name":"CVE-2026-39823"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:32:27.209799Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:27.209799Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"under_investigation","timestamp":"2026-05-14T11:32:27.209799Z","vulnerability":{"name":"CVE-2026-39819"}},{"action_statement":"This vulnerability was fixed in: 1.9.11","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:50.329453Z","products":[{"@id":"pkg:golang/go.opentelemetry.io/otel/sdk@v1.40.0"}],"status":"affected","timestamp":"2026-05-14T11:32:27.209294Z","vulnerability":{"name":"CVE-2026-39883"}},{"action_statement":"This vulnerability was fixed in: 1.9.11","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:50.329479Z","products":[{"@id":"pkg:golang/go.opentelemetry.io/otel/exporters/otlp/otlplog/otlploghttp@v0.16.0"},{"@id":"pkg:golang/go.opentelemetry.io/otel/exporters/otlp/otlpmetric/otlpmetrichttp@v1.40.0"},{"@id":"pkg:golang/go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracehttp@v1.40.0"}],"status":"affected","timestamp":"2026-05-14T11:32:27.209684Z","vulnerability":{"name":"CVE-2026-39882"}},{"action_statement":"This vulnerability was fixed in: 1.9.10","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:35:06.231369Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"affected","timestamp":"2026-05-14T11:32:27.208249Z","vulnerability":{"name":"CVE-2026-27143"}},{"action_statement":"This vulnerability was fixed in: 1.9.10","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:35:06.231688Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"affected","timestamp":"2026-05-14T11:32:27.208463Z","vulnerability":{"name":"CVE-2026-32281"}},{"action_statement":"This vulnerability was fixed in: 1.9.10","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:35:06.23187Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"affected","timestamp":"2026-05-14T11:32:27.208492Z","vulnerability":{"name":"CVE-2026-32280"}},{"action_statement":"This vulnerability was fixed in: 1.9.10","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:35:06.231957Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"affected","timestamp":"2026-05-14T11:32:27.208681Z","vulnerability":{"name":"CVE-2026-32283"}},{"action_statement":"This vulnerability was fixed in: 1.9.10","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:35:06.232098Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"affected","timestamp":"2026-05-14T11:32:27.208826Z","vulnerability":{"name":"CVE-2026-27140"}},{"action_statement":"This vulnerability was fixed in: 1.9.10","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:35:06.232137Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"affected","timestamp":"2026-05-14T11:32:27.209325Z","vulnerability":{"name":"CVE-2026-32289"}},{"action_statement":"This vulnerability was fixed in: 1.9.10","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:35:06.23218Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"affected","timestamp":"2026-05-14T11:32:27.209507Z","vulnerability":{"name":"CVE-2026-32282"}},{"action_statement":"This vulnerability was fixed in: 1.9.10","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:35:06.232193Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"affected","timestamp":"2026-05-14T11:32:27.209635Z","vulnerability":{"name":"CVE-2026-27144"}},{"action_statement":"This vulnerability was fixed in: 1.9.10","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:35:06.232211Z","products":[{"@id":"pkg:golang/stdlib@1.25.8"}],"status":"affected","timestamp":"2026-05-14T11:32:27.209963Z","vulnerability":{"name":"CVE-2026-32288"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:17:44.887563Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:17:44.887563Z","products":[{"@id":"pkg:deb/debian/libc6@2.36-9%2Bdeb12u13?arch=amd64\u0026distro=debian-12\u0026upstream=glibc"},{"@id":"pkg:deb/debian/libc6@2.36-9%2Bdeb12u13?arch=arm64\u0026distro=debian-12\u0026upstream=glibc"}],"status":"affected","timestamp":"2026-05-14T11:17:44.887563Z","vulnerability":{"name":"CVE-2026-0861"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:17:44.887631Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:17:44.887631Z","products":[{"@id":"pkg:deb/debian/libc6@2.36-9%2Bdeb12u13?arch=amd64\u0026distro=debian-12\u0026upstream=glibc"},{"@id":"pkg:deb/debian/libc6@2.36-9%2Bdeb12u13?arch=arm64\u0026distro=debian-12\u0026upstream=glibc"}],"status":"affected","timestamp":"2026-05-14T11:17:44.887631Z","vulnerability":{"name":"CVE-2019-1010022"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:17:44.887978Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:17:44.887978Z","products":[{"@id":"pkg:deb/debian/gcc-12-base@12.2.0-14%2Bdeb12u1?arch=amd64\u0026distro=debian-12\u0026upstream=gcc-12"},{"@id":"pkg:deb/debian/libgcc-s1@12.2.0-14%2Bdeb12u1?arch=amd64\u0026distro=debian-12\u0026upstream=gcc-12"},{"@id":"pkg:deb/debian/libgomp1@12.2.0-14%2Bdeb12u1?arch=amd64\u0026distro=debian-12\u0026upstream=gcc-12"},{"@id":"pkg:deb/debian/libstdc%2B%2B6@12.2.0-14%2Bdeb12u1?arch=amd64\u0026distro=debian-12\u0026upstream=gcc-12"},{"@id":"pkg:deb/debian/gcc-12-base@12.2.0-14%2Bdeb12u1?arch=arm64\u0026distro=debian-12\u0026upstream=gcc-12"},{"@id":"pkg:deb/debian/libgcc-s1@12.2.0-14%2Bdeb12u1?arch=arm64\u0026distro=debian-12\u0026upstream=gcc-12"},{"@id":"pkg:deb/debian/libgomp1@12.2.0-14%2Bdeb12u1?arch=arm64\u0026distro=debian-12\u0026upstream=gcc-12"},{"@id":"pkg:deb/debian/libstdc%2B%2B6@12.2.0-14%2Bdeb12u1?arch=arm64\u0026distro=debian-12\u0026upstream=gcc-12"}],"status":"affected","timestamp":"2026-05-14T11:17:44.887978Z","vulnerability":{"name":"CVE-2022-27943"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:17:44.886641Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:17:44.886641Z","products":[{"@id":"pkg:deb/debian/libc6@2.36-9%2Bdeb12u13?arch=amd64\u0026distro=debian-12\u0026upstream=glibc"},{"@id":"pkg:deb/debian/libc6@2.36-9%2Bdeb12u13?arch=arm64\u0026distro=debian-12\u0026upstream=glibc"}],"status":"affected","timestamp":"2026-05-14T11:17:44.886641Z","vulnerability":{"name":"CVE-2018-20796"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:17:44.886749Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:17:44.886749Z","products":[{"@id":"pkg:deb/debian/libc6@2.36-9%2Bdeb12u13?arch=amd64\u0026distro=debian-12\u0026upstream=glibc"},{"@id":"pkg:deb/debian/libc6@2.36-9%2Bdeb12u13?arch=arm64\u0026distro=debian-12\u0026upstream=glibc"}],"status":"affected","timestamp":"2026-05-14T11:17:44.886749Z","vulnerability":{"name":"CVE-2025-15281"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:17:44.886786Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:17:44.886785Z","products":[{"@id":"pkg:deb/debian/libc6@2.36-9%2Bdeb12u13?arch=amd64\u0026distro=debian-12\u0026upstream=glibc"},{"@id":"pkg:deb/debian/libc6@2.36-9%2Bdeb12u13?arch=arm64\u0026distro=debian-12\u0026upstream=glibc"}],"status":"affected","timestamp":"2026-05-14T11:17:44.886785Z","vulnerability":{"name":"CVE-2026-4437"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:17:44.886815Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:17:44.886815Z","products":[{"@id":"pkg:deb/debian/libc6@2.36-9%2Bdeb12u13?arch=amd64\u0026distro=debian-12\u0026upstream=glibc"},{"@id":"pkg:deb/debian/libc6@2.36-9%2Bdeb12u13?arch=arm64\u0026distro=debian-12\u0026upstream=glibc"}],"status":"affected","timestamp":"2026-05-14T11:17:44.886815Z","vulnerability":{"name":"CVE-2026-4046"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:17:44.88684Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:17:44.88684Z","products":[{"@id":"pkg:deb/debian/libc6@2.36-9%2Bdeb12u13?arch=amd64\u0026distro=debian-12\u0026upstream=glibc"},{"@id":"pkg:deb/debian/libc6@2.36-9%2Bdeb12u13?arch=arm64\u0026distro=debian-12\u0026upstream=glibc"}],"status":"affected","timestamp":"2026-05-14T11:17:44.88684Z","vulnerability":{"name":"CVE-2026-5450"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:17:44.88686Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:17:44.88686Z","products":[{"@id":"pkg:deb/debian/libc6@2.36-9%2Bdeb12u13?arch=amd64\u0026distro=debian-12\u0026upstream=glibc"},{"@id":"pkg:deb/debian/libc6@2.36-9%2Bdeb12u13?arch=arm64\u0026distro=debian-12\u0026upstream=glibc"}],"status":"affected","timestamp":"2026-05-14T11:17:44.88686Z","vulnerability":{"name":"CVE-2019-1010025"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:17:44.886903Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:17:44.886903Z","products":[{"@id":"pkg:deb/debian/libc6@2.36-9%2Bdeb12u13?arch=amd64\u0026distro=debian-12\u0026upstream=glibc"},{"@id":"pkg:deb/debian/libc6@2.36-9%2Bdeb12u13?arch=arm64\u0026distro=debian-12\u0026upstream=glibc"}],"status":"affected","timestamp":"2026-05-14T11:17:44.886903Z","vulnerability":{"name":"CVE-2019-9192"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:17:44.886923Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:17:44.886922Z","products":[{"@id":"pkg:deb/debian/libc6@2.36-9%2Bdeb12u13?arch=amd64\u0026distro=debian-12\u0026upstream=glibc"},{"@id":"pkg:deb/debian/libc6@2.36-9%2Bdeb12u13?arch=arm64\u0026distro=debian-12\u0026upstream=glibc"}],"status":"affected","timestamp":"2026-05-14T11:17:44.886922Z","vulnerability":{"name":"CVE-2026-5928"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:17:44.886985Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:17:44.886985Z","products":[{"@id":"pkg:deb/debian/libc6@2.36-9%2Bdeb12u13?arch=amd64\u0026distro=debian-12\u0026upstream=glibc"},{"@id":"pkg:deb/debian/libc6@2.36-9%2Bdeb12u13?arch=arm64\u0026distro=debian-12\u0026upstream=glibc"}],"status":"affected","timestamp":"2026-05-14T11:17:44.886985Z","vulnerability":{"name":"CVE-2026-5435"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:17:44.887016Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:17:44.887015Z","products":[{"@id":"pkg:deb/debian/libc6@2.36-9%2Bdeb12u13?arch=amd64\u0026distro=debian-12\u0026upstream=glibc"},{"@id":"pkg:deb/debian/libc6@2.36-9%2Bdeb12u13?arch=arm64\u0026distro=debian-12\u0026upstream=glibc"}],"status":"affected","timestamp":"2026-05-14T11:17:44.887015Z","vulnerability":{"name":"CVE-2019-1010024"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:17:44.887094Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:17:44.887094Z","products":[{"@id":"pkg:deb/debian/libc6@2.36-9%2Bdeb12u13?arch=amd64\u0026distro=debian-12\u0026upstream=glibc"},{"@id":"pkg:deb/debian/libc6@2.36-9%2Bdeb12u13?arch=arm64\u0026distro=debian-12\u0026upstream=glibc"}],"status":"affected","timestamp":"2026-05-14T11:17:44.887094Z","vulnerability":{"name":"CVE-2026-6238"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:17:44.88714Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:17:44.88714Z","products":[{"@id":"pkg:deb/debian/libc6@2.36-9%2Bdeb12u13?arch=amd64\u0026distro=debian-12\u0026upstream=glibc"},{"@id":"pkg:deb/debian/libc6@2.36-9%2Bdeb12u13?arch=arm64\u0026distro=debian-12\u0026upstream=glibc"}],"status":"affected","timestamp":"2026-05-14T11:17:44.88714Z","vulnerability":{"name":"CVE-2026-4438"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:17:44.887179Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:17:44.887179Z","products":[{"@id":"pkg:deb/debian/libc6@2.36-9%2Bdeb12u13?arch=amd64\u0026distro=debian-12\u0026upstream=glibc"},{"@id":"pkg:deb/debian/libc6@2.36-9%2Bdeb12u13?arch=arm64\u0026distro=debian-12\u0026upstream=glibc"}],"status":"affected","timestamp":"2026-05-14T11:17:44.887178Z","vulnerability":{"name":"CVE-2010-4756"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:17:44.887273Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:17:44.887272Z","products":[{"@id":"pkg:deb/debian/libc6@2.36-9%2Bdeb12u13?arch=amd64\u0026distro=debian-12\u0026upstream=glibc"},{"@id":"pkg:deb/debian/libc6@2.36-9%2Bdeb12u13?arch=arm64\u0026distro=debian-12\u0026upstream=glibc"}],"status":"affected","timestamp":"2026-05-14T11:17:44.887272Z","vulnerability":{"name":"CVE-2026-0915"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:17:44.887291Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:17:44.887291Z","products":[{"@id":"pkg:deb/debian/libc6@2.36-9%2Bdeb12u13?arch=amd64\u0026distro=debian-12\u0026upstream=glibc"},{"@id":"pkg:deb/debian/libc6@2.36-9%2Bdeb12u13?arch=arm64\u0026distro=debian-12\u0026upstream=glibc"}],"status":"affected","timestamp":"2026-05-14T11:17:44.887291Z","vulnerability":{"name":"CVE-2019-1010023"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:17:44.887439Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:17:44.887439Z","products":[{"@id":"pkg:deb/debian/libssl3@3.0.18-1~deb12u2?arch=amd64\u0026distro=debian-12\u0026upstream=openssl"},{"@id":"pkg:deb/debian/libssl3@3.0.18-1~deb12u2?arch=arm64\u0026distro=debian-12\u0026upstream=openssl"}],"status":"affected","timestamp":"2026-05-14T11:17:44.887439Z","vulnerability":{"name":"CVE-2025-27587"}},{"action_statement":"This vulnerability was fixed in: 1.9.10","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:25:24.475074Z","products":[{"@id":"pkg:deb/debian/libssl3@3.0.18-1~deb12u2?arch=amd64\u0026distro=debian-12\u0026upstream=openssl"},{"@id":"pkg:deb/debian/libssl3@3.0.18-1~deb12u2?arch=arm64\u0026distro=debian-12\u0026upstream=openssl"}],"status":"affected","timestamp":"2026-05-14T11:17:44.886677Z","vulnerability":{"name":"CVE-2026-28389"}},{"action_statement":"This vulnerability was fixed in: 1.9.10","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:25:24.475106Z","products":[{"@id":"pkg:deb/debian/libssl3@3.0.18-1~deb12u2?arch=amd64\u0026distro=debian-12\u0026upstream=openssl"},{"@id":"pkg:deb/debian/libssl3@3.0.18-1~deb12u2?arch=arm64\u0026distro=debian-12\u0026upstream=openssl"}],"status":"affected","timestamp":"2026-05-14T11:17:44.886723Z","vulnerability":{"name":"CVE-2026-28390"}},{"action_statement":"This vulnerability was fixed in: 1.9.10","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:25:24.475198Z","products":[{"@id":"pkg:deb/debian/libssl3@3.0.18-1~deb12u2?arch=amd64\u0026distro=debian-12\u0026upstream=openssl"},{"@id":"pkg:deb/debian/libssl3@3.0.18-1~deb12u2?arch=arm64\u0026distro=debian-12\u0026upstream=openssl"}],"status":"affected","timestamp":"2026-05-14T11:17:44.887694Z","vulnerability":{"name":"CVE-2026-31789"}},{"action_statement":"This vulnerability was fixed in: 1.9.10","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:25:24.475112Z","products":[{"@id":"pkg:deb/debian/libssl3@3.0.18-1~deb12u2?arch=amd64\u0026distro=debian-12\u0026upstream=openssl"},{"@id":"pkg:deb/debian/libssl3@3.0.18-1~deb12u2?arch=arm64\u0026distro=debian-12\u0026upstream=openssl"}],"status":"affected","timestamp":"2026-05-14T11:17:44.886945Z","vulnerability":{"name":"CVE-2026-28387"}},{"action_statement":"This vulnerability was fixed in: 1.9.10","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:25:24.475117Z","products":[{"@id":"pkg:deb/debian/libssl3@3.0.18-1~deb12u2?arch=amd64\u0026distro=debian-12\u0026upstream=openssl"},{"@id":"pkg:deb/debian/libssl3@3.0.18-1~deb12u2?arch=arm64\u0026distro=debian-12\u0026upstream=openssl"}],"status":"affected","timestamp":"2026-05-14T11:17:44.887069Z","vulnerability":{"name":"CVE-2026-31790"}},{"action_statement":"This vulnerability was fixed in: 1.9.10","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:25:24.475149Z","products":[{"@id":"pkg:deb/debian/libssl3@3.0.18-1~deb12u2?arch=amd64\u0026distro=debian-12\u0026upstream=openssl"},{"@id":"pkg:deb/debian/libssl3@3.0.18-1~deb12u2?arch=arm64\u0026distro=debian-12\u0026upstream=openssl"}],"status":"affected","timestamp":"2026-05-14T11:17:44.887114Z","vulnerability":{"name":"CVE-2026-28388"}}],"timestamp":"2026-04-06T11:27:10.737804001Z","tooling":"","version":10}