{"@context":"https://openvex.dev/ns/v0.2.0","@id":"pkg:docker/synthetics-private-location-worker-fips@1.59.1","author":"security@datadoghq.com","author_role":"Vulnerability Management","last_updated":"2026-05-14T11:43:56.561974091Z","statements":[{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.883193Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.883193Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"affected","timestamp":"2026-05-14T10:25:32.883193Z","vulnerability":{"name":"CVE-2026-30997"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.883297Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.883297Z","products":[{"@id":"pkg:deb/ubuntu/libxml2@2.9.14%2Bdfsg-1.3ubuntu3.4?arch=amd64\u0026distro=ubuntu-24.04"}],"status":"affected","timestamp":"2026-05-14T10:25:32.883297Z","vulnerability":{"name":"CVE-2026-6732"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.883391Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.883391Z","products":[{"@id":"pkg:deb/ubuntu/xdg-utils@1.1.3-4.1ubuntu3?arch=all\u0026distro=ubuntu-24.04"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.883391Z","vulnerability":{"name":"CVE-2025-52968"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.883575Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.883575Z","products":[{"@id":"pkg:deb/ubuntu/coreutils@9.4-3ubuntu6.1?arch=amd64\u0026distro=ubuntu-24.04"}],"status":"affected","timestamp":"2026-05-14T10:25:32.883575Z","vulnerability":{"name":"CVE-2016-2781"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.883605Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.883605Z","products":[{"@id":"pkg:npm/fast-xml-parser@4.4.1"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.883605Z","vulnerability":{"name":"CVE-2026-33349"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.883634Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.883633Z","products":[{"@id":"pkg:deb/ubuntu/libavahi-client3@0.8-13ubuntu6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=avahi"},{"@id":"pkg:deb/ubuntu/libavahi-common3@0.8-13ubuntu6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=avahi"},{"@id":"pkg:deb/ubuntu/libavahi-common-data@0.8-13ubuntu6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=avahi"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.883633Z","vulnerability":{"name":"CVE-2025-59529"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.884242Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.884242Z","products":[{"@id":"pkg:deb/ubuntu/libavahi-client3@0.8-13ubuntu6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=avahi"},{"@id":"pkg:deb/ubuntu/libavahi-common3@0.8-13ubuntu6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=avahi"},{"@id":"pkg:deb/ubuntu/libavahi-common-data@0.8-13ubuntu6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=avahi"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.884242Z","vulnerability":{"name":"CVE-2024-52616"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.885548Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.885548Z","products":[{"@id":"pkg:deb/ubuntu/libc6@2.39-0ubuntu8.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=glibc"},{"@id":"pkg:deb/ubuntu/libc-bin@2.39-0ubuntu8.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=glibc"},{"@id":"pkg:deb/ubuntu/locales@2.39-0ubuntu8.5?arch=all\u0026distro=ubuntu-24.04\u0026upstream=glibc"}],"status":"affected","timestamp":"2026-05-14T10:25:32.885547Z","vulnerability":{"name":"CVE-2026-5450"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.172026Z","products":[{"@id":"pkg:npm/fast-xml-parser@4.4.1"}],"status":"affected","timestamp":"2026-05-14T10:25:32.886677Z","vulnerability":{"name":"CVE-2026-26278"}},{"action_statement":"This vulnerability was fixed in: 1.60.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:44:05.318039Z","products":[{"@id":"pkg:npm/tar-fs@3.0.9"}],"status":"affected","timestamp":"2026-05-14T10:25:32.885995Z","vulnerability":{"name":"CVE-2025-59343"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.886732Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.886732Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"affected","timestamp":"2026-05-14T10:25:32.886731Z","vulnerability":{"name":"CVE-2026-30998"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.48047Z","products":[{"@id":"pkg:generic/node@22.17.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.88697Z","vulnerability":{"name":"CVE-2026-21710"}},{"action_statement":"This vulnerability was fixed in: 1.63.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:19:48.895977Z","products":[{"@id":"pkg:deb/ubuntu/libcups2t64@2.4.7-1.2ubuntu7.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=cups"}],"status":"affected","timestamp":"2026-05-14T10:25:32.88682Z","vulnerability":{"name":"CVE-2025-61915"}},{"action_statement":"This vulnerability was fixed in: 1.62.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:03:42.950997Z","products":[{"@id":"pkg:npm/brace-expansion@1.1.11"},{"@id":"pkg:npm/brace-expansion@2.0.1"}],"status":"affected","timestamp":"2026-05-14T10:25:32.886881Z","vulnerability":{"name":"CVE-2025-5889"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.900379Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.900379Z","products":[{"@id":"pkg:deb/ubuntu/libpam-systemd@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=systemd"},{"@id":"pkg:deb/ubuntu/libsystemd0@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=systemd"},{"@id":"pkg:deb/ubuntu/libsystemd-shared@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=systemd"},{"@id":"pkg:deb/ubuntu/libudev1@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=systemd"},{"@id":"pkg:deb/ubuntu/systemd@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04"},{"@id":"pkg:deb/ubuntu/systemd-dev@255.4-1ubuntu8.10?arch=all\u0026distro=ubuntu-24.04\u0026upstream=systemd"},{"@id":"pkg:deb/ubuntu/systemd-sysv@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=systemd"}],"status":"affected","timestamp":"2026-05-14T10:25:32.900379Z","vulnerability":{"name":"CVE-2026-40228"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.887045Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.887045Z","products":[{"@id":"pkg:deb/ubuntu/libgnutls30t64@3.8.3-1.1ubuntu3.4?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=gnutls28"}],"status":"affected","timestamp":"2026-05-14T10:25:32.887045Z","vulnerability":{"name":"CVE-2026-33845"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.887131Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.887131Z","products":[{"@id":"pkg:deb/ubuntu/libc6@2.39-0ubuntu8.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=glibc"},{"@id":"pkg:deb/ubuntu/libc-bin@2.39-0ubuntu8.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=glibc"},{"@id":"pkg:deb/ubuntu/locales@2.39-0ubuntu8.5?arch=all\u0026distro=ubuntu-24.04\u0026upstream=glibc"}],"status":"affected","timestamp":"2026-05-14T10:25:32.887131Z","vulnerability":{"name":"CVE-2026-5928"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.887377Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.887377Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.887377Z","vulnerability":{"name":"CVE-2026-42499"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.887413Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.887413Z","products":[{"@id":"pkg:deb/ubuntu/libc6@2.39-0ubuntu8.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=glibc"},{"@id":"pkg:deb/ubuntu/libc-bin@2.39-0ubuntu8.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=glibc"},{"@id":"pkg:deb/ubuntu/locales@2.39-0ubuntu8.5?arch=all\u0026distro=ubuntu-24.04\u0026upstream=glibc"}],"status":"affected","timestamp":"2026-05-14T10:25:32.887413Z","vulnerability":{"name":"CVE-2026-5435"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.887446Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.887446Z","products":[{"@id":"pkg:deb/ubuntu/libc6@2.39-0ubuntu8.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=glibc"},{"@id":"pkg:deb/ubuntu/libc-bin@2.39-0ubuntu8.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=glibc"},{"@id":"pkg:deb/ubuntu/locales@2.39-0ubuntu8.5?arch=all\u0026distro=ubuntu-24.04\u0026upstream=glibc"}],"status":"affected","timestamp":"2026-05-14T10:25:32.887446Z","vulnerability":{"name":"CVE-2026-6238"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.887549Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.887549Z","products":[{"@id":"pkg:deb/ubuntu/libc6@2.39-0ubuntu8.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=glibc"},{"@id":"pkg:deb/ubuntu/libc-bin@2.39-0ubuntu8.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=glibc"},{"@id":"pkg:deb/ubuntu/locales@2.39-0ubuntu8.5?arch=all\u0026distro=ubuntu-24.04\u0026upstream=glibc"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.887549Z","vulnerability":{"name":"CVE-2026-4438"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.887614Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.887614Z","products":[{"@id":"pkg:deb/ubuntu/libpam-systemd@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=systemd"},{"@id":"pkg:deb/ubuntu/libsystemd0@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=systemd"},{"@id":"pkg:deb/ubuntu/libsystemd-shared@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=systemd"},{"@id":"pkg:deb/ubuntu/libudev1@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=systemd"},{"@id":"pkg:deb/ubuntu/systemd@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04"},{"@id":"pkg:deb/ubuntu/systemd-dev@255.4-1ubuntu8.10?arch=all\u0026distro=ubuntu-24.04\u0026upstream=systemd"},{"@id":"pkg:deb/ubuntu/systemd-sysv@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=systemd"}],"status":"affected","timestamp":"2026-05-14T10:25:32.887613Z","vulnerability":{"name":"CVE-2026-40225"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.887935Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.887934Z","products":[{"@id":"pkg:deb/ubuntu/libavahi-client3@0.8-13ubuntu6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=avahi"},{"@id":"pkg:deb/ubuntu/libavahi-common3@0.8-13ubuntu6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=avahi"},{"@id":"pkg:deb/ubuntu/libavahi-common-data@0.8-13ubuntu6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=avahi"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.887934Z","vulnerability":{"name":"CVE-2026-24401"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.888168Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.888167Z","products":[{"@id":"pkg:deb/ubuntu/libncurses6@6.4%2B20240113-1ubuntu2?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ncurses"},{"@id":"pkg:deb/ubuntu/libncursesw6@6.4%2B20240113-1ubuntu2?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ncurses"},{"@id":"pkg:deb/ubuntu/libtinfo6@6.4%2B20240113-1ubuntu2?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ncurses"},{"@id":"pkg:deb/ubuntu/ncurses-base@6.4%2B20240113-1ubuntu2?arch=all\u0026distro=ubuntu-24.04\u0026upstream=ncurses"},{"@id":"pkg:deb/ubuntu/ncurses-bin@6.4%2B20240113-1ubuntu2?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ncurses"}],"status":"affected","timestamp":"2026-05-14T10:25:32.888167Z","vulnerability":{"name":"CVE-2025-6141"}},{"action_statement":"This vulnerability was fixed in: 1.62.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:03:42.951017Z","products":[{"@id":"pkg:generic/haproxy@2.4.28"}],"status":"affected","timestamp":"2026-05-14T10:25:32.888325Z","vulnerability":{"name":"CVE-2023-45539"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.888432Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.888432Z","products":[{"@id":"pkg:deb/ubuntu/libpam0g@1.5.3-5ubuntu5.4?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=pam"},{"@id":"pkg:deb/ubuntu/libpam-modules@1.5.3-5ubuntu5.4?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=pam"},{"@id":"pkg:deb/ubuntu/libpam-modules-bin@1.5.3-5ubuntu5.4?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=pam"},{"@id":"pkg:deb/ubuntu/libpam-runtime@1.5.3-5ubuntu5.4?arch=all\u0026distro=ubuntu-24.04\u0026upstream=pam"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.888431Z","vulnerability":{"name":"CVE-2026-43916"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.888516Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.888516Z","products":[{"@id":"pkg:deb/ubuntu/libpam0g@1.5.3-5ubuntu5.4?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=pam"},{"@id":"pkg:deb/ubuntu/libpam-modules@1.5.3-5ubuntu5.4?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=pam"},{"@id":"pkg:deb/ubuntu/libpam-modules-bin@1.5.3-5ubuntu5.4?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=pam"},{"@id":"pkg:deb/ubuntu/libpam-runtime@1.5.3-5ubuntu5.4?arch=all\u0026distro=ubuntu-24.04\u0026upstream=pam"}],"status":"affected","timestamp":"2026-05-14T10:25:32.888516Z","vulnerability":{"name":"CVE-2024-10041"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.888867Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.888867Z","products":[{"@id":"pkg:deb/ubuntu/libavahi-client3@0.8-13ubuntu6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=avahi"},{"@id":"pkg:deb/ubuntu/libavahi-common3@0.8-13ubuntu6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=avahi"},{"@id":"pkg:deb/ubuntu/libavahi-common-data@0.8-13ubuntu6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=avahi"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.888867Z","vulnerability":{"name":"CVE-2024-52615"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.903915Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.903915Z","products":[{"@id":"pkg:deb/ubuntu/libgcrypt20@1.10.3-2build1?arch=amd64\u0026distro=ubuntu-24.04"}],"status":"affected","timestamp":"2026-05-14T10:25:32.903915Z","vulnerability":{"name":"CVE-2026-41989"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.899176Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.899176Z","products":[{"@id":"pkg:deb/ubuntu/libpam-systemd@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=systemd"},{"@id":"pkg:deb/ubuntu/libsystemd0@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=systemd"},{"@id":"pkg:deb/ubuntu/libsystemd-shared@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=systemd"},{"@id":"pkg:deb/ubuntu/libudev1@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=systemd"},{"@id":"pkg:deb/ubuntu/systemd@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04"},{"@id":"pkg:deb/ubuntu/systemd-dev@255.4-1ubuntu8.10?arch=all\u0026distro=ubuntu-24.04\u0026upstream=systemd"},{"@id":"pkg:deb/ubuntu/systemd-sysv@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=systemd"}],"status":"affected","timestamp":"2026-05-14T10:25:32.899176Z","vulnerability":{"name":"CVE-2026-40223"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.899676Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.899675Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.899675Z","vulnerability":{"name":"CVE-2026-42501"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.899736Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.899736Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.899736Z","vulnerability":{"name":"CVE-2026-39825"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.900318Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.900318Z","products":[{"@id":"pkg:deb/ubuntu/libcups2t64@2.4.7-1.2ubuntu7.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=cups"}],"status":"affected","timestamp":"2026-05-14T10:25:32.900318Z","vulnerability":{"name":"CVE-2026-39316"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.904032Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.904032Z","products":[{"@id":"pkg:deb/ubuntu/libcups2t64@2.4.7-1.2ubuntu7.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=cups"}],"status":"affected","timestamp":"2026-05-14T10:25:32.904032Z","vulnerability":{"name":"CVE-2026-41079"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.904296Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.904296Z","products":[{"@id":"pkg:deb/ubuntu/libopenjp2-7@2.5.0-2ubuntu0.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=openjpeg2"}],"status":"affected","timestamp":"2026-05-14T10:25:32.904296Z","vulnerability":{"name":"CVE-2026-6192"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.904347Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.904347Z","products":[{"@id":"pkg:deb/ubuntu/libpam-systemd@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=systemd"},{"@id":"pkg:deb/ubuntu/libsystemd0@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=systemd"},{"@id":"pkg:deb/ubuntu/libsystemd-shared@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=systemd"},{"@id":"pkg:deb/ubuntu/libudev1@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=systemd"},{"@id":"pkg:deb/ubuntu/systemd@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04"},{"@id":"pkg:deb/ubuntu/systemd-dev@255.4-1ubuntu8.10?arch=all\u0026distro=ubuntu-24.04\u0026upstream=systemd"},{"@id":"pkg:deb/ubuntu/systemd-sysv@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=systemd"}],"status":"affected","timestamp":"2026-05-14T10:25:32.904347Z","vulnerability":{"name":"CVE-2026-40224"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.905967Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.905967Z","products":[{"@id":"pkg:deb/ubuntu/libcups2t64@2.4.7-1.2ubuntu7.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=cups"}],"status":"affected","timestamp":"2026-05-14T10:25:32.905966Z","vulnerability":{"name":"CVE-2026-27447"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.906776Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.906776Z","products":[{"@id":"pkg:deb/ubuntu/libcups2t64@2.4.7-1.2ubuntu7.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=cups"}],"status":"affected","timestamp":"2026-05-14T10:25:32.906776Z","vulnerability":{"name":"CVE-2026-34990"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:33.101443Z","products":[{"@id":"pkg:golang/stdlib@1.23.7"}],"status":"fixed","timestamp":"2026-05-14T10:25:33.101443Z","vulnerability":{"name":"CVE-2025-22871"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:33.10145Z","products":[{"@id":"pkg:deb/ubuntu/libxml2@2.9.14%2Bdfsg-1.3ubuntu3.3?arch=amd64\u0026distro=ubuntu-24.04"}],"status":"fixed","timestamp":"2026-05-14T10:25:33.10145Z","vulnerability":{"name":"CVE-2025-49794"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:33.101459Z","products":[{"@id":"pkg:generic/python@3.13.4"}],"status":"fixed","timestamp":"2026-05-14T10:25:33.101458Z","vulnerability":{"name":"CVE-2025-8194"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:33.101471Z","products":[{"@id":"pkg:deb/ubuntu/libllvm19@1%3A19.1.1-1ubuntu1~24.04.2?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=llvm-toolchain-19"}],"status":"fixed","timestamp":"2026-05-14T10:25:33.101471Z","vulnerability":{"name":"CVE-2024-7883"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:33.101501Z","products":[{"@id":"pkg:golang/golang.org/x/net@v0.34.0"}],"status":"fixed","timestamp":"2026-05-14T10:25:33.101501Z","vulnerability":{"name":"CVE-2025-22872"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:33.101521Z","products":[{"@id":"pkg:golang/stdlib@1.23.7"}],"status":"fixed","timestamp":"2026-05-14T10:25:33.101521Z","vulnerability":{"name":"CVE-2025-4673"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:33.101578Z","products":[{"@id":"pkg:deb/ubuntu/libgtk-3-0@3.24.33-1ubuntu2.2?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=gtk%2B3.0"}],"status":"fixed","timestamp":"2026-05-14T10:25:33.101578Z","vulnerability":{"name":"CVE-2024-6655"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.903219Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.903219Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.903219Z","vulnerability":{"name":"CVE-2026-39823"}},{"action_statement":"This vulnerability was fixed in: 1.63.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:19:48.896217Z","products":[{"@id":"pkg:npm/jws@3.2.2"},{"@id":"pkg:npm/jws@4.0.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.903798Z","vulnerability":{"name":"CVE-2025-65945"}},{"action_statement":"This vulnerability was fixed in: 1.63.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:19:48.896244Z","products":[{"@id":"pkg:deb/ubuntu/libpng16-16t64@1.6.43-5build1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=libpng1.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.90701Z","vulnerability":{"name":"CVE-2025-64505"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.90749Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.90749Z","products":[{"@id":"pkg:deb/ubuntu/libopenjp2-7@2.5.0-2ubuntu0.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=openjpeg2"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.90749Z","vulnerability":{"name":"CVE-2023-39328"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.922443Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.922443Z","products":[{"@id":"pkg:deb/ubuntu/libgnutls30t64@3.8.3-1.1ubuntu3.4?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=gnutls28"}],"status":"affected","timestamp":"2026-05-14T10:25:32.922443Z","vulnerability":{"name":"CVE-2026-5260"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.922486Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.922486Z","products":[{"@id":"pkg:deb/ubuntu/libgnutls30t64@3.8.3-1.1ubuntu3.4?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=gnutls28"}],"status":"affected","timestamp":"2026-05-14T10:25:32.922486Z","vulnerability":{"name":"CVE-2026-5419"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:33.101598Z","products":[{"@id":"pkg:deb/ubuntu/libtiff6@4.5.1%2Bgit230720-4ubuntu2.2?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=tiff"}],"status":"fixed","timestamp":"2026-05-14T10:25:33.101597Z","vulnerability":{"name":"CVE-2025-8534"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:33.10167Z","products":[{"@id":"pkg:deb/ubuntu/libcups2@2.4.1op1-1ubuntu4.11?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=cups"}],"status":"fixed","timestamp":"2026-05-14T10:25:33.101669Z","vulnerability":{"name":"CVE-2023-4504"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:33.101684Z","products":[{"@id":"pkg:golang/stdlib@1.23.7"}],"status":"fixed","timestamp":"2026-05-14T10:25:33.101683Z","vulnerability":{"name":"CVE-2025-47906"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:33.101691Z","products":[{"@id":"pkg:deb/ubuntu/libxml2@2.9.14%2Bdfsg-1.3ubuntu3.3?arch=amd64\u0026distro=ubuntu-24.04"}],"status":"fixed","timestamp":"2026-05-14T10:25:33.101691Z","vulnerability":{"name":"CVE-2025-6170"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:33.101802Z","products":[{"@id":"pkg:deb/ubuntu/libtiff6@4.5.1%2Bgit230720-4ubuntu2.2?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=tiff"}],"status":"fixed","timestamp":"2026-05-14T10:25:33.101802Z","vulnerability":{"name":"CVE-2025-8851"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:33.101835Z","products":[{"@id":"pkg:golang/stdlib@1.23.7"}],"status":"fixed","timestamp":"2026-05-14T10:25:33.101835Z","vulnerability":{"name":"CVE-2025-47907"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:33.101882Z","products":[{"@id":"pkg:golang/golang.org/x/net@v0.34.0"}],"status":"fixed","timestamp":"2026-05-14T10:25:33.101882Z","vulnerability":{"name":"CVE-2025-22870"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.922559Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.922559Z","products":[{"@id":"pkg:npm/protobufjs@7.4.0"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.922559Z","vulnerability":{"name":"CVE-2026-44292"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.922603Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.922603Z","products":[{"@id":"pkg:npm/protobufjs@7.4.0"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.922603Z","vulnerability":{"name":"CVE-2026-44294"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.922647Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.922647Z","products":[{"@id":"pkg:npm/%40smithy/config-resolver@1.0.1"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.922646Z","vulnerability":{"name":"GHSA-6475-r3vj-m8vf"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:33.101364Z","products":[{"@id":"pkg:deb/ubuntu/libcups2@2.4.1op1-1ubuntu4.11?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=cups"}],"status":"fixed","timestamp":"2026-05-14T10:25:33.101364Z","vulnerability":{"name":"CVE-2024-47175"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:33.101405Z","products":[{"@id":"pkg:deb/ubuntu/libcups2@2.4.1op1-1ubuntu4.11?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=cups"}],"status":"fixed","timestamp":"2026-05-14T10:25:33.101405Z","vulnerability":{"name":"CVE-2024-35235"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:33.101417Z","products":[{"@id":"pkg:deb/ubuntu/libxml2@2.9.14%2Bdfsg-1.3ubuntu3.3?arch=amd64\u0026distro=ubuntu-24.04"}],"status":"fixed","timestamp":"2026-05-14T10:25:33.101416Z","vulnerability":{"name":"CVE-2025-6021"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:33.101426Z","products":[{"@id":"pkg:deb/ubuntu/libxml2@2.9.14%2Bdfsg-1.3ubuntu3.3?arch=amd64\u0026distro=ubuntu-24.04"}],"status":"fixed","timestamp":"2026-05-14T10:25:33.101426Z","vulnerability":{"name":"CVE-2025-49796"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:33.101434Z","products":[{"@id":"pkg:generic/python@3.13.4"}],"status":"fixed","timestamp":"2026-05-14T10:25:33.101433Z","vulnerability":{"name":"CVE-2025-6069"}},{"action_statement":"This vulnerability was fixed in: 1.60.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:44:05.316227Z","products":[{"@id":"pkg:deb/ubuntu/libpam0g@1.5.3-5ubuntu5.4?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=pam"},{"@id":"pkg:deb/ubuntu/libpam-modules@1.5.3-5ubuntu5.4?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=pam"},{"@id":"pkg:deb/ubuntu/libpam-modules-bin@1.5.3-5ubuntu5.4?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=pam"},{"@id":"pkg:deb/ubuntu/libpam-runtime@1.5.3-5ubuntu5.4?arch=all\u0026distro=ubuntu-24.04\u0026upstream=pam"}],"status":"affected","timestamp":"2026-05-14T10:25:32.873685Z","vulnerability":{"name":"CVE-2024-10963"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:33.101979Z","products":[{"@id":"pkg:deb/ubuntu/libtiff6@4.5.1%2Bgit230720-4ubuntu2.2?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=tiff"}],"status":"fixed","timestamp":"2026-05-14T10:25:33.101978Z","vulnerability":{"name":"CVE-2025-8176"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:33.10203Z","products":[{"@id":"pkg:golang/stdlib@1.23.7"}],"status":"fixed","timestamp":"2026-05-14T10:25:33.10203Z","vulnerability":{"name":"CVE-2025-4674"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:33.102143Z","products":[{"@id":"pkg:golang/stdlib@1.23.7"}],"status":"fixed","timestamp":"2026-05-14T10:25:33.102143Z","vulnerability":{"name":"CVE-2025-22873"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.883147Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.883147Z","products":[{"@id":"pkg:deb/ubuntu/libgbm1@25.0.7-0ubuntu0.24.04.2?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=mesa"},{"@id":"pkg:deb/ubuntu/mesa-libgallium@25.0.7-0ubuntu0.24.04.2?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=mesa"}],"status":"affected","timestamp":"2026-05-14T10:25:32.883147Z","vulnerability":{"name":"CVE-2026-40393"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.880831Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.880831Z","products":[{"@id":"pkg:deb/ubuntu/libzvbi0t64@0.2.42-2?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=zvbi"},{"@id":"pkg:deb/ubuntu/libzvbi-common@0.2.42-2?arch=all\u0026distro=ubuntu-24.04\u0026upstream=zvbi"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.880831Z","vulnerability":{"name":"CVE-2025-2176"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.881052Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.881052Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.881051Z","vulnerability":{"name":"CVE-2024-36616"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480516Z","products":[{"@id":"pkg:deb/ubuntu/liblcms2-2@2.14-2build1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=lcms2"}],"status":"affected","timestamp":"2026-05-14T10:25:32.891937Z","vulnerability":{"name":"CVE-2026-41254"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.172122Z","products":[{"@id":"pkg:deb/ubuntu/libssh-4@0.10.6-2ubuntu0.1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=libssh"}],"status":"affected","timestamp":"2026-05-14T10:25:32.892023Z","vulnerability":{"name":"CVE-2026-0967"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.883081Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.883081Z","products":[{"@id":"pkg:deb/ubuntu/libtiff6@4.5.1%2Bgit230720-4ubuntu2.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=tiff"}],"status":"affected","timestamp":"2026-05-14T10:25:32.883081Z","vulnerability":{"name":"CVE-2026-4775"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.892674Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.892674Z","products":[{"@id":"pkg:deb/ubuntu/libgnutls30t64@3.8.3-1.1ubuntu3.4?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=gnutls28"}],"status":"affected","timestamp":"2026-05-14T10:25:32.892674Z","vulnerability":{"name":"CVE-2026-42011"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.892764Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.892764Z","products":[{"@id":"pkg:npm/brace-expansion@1.1.11"},{"@id":"pkg:npm/brace-expansion@2.0.1"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.892764Z","vulnerability":{"name":"CVE-2026-33750"}},{"action_statement":"This vulnerability was fixed in: 1.63.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:19:48.896074Z","products":[{"@id":"pkg:generic/python@3.13.7"}],"status":"affected","timestamp":"2026-05-14T10:25:32.892935Z","vulnerability":{"name":"CVE-2025-13837"}},{"action_statement":"This vulnerability was fixed in: 1.62.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:03:42.951136Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.893022Z","vulnerability":{"name":"CVE-2025-58187"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.898371Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.898371Z","products":[{"@id":"pkg:deb/ubuntu/libcairo2@1.18.0-3build1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=cairo"},{"@id":"pkg:deb/ubuntu/libcairo-gobject2@1.18.0-3build1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=cairo"}],"status":"affected","timestamp":"2026-05-14T10:25:32.898371Z","vulnerability":{"name":"CVE-2025-50422"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.89843Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.89843Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.89843Z","vulnerability":{"name":"CVE-2026-39826"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.89849Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.89849Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.89849Z","vulnerability":{"name":"CVE-2026-39817"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.89856Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.89856Z","products":[{"@id":"pkg:deb/ubuntu/libcups2t64@2.4.7-1.2ubuntu7.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=cups"}],"status":"affected","timestamp":"2026-05-14T10:25:32.89856Z","vulnerability":{"name":"CVE-2026-39314"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.89863Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.89863Z","products":[{"@id":"pkg:deb/ubuntu/libpng16-16t64@1.6.43-5build1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=libpng1.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.89863Z","vulnerability":{"name":"CVE-2026-34757"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.898672Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.898672Z","products":[{"@id":"pkg:deb/ubuntu/bsdutils@1%3A2.39.3-9ubuntu6.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=util-linux%402.39.3-9ubuntu6.3"},{"@id":"pkg:deb/ubuntu/libblkid1@2.39.3-9ubuntu6.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=util-linux"},{"@id":"pkg:deb/ubuntu/libfdisk1@2.39.3-9ubuntu6.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=util-linux"},{"@id":"pkg:deb/ubuntu/libmount1@2.39.3-9ubuntu6.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=util-linux"},{"@id":"pkg:deb/ubuntu/libsmartcols1@2.39.3-9ubuntu6.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=util-linux"},{"@id":"pkg:deb/ubuntu/libuuid1@2.39.3-9ubuntu6.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=util-linux"},{"@id":"pkg:deb/ubuntu/mount@2.39.3-9ubuntu6.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=util-linux"},{"@id":"pkg:deb/ubuntu/util-linux@2.39.3-9ubuntu6.3?arch=amd64\u0026distro=ubuntu-24.04"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.898672Z","vulnerability":{"name":"CVE-2026-27456"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.898974Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.898974Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.898974Z","vulnerability":{"name":"CVE-2024-36617"}},{"action_statement":"This vulnerability was fixed in: 1.62.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:03:42.951226Z","products":[{"@id":"pkg:deb/ubuntu/libssh-4@0.10.6-2ubuntu0.1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=libssh"}],"status":"affected","timestamp":"2026-05-14T10:25:32.898525Z","vulnerability":{"name":"CVE-2025-8114"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.873442Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.873442Z","products":[{"@id":"pkg:deb/ubuntu/login@1%3A4.13%2Bdfsg1-4ubuntu3.2?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=shadow"},{"@id":"pkg:deb/ubuntu/passwd@1%3A4.13%2Bdfsg1-4ubuntu3.2?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=shadow"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.873442Z","vulnerability":{"name":"CVE-2024-56433"}},{"action_statement":"This vulnerability was fixed in: 1.61.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:54:52.064408Z","products":[{"@id":"pkg:generic/haproxy@2.4.28"}],"status":"affected","timestamp":"2026-05-14T10:25:32.873333Z","vulnerability":{"name":"CVE-2025-32464"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.873812Z","impact_statement":"Firefox does not support JPEG 2000 and does not invoke FFmpeg's jpeg2000dec decoder. The channel definition cdef atom is a JPEG 2000 container construct that would only be processed by explicitly running FFmpeg against a crafted JPEG 2000 file. No such execution path exists in the Synthetics Worker.","justification":"vulnerable_code_not_present","last_updated":"2026-05-14T10:25:32.873812Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"not_affected","timestamp":"2026-05-14T10:25:32.873811Z","vulnerability":{"name":"CVE-2025-9951"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.873991Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.873991Z","products":[{"@id":"pkg:deb/ubuntu/libgcrypt20@1.10.3-2build1?arch=amd64\u0026distro=ubuntu-24.04"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.873991Z","vulnerability":{"name":"CVE-2024-2236"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.874104Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.874104Z","products":[{"@id":"pkg:deb/ubuntu/libjpeg-turbo8@2.1.5-2ubuntu2?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=libjpeg-turbo"}],"status":"affected","timestamp":"2026-05-14T10:25:32.874104Z","vulnerability":{"name":"CVE-2018-10126"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.874143Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.874143Z","products":[{"@id":"pkg:deb/ubuntu/libssl3t64@3.0.13-0ubuntu3.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=openssl"},{"@id":"pkg:deb/ubuntu/openssl@3.0.13-0ubuntu3.5?arch=amd64\u0026distro=ubuntu-24.04"}],"status":"affected","timestamp":"2026-05-14T10:25:32.874143Z","vulnerability":{"name":"CVE-2024-41996"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.874253Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.874253Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"affected","timestamp":"2026-05-14T10:25:32.874253Z","vulnerability":{"name":"CVE-2024-32228"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.874366Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.874366Z","products":[{"@id":"pkg:deb/ubuntu/wget@1.21.4-1ubuntu4.1?arch=amd64\u0026distro=ubuntu-24.04"}],"status":"affected","timestamp":"2026-05-14T10:25:32.874366Z","vulnerability":{"name":"CVE-2024-10524"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.874401Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.8744Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.8744Z","vulnerability":{"name":"CVE-2024-31578"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.874609Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.874609Z","products":[{"@id":"pkg:deb/ubuntu/libcairo2@1.18.0-3build1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=cairo"},{"@id":"pkg:deb/ubuntu/libcairo-gobject2@1.18.0-3build1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=cairo"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.874609Z","vulnerability":{"name":"CVE-2018-18064"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.874803Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.874803Z","products":[{"@id":"pkg:deb/ubuntu/libzvbi0t64@0.2.42-2?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=zvbi"},{"@id":"pkg:deb/ubuntu/libzvbi-common@0.2.42-2?arch=all\u0026distro=ubuntu-24.04\u0026upstream=zvbi"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.874803Z","vulnerability":{"name":"CVE-2025-2173"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.87507Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.87507Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.87507Z","vulnerability":{"name":"CVE-2023-49502"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.875352Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.875352Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.875351Z","vulnerability":{"name":"CVE-2024-35368"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.875614Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.875614Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.875614Z","vulnerability":{"name":"CVE-2024-35365"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.875744Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.875744Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.875744Z","vulnerability":{"name":"CVE-2024-35366"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.875886Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.875885Z","products":[{"@id":"pkg:deb/ubuntu/libopenjp2-7@2.5.0-2ubuntu0.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=openjpeg2"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.875885Z","vulnerability":{"name":"CVE-2019-6988"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.875945Z","impact_statement":"libx264 is an H.264 video encoder library. The attack vector described (RCE via a crafted AAC audio file) represents an unusual cross-format exploitation path that would require libx264 to process an AAC audio stream directly — a scenario that does not occur during normal H.264 encoding operations. In the Synthetics Worker, libx264 is a transitive dependency of libavcodec-extra; Firefox may use it for H.264 video encoding in limited contexts (e.g., getUserMedia/WebRTC), but the Synthetics Worker does not execute WebRTC sessions nor does it process untrusted AAC files through any pipeline that routes to libx264. The exploitation path (attacker-supplied AAC → libx264 memory corruption) cannot be triggered by the Synthetics Worker's operational model.","justification":"vulnerable_code_not_in_execute_path","last_updated":"2026-05-14T10:25:32.875945Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libx264-164@2%3A0.164.3108%2Bgit31e19f9-1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=x264"}],"status":"not_affected","timestamp":"2026-05-14T10:25:32.875945Z","vulnerability":{"name":"CVE-2025-25467"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.876043Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.876043Z","products":[{"@id":"pkg:deb/ubuntu/libzvbi0t64@0.2.42-2?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=zvbi"},{"@id":"pkg:deb/ubuntu/libzvbi-common@0.2.42-2?arch=all\u0026distro=ubuntu-24.04\u0026upstream=zvbi"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.876042Z","vulnerability":{"name":"CVE-2025-2174"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.876124Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.876124Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.876124Z","vulnerability":{"name":"CVE-2024-35367"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.876338Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.876338Z","products":[{"@id":"pkg:deb/ubuntu/libcairo2@1.18.0-3build1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=cairo"},{"@id":"pkg:deb/ubuntu/libcairo-gobject2@1.18.0-3build1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=cairo"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.876337Z","vulnerability":{"name":"CVE-2017-7475"}},{"action_statement":"This vulnerability was fixed in: 1.64.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:25:35.222875Z","products":[{"@id":"pkg:deb/ubuntu/libglib2.0-0t64@2.80.0-6ubuntu3.4?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=glib2.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.875188Z","vulnerability":{"name":"CVE-2025-3360"}},{"action_statement":"This vulnerability was fixed in: 1.64.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:25:35.222957Z","products":[{"@id":"pkg:deb/ubuntu/libglib2.0-0t64@2.80.0-6ubuntu3.4?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=glib2.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.876307Z","vulnerability":{"name":"CVE-2025-6052"}},{"action_statement":"This vulnerability was fixed in: 1.63.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:19:48.89581Z","products":[{"@id":"pkg:generic/python@3.13.7"}],"status":"affected","timestamp":"2026-05-14T10:25:32.874572Z","vulnerability":{"name":"CVE-2025-13836"}},{"action_statement":"This vulnerability was fixed in: 1.62.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:03:42.950775Z","products":[{"@id":"pkg:deb/ubuntu/libxml2@2.9.14%2Bdfsg-1.3ubuntu3.4?arch=amd64\u0026distro=ubuntu-24.04"}],"status":"affected","timestamp":"2026-05-14T10:25:32.875921Z","vulnerability":{"name":"CVE-2025-7425"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.876436Z","impact_statement":"The TTY (TeleTYpe/terminal output capture) demuxer in FFmpeg processes a niche format entirely unrelated to web content or browser media. Firefox's media pipeline does not call FFmpeg's TTY demuxer. This code path requires that FFmpeg's demuxer subsystem be invoked on TTY-format input, which cannot occur during the Synthetics Worker's browser-based test execution.","justification":"vulnerable_code_not_in_execute_path","last_updated":"2026-05-14T10:25:32.876436Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"not_affected","timestamp":"2026-05-14T10:25:32.876436Z","vulnerability":{"name":"CVE-2023-6602"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.876533Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.876532Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.876532Z","vulnerability":{"name":"CVE-2024-32230"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.876615Z","impact_statement":"Firefox has never supported JPEG 2000 image/video decoding (the format was only supported in Safari/WebKit). No web content served during Synthetics Worker test execution would cause Firefox to invoke FFmpeg's jpeg2000dec decoder.","justification":"vulnerable_code_not_in_execute_path","last_updated":"2026-05-14T10:25:32.876615Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"not_affected","timestamp":"2026-05-14T10:25:32.876615Z","vulnerability":{"name":"CVE-2025-22921"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.876752Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.876752Z","products":[{"@id":"pkg:deb/ubuntu/wget@1.21.4-1ubuntu4.1?arch=amd64\u0026distro=ubuntu-24.04"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.876752Z","vulnerability":{"name":"CVE-2021-31879"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.876838Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.876838Z","products":[{"@id":"pkg:deb/ubuntu/libgnutls30t64@3.8.3-1.1ubuntu3.4?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=gnutls28"}],"status":"affected","timestamp":"2026-05-14T10:25:32.876838Z","vulnerability":{"name":"CVE-2026-42010"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.877168Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.877168Z","products":[{"@id":"pkg:deb/ubuntu/libssl3t64@3.0.13-0ubuntu3.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=openssl"},{"@id":"pkg:deb/ubuntu/openssl@3.0.13-0ubuntu3.5?arch=amd64\u0026distro=ubuntu-24.04"}],"status":"affected","timestamp":"2026-05-14T10:25:32.877167Z","vulnerability":{"name":"CVE-2025-27587"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.877362Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.877362Z","products":[{"@id":"pkg:deb/ubuntu/tar@1.35%2Bdfsg-3build1?arch=amd64\u0026distro=ubuntu-24.04"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.877362Z","vulnerability":{"name":"CVE-2025-45582"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.877452Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.877452Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.877452Z","vulnerability":{"name":"CVE-2024-7055"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.877526Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.877526Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.877526Z","vulnerability":{"name":"CVE-2025-0518"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.87783Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.87783Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.87783Z","vulnerability":{"name":"CVE-2025-1594"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.87802Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.87802Z","products":[{"@id":"pkg:npm/basic-ftp@5.0.3"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.87802Z","vulnerability":{"name":"CVE-2026-44240"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.87814Z","impact_statement":"XBIN (eXtended BINary) is a text-art/ANSI art container format with no presence in web content. No web browser invokes FFmpeg's XBIN demuxer during normal browsing. The Synthetics Worker processes HTML pages and web assets through the browser runtime; it does not call FFmpeg's format detection or demuxing stack on any content. This attack vector (feeding arbitrary data to FFmpeg's demuxer) cannot be exercised in this deployment.","justification":"vulnerable_code_not_in_execute_path","last_updated":"2026-05-14T10:25:32.87814Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"not_affected","timestamp":"2026-05-14T10:25:32.87814Z","vulnerability":{"name":"CVE-2023-6604"}},{"action_statement":"This vulnerability was fixed in: 1.63.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:19:48.895857Z","products":[{"@id":"pkg:generic/python@3.13.7"}],"status":"affected","timestamp":"2026-05-14T10:25:32.876805Z","vulnerability":{"name":"CVE-2025-12084"}},{"action_statement":"This vulnerability was fixed in: 1.63.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:19:48.895869Z","products":[{"@id":"pkg:npm/node-forge@1.3.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.877273Z","vulnerability":{"name":"CVE-2025-12816"}},{"action_statement":"This vulnerability was fixed in: 1.63.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:19:48.895879Z","products":[{"@id":"pkg:generic/python@3.13.7"}],"status":"affected","timestamp":"2026-05-14T10:25:32.877939Z","vulnerability":{"name":"CVE-2025-8291"}},{"action_statement":"This vulnerability was fixed in: 1.62.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:03:42.950891Z","products":[{"@id":"pkg:generic/haproxy@2.4.28"}],"status":"affected","timestamp":"2026-05-14T10:25:32.878274Z","vulnerability":{"name":"CVE-2024-49214"}},{"action_statement":"This vulnerability was fixed in: 1.60.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:44:05.31638Z","products":[{"@id":"pkg:deb/ubuntu/dpkg@1.22.6ubuntu6.1?arch=amd64\u0026distro=ubuntu-24.04"}],"status":"affected","timestamp":"2026-05-14T10:25:32.876916Z","vulnerability":{"name":"CVE-2025-6297"}},{"action_statement":"This vulnerability was fixed in: 1.59.2","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:35:39.67864Z","products":[{"@id":"pkg:deb/ubuntu/libcups2t64@2.4.7-1.2ubuntu7.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=cups"}],"status":"affected","timestamp":"2026-05-14T10:25:32.877306Z","vulnerability":{"name":"CVE-2025-58364"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.878386Z","impact_statement":"avformat_free_context() is an FFmpeg-specific API call used to release AVFormatContext objects in applications that directly use libavformat. Firefox does not call FFmpeg's avformat_free_context(), it manages its own media context lifecycle via its native Gecko media framework.","justification":"vulnerable_code_not_in_execute_path","last_updated":"2026-05-14T10:25:32.878386Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"not_affected","timestamp":"2026-05-14T10:25:32.878386Z","vulnerability":{"name":"CVE-2025-25473"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.878569Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.878569Z","products":[{"@id":"pkg:deb/ubuntu/libgssapi-krb5-2@1.20.1-6ubuntu2.6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=krb5"},{"@id":"pkg:deb/ubuntu/libk5crypto3@1.20.1-6ubuntu2.6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=krb5"},{"@id":"pkg:deb/ubuntu/libkrb5-3@1.20.1-6ubuntu2.6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=krb5"},{"@id":"pkg:deb/ubuntu/libkrb5support0@1.20.1-6ubuntu2.6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=krb5"}],"status":"affected","timestamp":"2026-05-14T10:25:32.878569Z","vulnerability":{"name":"CVE-2026-40355"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.878651Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.878651Z","products":[{"@id":"pkg:deb/ubuntu/libgssapi-krb5-2@1.20.1-6ubuntu2.6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=krb5"},{"@id":"pkg:deb/ubuntu/libk5crypto3@1.20.1-6ubuntu2.6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=krb5"},{"@id":"pkg:deb/ubuntu/libkrb5-3@1.20.1-6ubuntu2.6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=krb5"},{"@id":"pkg:deb/ubuntu/libkrb5support0@1.20.1-6ubuntu2.6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=krb5"}],"status":"affected","timestamp":"2026-05-14T10:25:32.878651Z","vulnerability":{"name":"CVE-2026-40356"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.879296Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.879296Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.879296Z","vulnerability":{"name":"CVE-2025-7700"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.87948Z","impact_statement":"Firefox implements MPEG-DASH adaptive streaming natively through its Gecko media engine and does not delegate DASH playlist fetching or parsing to FFmpeg's libavformat DASH demuxer. The SSRF in this CVE requires that FFmpeg actively fetch URLs specified in a DASH manifest this requires FFmpeg to be directly invoked with network I/O enabled on untrusted input, which never occurs in this deployment","justification":"vulnerable_code_not_in_execute_path","last_updated":"2026-05-14T10:25:32.87948Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"not_affected","timestamp":"2026-05-14T10:25:32.87948Z","vulnerability":{"name":"CVE-2023-6605"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.879592Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.879592Z","products":[{"@id":"pkg:deb/ubuntu/libzvbi0t64@0.2.42-2?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=zvbi"},{"@id":"pkg:deb/ubuntu/libzvbi-common@0.2.42-2?arch=all\u0026distro=ubuntu-24.04\u0026upstream=zvbi"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.879591Z","vulnerability":{"name":"CVE-2025-2175"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.879821Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.879821Z","products":[{"@id":"pkg:deb/ubuntu/libgnutls30t64@3.8.3-1.1ubuntu3.4?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=gnutls28"}],"status":"affected","timestamp":"2026-05-14T10:25:32.879821Z","vulnerability":{"name":"CVE-2026-3833"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.879853Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.879852Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.879852Z","vulnerability":{"name":"CVE-2025-63757"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.880239Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.880239Z","products":[{"@id":"pkg:deb/ubuntu/libcups2t64@2.4.7-1.2ubuntu7.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=cups"}],"status":"affected","timestamp":"2026-05-14T10:25:32.880239Z","vulnerability":{"name":"CVE-2026-34978"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.880303Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.880303Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.880303Z","vulnerability":{"name":"CVE-2026-39820"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.880571Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.880571Z","products":[{"@id":"pkg:deb/ubuntu/libexpat1@2.6.1-2ubuntu0.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=expat"}],"status":"affected","timestamp":"2026-05-14T10:25:32.88057Z","vulnerability":{"name":"CVE-2025-59375"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.880604Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.880604Z","products":[{"@id":"pkg:deb/ubuntu/coreutils@9.4-3ubuntu6.1?arch=amd64\u0026distro=ubuntu-24.04"}],"status":"affected","timestamp":"2026-05-14T10:25:32.880604Z","vulnerability":{"name":"CVE-2025-5278"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.880636Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.880636Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.880636Z","vulnerability":{"name":"CVE-2025-22919"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.880749Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.880749Z","products":[{"@id":"pkg:deb/ubuntu/libgnutls30t64@3.8.3-1.1ubuntu3.4?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=gnutls28"}],"status":"affected","timestamp":"2026-05-14T10:25:32.880749Z","vulnerability":{"name":"CVE-2026-33846"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.880788Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.880788Z","products":[{"@id":"pkg:deb/ubuntu/libzvbi0t64@0.2.42-2?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=zvbi"},{"@id":"pkg:deb/ubuntu/libzvbi-common@0.2.42-2?arch=all\u0026distro=ubuntu-24.04\u0026upstream=zvbi"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.880788Z","vulnerability":{"name":"CVE-2025-2177"}},{"action_statement":"This vulnerability was fixed in: 1.64.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:25:35.222997Z","products":[{"@id":"pkg:deb/ubuntu/libglib2.0-0t64@2.80.0-6ubuntu3.4?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=glib2.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.879419Z","vulnerability":{"name":"CVE-2025-14512"}},{"action_statement":"This vulnerability was fixed in: 1.64.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:25:35.223004Z","products":[{"@id":"pkg:deb/ubuntu/libglib2.0-0t64@2.80.0-6ubuntu3.4?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=glib2.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.879452Z","vulnerability":{"name":"CVE-2025-14087"}},{"action_statement":"This vulnerability was fixed in: 1.64.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:25:35.22303Z","products":[{"@id":"pkg:deb/ubuntu/libtasn1-6@4.19.0-3ubuntu0.24.04.1?arch=amd64\u0026distro=ubuntu-24.04"}],"status":"affected","timestamp":"2026-05-14T10:25:32.880444Z","vulnerability":{"name":"CVE-2025-13151"}},{"action_statement":"This vulnerability was fixed in: 1.63.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:19:48.895894Z","products":[{"@id":"pkg:npm/node-forge@1.3.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.879558Z","vulnerability":{"name":"CVE-2025-66031"}},{"action_statement":"This vulnerability was fixed in: 1.63.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:19:48.895908Z","products":[{"@id":"pkg:npm/node-forge@1.3.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.880203Z","vulnerability":{"name":"CVE-2025-66030"}},{"action_statement":"This vulnerability was fixed in: 1.63.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:19:48.895919Z","products":[{"@id":"pkg:deb/ubuntu/libpng16-16t64@1.6.43-5build1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=libpng1.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.880516Z","vulnerability":{"name":"CVE-2025-64720"}},{"action_statement":"This vulnerability was fixed in: 1.62.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:03:42.950915Z","products":[{"@id":"pkg:npm/tmp@0.2.1"},{"@id":"pkg:npm/tmp@0.2.3"}],"status":"affected","timestamp":"2026-05-14T10:25:32.880029Z","vulnerability":{"name":"CVE-2025-54798"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.88116Z","impact_statement":"The ffmpeg-related packages identified in the scan are transitive dependencies introduced through the browser components used by the Synthetics worker. They are not directly invoked by Datadog application code, but are installed as part of the underlying operating system and Chrome dependencies required for browser-based test execution.","justification":"vulnerable_code_not_in_execute_path","last_updated":"2026-05-14T10:25:32.88116Z","products":[{"@id":"pkg:deb/ubuntu/libelf1t64@0.190-1.1ubuntu0.1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=elfutils"}],"status":"not_affected","timestamp":"2026-05-14T10:25:32.88116Z","vulnerability":{"name":"CVE-2025-1352"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.881211Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.881211Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"affected","timestamp":"2026-05-14T10:25:32.881211Z","vulnerability":{"name":"CVE-2026-6385"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.881357Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.881357Z","products":[{"@id":"pkg:deb/ubuntu/libc6@2.39-0ubuntu8.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=glibc"},{"@id":"pkg:deb/ubuntu/libc-bin@2.39-0ubuntu8.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=glibc"},{"@id":"pkg:deb/ubuntu/locales@2.39-0ubuntu8.5?arch=all\u0026distro=ubuntu-24.04\u0026upstream=glibc"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.881357Z","vulnerability":{"name":"CVE-2026-4437"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.881759Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.881759Z","products":[{"@id":"pkg:deb/ubuntu/libc6@2.39-0ubuntu8.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=glibc"},{"@id":"pkg:deb/ubuntu/libc-bin@2.39-0ubuntu8.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=glibc"},{"@id":"pkg:deb/ubuntu/locales@2.39-0ubuntu8.5?arch=all\u0026distro=ubuntu-24.04\u0026upstream=glibc"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.881759Z","vulnerability":{"name":"CVE-2026-4046"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.882025Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.882025Z","products":[{"@id":"pkg:deb/ubuntu/libopenjp2-7@2.5.0-2ubuntu0.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=openjpeg2"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.882025Z","vulnerability":{"name":"CVE-2023-39329"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.882133Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.882133Z","products":[{"@id":"pkg:deb/ubuntu/libexpat1@2.6.1-2ubuntu0.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=expat"}],"status":"affected","timestamp":"2026-05-14T10:25:32.882132Z","vulnerability":{"name":"CVE-2026-4739"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.882376Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.882376Z","products":[{"@id":"pkg:deb/ubuntu/libpixman-1-0@0.42.2-1build1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=pixman"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.882376Z","vulnerability":{"name":"CVE-2023-37769"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.882405Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.882405Z","products":[{"@id":"pkg:deb/ubuntu/libcups2t64@2.4.7-1.2ubuntu7.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=cups"}],"status":"affected","timestamp":"2026-05-14T10:25:32.882405Z","vulnerability":{"name":"CVE-2026-34979"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.882457Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.882457Z","products":[{"@id":"pkg:npm/ip-address@5.9.4"},{"@id":"pkg:npm/ip-address@9.0.5"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.882457Z","vulnerability":{"name":"CVE-2026-42338"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.882683Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.882683Z","products":[{"@id":"pkg:deb/ubuntu/libpng16-16t64@1.6.43-5build1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=libpng1.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.882683Z","vulnerability":{"name":"CVE-2026-33416"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.882851Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.882851Z","products":[{"@id":"pkg:deb/ubuntu/libpng16-16t64@1.6.43-5build1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=libpng1.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.882851Z","vulnerability":{"name":"CVE-2026-33636"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.882885Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.882885Z","products":[{"@id":"pkg:deb/ubuntu/libharfbuzz0b@8.3.0-2build2?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=harfbuzz"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.882885Z","vulnerability":{"name":"CVE-2026-22693"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.882957Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.882957Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"affected","timestamp":"2026-05-14T10:25:32.882957Z","vulnerability":{"name":"CVE-2026-30999"}},{"action_statement":"This vulnerability was fixed in: 1.63.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:19:48.895934Z","products":[{"@id":"pkg:deb/ubuntu/libpng16-16t64@1.6.43-5build1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=libpng1.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.881673Z","vulnerability":{"name":"CVE-2025-65018"}},{"action_statement":"This vulnerability was fixed in: 1.62.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:03:42.950949Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.882101Z","vulnerability":{"name":"CVE-2025-61725"}},{"action_statement":"This vulnerability was fixed in: 1.62.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:03:42.950958Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.882278Z","vulnerability":{"name":"CVE-2025-61723"}},{"action_statement":"This vulnerability was fixed in: 1.61.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:54:52.064525Z","products":[{"@id":"pkg:generic/openssl@3.0.16"}],"status":"affected","timestamp":"2026-05-14T10:25:32.882305Z","vulnerability":{"name":"CVE-2025-9232"}},{"action_statement":"This vulnerability was fixed in: 1.61.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:54:52.064544Z","products":[{"@id":"pkg:deb/ubuntu/libssl3t64@3.0.13-0ubuntu3.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=openssl"},{"@id":"pkg:deb/ubuntu/openssl@3.0.13-0ubuntu3.5?arch=amd64\u0026distro=ubuntu-24.04"},{"@id":"pkg:generic/openssl@3.0.16"}],"status":"affected","timestamp":"2026-05-14T10:25:32.882631Z","vulnerability":{"name":"CVE-2025-9230"}},{"action_statement":"This vulnerability was fixed in: 1.60.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:44:05.31682Z","products":[{"@id":"pkg:deb/ubuntu/libtiff6@4.5.1%2Bgit230720-4ubuntu2.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=tiff"}],"status":"affected","timestamp":"2026-05-14T10:25:32.882253Z","vulnerability":{"name":"CVE-2025-9900"}},{"action_statement":"This vulnerability was fixed in: 1.60.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:44:05.316844Z","products":[{"@id":"pkg:deb/ubuntu/libsqlite3-0@3.45.1-1ubuntu2.4?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=sqlite3"}],"status":"affected","timestamp":"2026-05-14T10:25:32.882802Z","vulnerability":{"name":"CVE-2025-7709"}},{"action_statement":"This vulnerability was fixed in: 1.59.2","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:35:39.678757Z","products":[{"@id":"pkg:deb/ubuntu/libcups2t64@2.4.7-1.2ubuntu7.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=cups"}],"status":"affected","timestamp":"2026-05-14T10:25:32.883046Z","vulnerability":{"name":"CVE-2025-58060"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.888935Z","impact_statement":"Firefox implements HLS (HTTP Live Streaming) via its own native Gecko media pipeline and does not route HLS stream parsing through FFmpeg's HLS demuxer. The libavcodec-extra package is installed as a system codec library but Firefox does not invoke libavformat's HLS demuxer module. Application code has no direct FFmpeg API calls. The extension-bypass attack requires that FFmpeg's demuxer be invoked directly on attacker-controlled input, a condition that cannot be met in this deployment.","justification":"vulnerable_code_not_in_execute_path","last_updated":"2026-05-14T10:25:32.888923Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"not_affected","timestamp":"2026-05-14T10:25:32.888923Z","vulnerability":{"name":"CVE-2023-6601"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.889056Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.889056Z","products":[{"@id":"pkg:npm/fast-xml-parser@4.4.1"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.889056Z","vulnerability":{"name":"CVE-2026-33036"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.889145Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.889145Z","products":[{"@id":"pkg:npm/fast-xml-parser@4.4.1"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.889145Z","vulnerability":{"name":"CVE-2026-41650"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.889724Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.889724Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.889724Z","vulnerability":{"name":"CVE-2026-33814"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.889867Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.889867Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.889867Z","vulnerability":{"name":"CVE-2024-36618"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.890165Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.890165Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.890165Z","vulnerability":{"name":"CVE-2024-36619"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.890251Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.890251Z","products":[{"@id":"pkg:deb/ubuntu/libgnutls30t64@3.8.3-1.1ubuntu3.4?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=gnutls28"}],"status":"affected","timestamp":"2026-05-14T10:25:32.890251Z","vulnerability":{"name":"CVE-2026-3832"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.890288Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.890288Z","products":[{"@id":"pkg:deb/ubuntu/liblzma5@5.6.1%2Breally5.4.5-1ubuntu0.2?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=xz-utils"},{"@id":"pkg:deb/ubuntu/xz-utils@5.6.1%2Breally5.4.5-1ubuntu0.2?arch=amd64\u0026distro=ubuntu-24.04"}],"status":"affected","timestamp":"2026-05-14T10:25:32.890288Z","vulnerability":{"name":"CVE-2026-34743"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.890523Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.890523Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.890522Z","vulnerability":{"name":"CVE-2026-39836"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.890823Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.890823Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.890823Z","vulnerability":{"name":"CVE-2023-49501"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.890929Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.890929Z","products":[{"@id":"pkg:deb/ubuntu/libexpat1@2.6.1-2ubuntu0.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=expat"}],"status":"affected","timestamp":"2026-05-14T10:25:32.890929Z","vulnerability":{"name":"CVE-2026-41080"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.891008Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.891008Z","products":[{"@id":"pkg:deb/ubuntu/mtr-tiny@0.95-1.1ubuntu0.1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=mtr"}],"status":"affected","timestamp":"2026-05-14T10:25:32.891008Z","vulnerability":{"name":"CVE-2025-49809"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.891076Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.891076Z","products":[{"@id":"pkg:deb/ubuntu/tar@1.35%2Bdfsg-3build1?arch=amd64\u0026distro=ubuntu-24.04"}],"status":"affected","timestamp":"2026-05-14T10:25:32.891076Z","vulnerability":{"name":"CVE-2026-5704"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.891426Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.891425Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.891425Z","vulnerability":{"name":"CVE-2024-36613"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.891513Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.891513Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.891513Z","vulnerability":{"name":"CVE-2023-50008"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.891617Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.891617Z","products":[{"@id":"pkg:deb/ubuntu/libc6@2.39-0ubuntu8.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=glibc"},{"@id":"pkg:deb/ubuntu/libc-bin@2.39-0ubuntu8.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=glibc"},{"@id":"pkg:deb/ubuntu/locales@2.39-0ubuntu8.5?arch=all\u0026distro=ubuntu-24.04\u0026upstream=glibc"}],"status":"affected","timestamp":"2026-05-14T10:25:32.891617Z","vulnerability":{"name":"CVE-2016-20013"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.891687Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.891687Z","products":[{"@id":"pkg:deb/ubuntu/libjxl0.7@0.7.0-10.2ubuntu6.1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=jpeg-xl"}],"status":"affected","timestamp":"2026-05-14T10:25:32.891686Z","vulnerability":{"name":"CVE-2021-36691"}},{"action_statement":"This vulnerability was fixed in: 1.64.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:25:35.223167Z","products":[{"@id":"pkg:deb/ubuntu/gpgv@2.4.4-2ubuntu17.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=gnupg2"}],"status":"affected","timestamp":"2026-05-14T10:25:32.890726Z","vulnerability":{"name":"CVE-2025-68973"}},{"action_statement":"This vulnerability was fixed in: 1.62.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:03:42.951039Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.889541Z","vulnerability":{"name":"CVE-2025-58186"}},{"action_statement":"This vulnerability was fixed in: 1.62.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:03:42.951045Z","products":[{"@id":"pkg:npm/glob@10.4.5"}],"status":"affected","timestamp":"2026-05-14T10:25:32.889632Z","vulnerability":{"name":"CVE-2025-64756"}},{"action_statement":"This vulnerability was fixed in: 1.62.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:03:42.951097Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.891109Z","vulnerability":{"name":"CVE-2025-58185"}},{"action_statement":"This vulnerability was fixed in: 1.60.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:44:05.318289Z","products":[{"@id":"pkg:deb/ubuntu/libtiff6@4.5.1%2Bgit230720-4ubuntu2.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=tiff"}],"status":"affected","timestamp":"2026-05-14T10:25:32.89097Z","vulnerability":{"name":"CVE-2025-8961"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.893277Z","impact_statement":"The ffmpeg-related packages identified in the scan are transitive dependencies introduced through the browser components used by the Synthetics worker. They are not directly invoked by Datadog application code, but are installed as part of the underlying operating system and Chrome dependencies required for browser-based test execution.","justification":"vulnerable_code_not_in_execute_path","last_updated":"2026-05-14T10:25:32.893277Z","products":[{"@id":"pkg:deb/ubuntu/xdg-utils@1.1.3-4.1ubuntu3?arch=all\u0026distro=ubuntu-24.04"}],"status":"not_affected","timestamp":"2026-05-14T10:25:32.893277Z","vulnerability":{"name":"CVE-2022-4055"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.893462Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.893462Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.893461Z","vulnerability":{"name":"CVE-2026-33811"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.893587Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.893587Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.893587Z","vulnerability":{"name":"CVE-2023-49528"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.894126Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.894126Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.894126Z","vulnerability":{"name":"CVE-2024-31582"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.894469Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.894468Z","products":[{"@id":"pkg:deb/ubuntu/libcups2t64@2.4.7-1.2ubuntu7.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=cups"}],"status":"affected","timestamp":"2026-05-14T10:25:32.894468Z","vulnerability":{"name":"CVE-2026-34980"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.894549Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.894549Z","products":[{"@id":"pkg:deb/ubuntu/libpam-systemd@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=systemd"},{"@id":"pkg:deb/ubuntu/libsystemd0@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=systemd"},{"@id":"pkg:deb/ubuntu/libsystemd-shared@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=systemd"},{"@id":"pkg:deb/ubuntu/libudev1@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=systemd"},{"@id":"pkg:deb/ubuntu/systemd@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04"},{"@id":"pkg:deb/ubuntu/systemd-dev@255.4-1ubuntu8.10?arch=all\u0026distro=ubuntu-24.04\u0026upstream=systemd"},{"@id":"pkg:deb/ubuntu/systemd-sysv@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=systemd"}],"status":"affected","timestamp":"2026-05-14T10:25:32.894549Z","vulnerability":{"name":"CVE-2026-40227"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.894818Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.894818Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.894818Z","vulnerability":{"name":"CVE-2025-59733"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.894921Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.894921Z","products":[{"@id":"pkg:deb/ubuntu/libavahi-client3@0.8-13ubuntu6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=avahi"},{"@id":"pkg:deb/ubuntu/libavahi-common3@0.8-13ubuntu6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=avahi"},{"@id":"pkg:deb/ubuntu/libavahi-common-data@0.8-13ubuntu6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=avahi"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.894921Z","vulnerability":{"name":"CVE-2026-34933"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.895218Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.895218Z","products":[{"@id":"pkg:deb/ubuntu/libvpl2@2023.3.0-1build1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=onevpl"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.895218Z","vulnerability":{"name":"CVE-2023-48727"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.895677Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.895677Z","products":[{"@id":"pkg:deb/ubuntu/dpkg@1.22.6ubuntu6.1?arch=amd64\u0026distro=ubuntu-24.04"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.895676Z","vulnerability":{"name":"CVE-2026-2219"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.895909Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.895909Z","products":[{"@id":"pkg:deb/ubuntu/libicu74@74.2-1ubuntu3.1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=icu"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.895909Z","vulnerability":{"name":"CVE-2025-5222"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.895986Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.895986Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.895985Z","vulnerability":{"name":"CVE-2025-59732"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.896043Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.896043Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"affected","timestamp":"2026-05-14T10:25:32.896043Z","vulnerability":{"name":"CVE-2025-59734"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.896463Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.896463Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.896463Z","vulnerability":{"name":"CVE-2025-59728"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.896506Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.896506Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.896506Z","vulnerability":{"name":"CVE-2025-59731"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.896747Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.896747Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.896747Z","vulnerability":{"name":"CVE-2023-50007"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.896907Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.896907Z","products":[{"@id":"pkg:deb/ubuntu/libvpl2@2023.3.0-1build1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=onevpl"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.896907Z","vulnerability":{"name":"CVE-2023-22656"}},{"action_statement":"This vulnerability was fixed in: 1.63.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:19:48.896086Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.893507Z","vulnerability":{"name":"CVE-2025-61729"}},{"action_statement":"This vulnerability was fixed in: 1.63.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:19:48.896097Z","products":[{"@id":"pkg:generic/python@3.13.7"}],"status":"affected","timestamp":"2026-05-14T10:25:32.89383Z","vulnerability":{"name":"CVE-2025-6075"}},{"action_statement":"This vulnerability was fixed in: 1.63.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:19:48.89613Z","products":[{"@id":"pkg:deb/ubuntu/libpng16-16t64@1.6.43-5build1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=libpng1.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.895481Z","vulnerability":{"name":"CVE-2025-64506"}},{"action_statement":"This vulnerability was fixed in: 1.62.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:03:42.95116Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.894335Z","vulnerability":{"name":"CVE-2025-47912"}},{"action_statement":"This vulnerability was fixed in: 1.62.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:03:42.951177Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.895174Z","vulnerability":{"name":"CVE-2025-61724"}},{"action_statement":"This vulnerability was fixed in: 1.60.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:44:05.318535Z","products":[{"@id":"pkg:deb/ubuntu/libtiff6@4.5.1%2Bgit230720-4ubuntu2.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=tiff"}],"status":"affected","timestamp":"2026-05-14T10:25:32.894046Z","vulnerability":{"name":"CVE-2025-9165"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.907536Z","impact_statement":"The ffmpeg-related packages identified in the scan are transitive dependencies introduced through the browser components used by the Synthetics worker. They are not directly invoked by Datadog application code, but are installed as part of the underlying operating system and Chrome dependencies required for browser-based test execution.","justification":"vulnerable_code_not_in_execute_path","last_updated":"2026-05-14T10:25:32.907536Z","products":[{"@id":"pkg:deb/ubuntu/libvo-amrwbenc0@0.1.3-2build1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=vo-amrwbenc"}],"status":"not_affected","timestamp":"2026-05-14T10:25:32.907536Z","vulnerability":{"name":"CVE-2019-2128"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.908876Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.908876Z","products":[{"@id":"pkg:deb/ubuntu/libvpl2@2023.3.0-1build1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=onevpl"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.908876Z","vulnerability":{"name":"CVE-2023-47282"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.91147Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.91147Z","products":[{"@id":"pkg:npm/%40tootallnate/once@2.0.0"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.91147Z","vulnerability":{"name":"CVE-2026-3449"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.911827Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.911827Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"affected","timestamp":"2026-05-14T10:25:32.911827Z","vulnerability":{"name":"CVE-2026-40962"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.911974Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.911974Z","products":[{"@id":"pkg:deb/ubuntu/libpam-systemd@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=systemd"},{"@id":"pkg:deb/ubuntu/libsystemd0@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=systemd"},{"@id":"pkg:deb/ubuntu/libsystemd-shared@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=systemd"},{"@id":"pkg:deb/ubuntu/libudev1@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=systemd"},{"@id":"pkg:deb/ubuntu/systemd@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04"},{"@id":"pkg:deb/ubuntu/systemd-dev@255.4-1ubuntu8.10?arch=all\u0026distro=ubuntu-24.04\u0026upstream=systemd"},{"@id":"pkg:deb/ubuntu/systemd-sysv@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=systemd"}],"status":"affected","timestamp":"2026-05-14T10:25:32.911974Z","vulnerability":{"name":"CVE-2026-40226"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.915642Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.915642Z","products":[{"@id":"pkg:deb/ubuntu/gpgv@2.4.4-2ubuntu17.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=gnupg2"}],"status":"affected","timestamp":"2026-05-14T10:25:32.915642Z","vulnerability":{"name":"CVE-2022-3219"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.915941Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.915941Z","products":[{"@id":"pkg:deb/ubuntu/libexpat1@2.6.1-2ubuntu0.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=expat"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.915941Z","vulnerability":{"name":"CVE-2025-66382"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.916053Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.916053Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.916052Z","vulnerability":{"name":"CVE-2026-39819"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.922347Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.922347Z","products":[{"@id":"pkg:deb/ubuntu/libgnutls30t64@3.8.3-1.1ubuntu3.4?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=gnutls28"}],"status":"affected","timestamp":"2026-05-14T10:25:32.922347Z","vulnerability":{"name":"CVE-2026-42014"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.922395Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.922395Z","products":[{"@id":"pkg:deb/ubuntu/libgnutls30t64@3.8.3-1.1ubuntu3.4?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=gnutls28"}],"status":"affected","timestamp":"2026-05-14T10:25:32.922395Z","vulnerability":{"name":"CVE-2026-42015"}},{"action_statement":"This vulnerability was fixed in: 1.64.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:25:35.223358Z","products":[{"@id":"pkg:deb/ubuntu/libglib2.0-0t64@2.80.0-6ubuntu3.4?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=glib2.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.909471Z","vulnerability":{"name":"CVE-2025-13601"}},{"action_statement":"This vulnerability was fixed in: 1.63.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:19:48.8963Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.915285Z","vulnerability":{"name":"CVE-2025-61727"}},{"action_statement":"This vulnerability was fixed in: 1.60.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:44:05.318873Z","products":[{"@id":"pkg:deb/ubuntu/libc6@2.39-0ubuntu8.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=glibc"},{"@id":"pkg:deb/ubuntu/libc-bin@2.39-0ubuntu8.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=glibc"},{"@id":"pkg:deb/ubuntu/locales@2.39-0ubuntu8.5?arch=all\u0026distro=ubuntu-24.04\u0026upstream=glibc"}],"status":"affected","timestamp":"2026-05-14T10:25:32.91167Z","vulnerability":{"name":"CVE-2025-8058"}},{"action_statement":"This vulnerability was fixed in: 1.60.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:44:05.319045Z","products":[{"@id":"pkg:deb/ubuntu/libtiff6@4.5.1%2Bgit230720-4ubuntu2.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=tiff"}],"status":"affected","timestamp":"2026-05-14T10:25:32.915784Z","vulnerability":{"name":"CVE-2025-61145"}},{"action_statement":"This vulnerability was fixed in: 1.59.2","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:35:39.679137Z","products":[{"@id":"pkg:deb/ubuntu/libxml2@2.9.14%2Bdfsg-1.3ubuntu3.4?arch=amd64\u0026distro=ubuntu-24.04"}],"status":"affected","timestamp":"2026-05-14T10:25:32.915891Z","vulnerability":{"name":"CVE-2025-9714"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.916424Z","impact_statement":"The Firequalizer is an advanced IIR-based audio equalization filter residing in FFmpeg's libavfilter module. Firefox does not use FFmpeg's filter graph (libavfilter) at any point during media playback or audio processing. The libavfilter library is separate from the codec libraries used by the OS and is not invoked by the browser runtime. This filter can only be triggered by explicitly constructing an FFmpeg filter chain, an operation absent from this deployment's execution paths.","justification":"vulnerable_code_not_in_execute_path","last_updated":"2026-05-14T10:25:32.916424Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"not_affected","timestamp":"2026-05-14T10:25:32.916424Z","vulnerability":{"name":"CVE-2025-10256"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.917792Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.917792Z","products":[{"@id":"pkg:deb/ubuntu/libncurses6@6.4%2B20240113-1ubuntu2?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ncurses"},{"@id":"pkg:deb/ubuntu/libncursesw6@6.4%2B20240113-1ubuntu2?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ncurses"},{"@id":"pkg:deb/ubuntu/libtinfo6@6.4%2B20240113-1ubuntu2?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ncurses"},{"@id":"pkg:deb/ubuntu/ncurses-base@6.4%2B20240113-1ubuntu2?arch=all\u0026distro=ubuntu-24.04\u0026upstream=ncurses"},{"@id":"pkg:deb/ubuntu/ncurses-bin@6.4%2B20240113-1ubuntu2?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ncurses"}],"status":"affected","timestamp":"2026-05-14T10:25:32.917792Z","vulnerability":{"name":"CVE-2025-69720"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.918344Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.918343Z","products":[{"@id":"pkg:deb/ubuntu/libelf1t64@0.190-1.1ubuntu0.1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=elfutils"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.918343Z","vulnerability":{"name":"CVE-2025-1376"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.91844Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.91844Z","products":[{"@id":"pkg:deb/ubuntu/zlib1g@1%3A1.3.dfsg-3.1ubuntu2.1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=zlib"}],"status":"affected","timestamp":"2026-05-14T10:25:32.91844Z","vulnerability":{"name":"CVE-2026-27171"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.918488Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.918487Z","products":[{"@id":"pkg:deb/ubuntu/libexpat1@2.6.1-2ubuntu0.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=expat"}],"status":"affected","timestamp":"2026-05-14T10:25:32.918487Z","vulnerability":{"name":"CVE-2026-32776"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.918535Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.918535Z","products":[{"@id":"pkg:deb/ubuntu/libexpat1@2.6.1-2ubuntu0.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=expat"}],"status":"affected","timestamp":"2026-05-14T10:25:32.918535Z","vulnerability":{"name":"CVE-2026-32778"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.919056Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.919056Z","products":[{"@id":"pkg:deb/ubuntu/libexpat1@2.6.1-2ubuntu0.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=expat"}],"status":"affected","timestamp":"2026-05-14T10:25:32.919056Z","vulnerability":{"name":"CVE-2026-32777"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.920142Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.920142Z","products":[{"@id":"pkg:deb/ubuntu/libexpat1@2.6.1-2ubuntu0.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=expat"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.920142Z","vulnerability":{"name":"CVE-2026-45186"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.920513Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.920512Z","products":[{"@id":"pkg:deb/ubuntu/libavcodec-extra60@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavcodec-extra@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libavutil58@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"},{"@id":"pkg:deb/ubuntu/libswresample4@7%3A6.1.1-3ubuntu5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=ffmpeg"}],"status":"affected","timestamp":"2026-05-14T10:25:32.920512Z","vulnerability":{"name":"CVE-2025-12343"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.920693Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.920693Z","products":[{"@id":"pkg:npm/protobufjs@7.4.0"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.920692Z","vulnerability":{"name":"CVE-2026-44289"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.921065Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.921065Z","products":[{"@id":"pkg:npm/protobufjs@7.4.0"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.921065Z","vulnerability":{"name":"CVE-2026-44290"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.921293Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.921293Z","products":[{"@id":"pkg:npm/protobufjs@7.4.0"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.921292Z","vulnerability":{"name":"CVE-2026-44291"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.921518Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.921518Z","products":[{"@id":"pkg:npm/protobufjs@7.4.0"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.921518Z","vulnerability":{"name":"CVE-2026-44293"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.921793Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.921792Z","products":[{"@id":"pkg:npm/%40protobufjs/utf8@1.1.0"},{"@id":"pkg:npm/protobufjs@7.4.0"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.921792Z","vulnerability":{"name":"CVE-2026-44288"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.921981Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.92198Z","products":[{"@id":"pkg:npm/follow-redirects@1.15.6"}],"status":"under_investigation","timestamp":"2026-05-14T10:25:32.92198Z","vulnerability":{"name":"GHSA-r4q5-vmmm-2653"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.922168Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.922168Z","products":[{"@id":"pkg:deb/ubuntu/libgnutls30t64@3.8.3-1.1ubuntu3.4?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=gnutls28"}],"status":"affected","timestamp":"2026-05-14T10:25:32.922167Z","vulnerability":{"name":"CVE-2026-42009"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.922239Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.922239Z","products":[{"@id":"pkg:deb/ubuntu/libgnutls30t64@3.8.3-1.1ubuntu3.4?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=gnutls28"}],"status":"affected","timestamp":"2026-05-14T10:25:32.922239Z","vulnerability":{"name":"CVE-2026-42012"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:25:32.922297Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:25:32.922297Z","products":[{"@id":"pkg:deb/ubuntu/libgnutls30t64@3.8.3-1.1ubuntu3.4?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=gnutls28"}],"status":"affected","timestamp":"2026-05-14T10:25:32.922297Z","vulnerability":{"name":"CVE-2026-42013"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.924538Z","products":[{"@id":"pkg:generic/python@3.13.7"}],"status":"affected","timestamp":"2026-05-14T10:25:32.920456Z","vulnerability":{"name":"CVE-2026-3479"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480453Z","products":[{"@id":"pkg:deb/ubuntu/libssl3t64@3.0.13-0ubuntu3.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=openssl"},{"@id":"pkg:deb/ubuntu/openssl@3.0.13-0ubuntu3.5?arch=amd64\u0026distro=ubuntu-24.04"},{"@id":"pkg:generic/openssl@3.0.16"}],"status":"affected","timestamp":"2026-05-14T10:25:32.877393Z","vulnerability":{"name":"CVE-2026-28389"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480458Z","products":[{"@id":"pkg:deb/ubuntu/libssl3t64@3.0.13-0ubuntu3.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=openssl"},{"@id":"pkg:deb/ubuntu/openssl@3.0.13-0ubuntu3.5?arch=amd64\u0026distro=ubuntu-24.04"},{"@id":"pkg:generic/openssl@3.0.16"}],"status":"affected","timestamp":"2026-05-14T10:25:32.877423Z","vulnerability":{"name":"CVE-2026-28390"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480481Z","products":[{"@id":"pkg:deb/ubuntu/libcurl4t64@8.5.0-2ubuntu10.6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=curl"}],"status":"affected","timestamp":"2026-05-14T10:25:32.888718Z","vulnerability":{"name":"CVE-2026-5545"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480491Z","products":[{"@id":"pkg:generic/node@22.17.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.890338Z","vulnerability":{"name":"CVE-2026-21717"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480495Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.890368Z","vulnerability":{"name":"CVE-2026-27143"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480501Z","products":[{"@id":"pkg:deb/ubuntu/libssl3t64@3.0.13-0ubuntu3.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=openssl"},{"@id":"pkg:deb/ubuntu/openssl@3.0.13-0ubuntu3.5?arch=amd64\u0026distro=ubuntu-24.04"},{"@id":"pkg:generic/openssl@3.0.16"}],"status":"affected","timestamp":"2026-05-14T10:25:32.883113Z","vulnerability":{"name":"CVE-2026-31790"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480521Z","products":[{"@id":"pkg:npm/lodash@4.17.21"}],"status":"affected","timestamp":"2026-05-14T10:25:32.892369Z","vulnerability":{"name":"CVE-2026-2950"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480505Z","products":[{"@id":"pkg:deb/ubuntu/libcurl4t64@8.5.0-2ubuntu10.6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=curl"}],"status":"affected","timestamp":"2026-05-14T10:25:32.890775Z","vulnerability":{"name":"CVE-2026-7168"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.48053Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.892464Z","vulnerability":{"name":"CVE-2026-32280"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480534Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.892528Z","vulnerability":{"name":"CVE-2026-32283"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480525Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.892427Z","vulnerability":{"name":"CVE-2026-32281"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480539Z","products":[{"@id":"pkg:deb/ubuntu/libssl3t64@3.0.13-0ubuntu3.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=openssl"},{"@id":"pkg:deb/ubuntu/openssl@3.0.13-0ubuntu3.5?arch=amd64\u0026distro=ubuntu-24.04"},{"@id":"pkg:generic/openssl@3.0.16"}],"status":"affected","timestamp":"2026-05-14T10:25:32.881598Z","vulnerability":{"name":"CVE-2026-28387"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480545Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.893733Z","vulnerability":{"name":"CVE-2026-27140"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480549Z","products":[{"@id":"pkg:deb/ubuntu/libnghttp2-14@1.59.0-1ubuntu0.2?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=nghttp2"}],"status":"affected","timestamp":"2026-05-14T10:25:32.893938Z","vulnerability":{"name":"CVE-2026-27135"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480558Z","products":[{"@id":"pkg:deb/ubuntu/libtiff6@4.5.1%2Bgit230720-4ubuntu2.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=tiff"}],"status":"affected","timestamp":"2026-05-14T10:25:32.89538Z","vulnerability":{"name":"CVE-2025-61144"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480595Z","products":[{"@id":"pkg:deb/ubuntu/libcurl4t64@8.5.0-2ubuntu10.6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=curl"}],"status":"affected","timestamp":"2026-05-14T10:25:32.900227Z","vulnerability":{"name":"CVE-2026-6253"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480563Z","products":[{"@id":"pkg:deb/ubuntu/libssl3t64@3.0.13-0ubuntu3.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=openssl"},{"@id":"pkg:deb/ubuntu/openssl@3.0.13-0ubuntu3.5?arch=amd64\u0026distro=ubuntu-24.04"},{"@id":"pkg:generic/openssl@3.0.16"}],"status":"affected","timestamp":"2026-05-14T10:25:32.883353Z","vulnerability":{"name":"CVE-2026-28388"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.172346Z","products":[{"@id":"pkg:deb/ubuntu/libssh-4@0.10.6-2ubuntu0.1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=libssh"}],"status":"affected","timestamp":"2026-05-14T10:25:32.92001Z","vulnerability":{"name":"CVE-2026-0965"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.172353Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.920201Z","vulnerability":{"name":"CVE-2026-27139"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.923773Z","products":[{"@id":"pkg:deb/ubuntu/libssl3t64@3.0.13-0ubuntu3.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=openssl"},{"@id":"pkg:deb/ubuntu/openssl@3.0.13-0ubuntu3.5?arch=amd64\u0026distro=ubuntu-24.04"},{"@id":"pkg:generic/openssl@3.0.16"}],"status":"affected","timestamp":"2026-05-14T10:25:32.873401Z","vulnerability":{"name":"CVE-2025-15467"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.923849Z","products":[{"@id":"pkg:deb/ubuntu/libssl3t64@3.0.13-0ubuntu3.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=openssl"},{"@id":"pkg:deb/ubuntu/openssl@3.0.13-0ubuntu3.5?arch=amd64\u0026distro=ubuntu-24.04"},{"@id":"pkg:generic/openssl@3.0.16"}],"status":"affected","timestamp":"2026-05-14T10:25:32.873567Z","vulnerability":{"name":"CVE-2025-69420"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.923862Z","products":[{"@id":"pkg:generic/python@3.13.7"}],"status":"affected","timestamp":"2026-05-14T10:25:32.87495Z","vulnerability":{"name":"CVE-2026-6100"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.923874Z","products":[{"@id":"pkg:generic/python@3.13.7"}],"status":"affected","timestamp":"2026-05-14T10:25:32.876241Z","vulnerability":{"name":"CVE-2026-0672"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.923884Z","products":[{"@id":"pkg:generic/python@3.13.7"}],"status":"affected","timestamp":"2026-05-14T10:25:32.876983Z","vulnerability":{"name":"CVE-2026-0865"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.923896Z","products":[{"@id":"pkg:deb/ubuntu/libssl3t64@3.0.13-0ubuntu3.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=openssl"},{"@id":"pkg:deb/ubuntu/openssl@3.0.13-0ubuntu3.5?arch=amd64\u0026distro=ubuntu-24.04"},{"@id":"pkg:generic/openssl@3.0.16"}],"status":"affected","timestamp":"2026-05-14T10:25:32.875156Z","vulnerability":{"name":"CVE-2026-22796"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.923903Z","products":[{"@id":"pkg:deb/ubuntu/libpng16-16t64@1.6.43-5build1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=libpng1.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.877113Z","vulnerability":{"name":"CVE-2025-66293"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.923912Z","products":[{"@id":"pkg:generic/node@22.17.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.878073Z","vulnerability":{"name":"CVE-2025-59465"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.923921Z","products":[{"@id":"pkg:generic/python@3.13.7"}],"status":"affected","timestamp":"2026-05-14T10:25:32.878362Z","vulnerability":{"name":"CVE-2026-3298"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.923933Z","products":[{"@id":"pkg:generic/python@3.13.7"}],"status":"affected","timestamp":"2026-05-14T10:25:32.879691Z","vulnerability":{"name":"CVE-2025-15366"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.923943Z","products":[{"@id":"pkg:generic/python@3.13.7"}],"status":"affected","timestamp":"2026-05-14T10:25:32.879785Z","vulnerability":{"name":"CVE-2025-15367"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.923952Z","products":[{"@id":"pkg:generic/python@3.13.7"}],"status":"affected","timestamp":"2026-05-14T10:25:32.880488Z","vulnerability":{"name":"CVE-2026-1502"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.923961Z","products":[{"@id":"pkg:deb/ubuntu/libglib2.0-0t64@2.80.0-6ubuntu3.4?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=glib2.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.881138Z","vulnerability":{"name":"CVE-2026-0988"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.92397Z","products":[{"@id":"pkg:deb/ubuntu/libc6@2.39-0ubuntu8.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=glibc"},{"@id":"pkg:deb/ubuntu/libc-bin@2.39-0ubuntu8.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=glibc"},{"@id":"pkg:deb/ubuntu/locales@2.39-0ubuntu8.5?arch=all\u0026distro=ubuntu-24.04\u0026upstream=glibc"}],"status":"affected","timestamp":"2026-05-14T10:25:32.881291Z","vulnerability":{"name":"CVE-2025-15281"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.923983Z","products":[{"@id":"pkg:generic/node@22.17.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.881854Z","vulnerability":{"name":"CVE-2026-21637"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.923996Z","products":[{"@id":"pkg:deb/ubuntu/libxml2@2.9.14%2Bdfsg-1.3ubuntu3.4?arch=amd64\u0026distro=ubuntu-24.04"}],"status":"affected","timestamp":"2026-05-14T10:25:32.881975Z","vulnerability":{"name":"CVE-2026-0990"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.924013Z","products":[{"@id":"pkg:deb/ubuntu/libssl3t64@3.0.13-0ubuntu3.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=openssl"},{"@id":"pkg:deb/ubuntu/openssl@3.0.13-0ubuntu3.5?arch=amd64\u0026distro=ubuntu-24.04"},{"@id":"pkg:generic/openssl@3.0.16"}],"status":"affected","timestamp":"2026-05-14T10:25:32.877335Z","vulnerability":{"name":"CVE-2025-69419"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.924022Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.883325Z","vulnerability":{"name":"CVE-2025-61726"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.924029Z","products":[{"@id":"pkg:generic/python@3.13.7"}],"status":"affected","timestamp":"2026-05-14T10:25:32.883538Z","vulnerability":{"name":"CVE-2026-7210"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.924037Z","products":[{"@id":"pkg:generic/node@22.17.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.885113Z","vulnerability":{"name":"CVE-2025-55131"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.924045Z","products":[{"@id":"pkg:generic/python@3.13.7"}],"status":"affected","timestamp":"2026-05-14T10:25:32.886299Z","vulnerability":{"name":"CVE-2025-15282"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.924049Z","products":[{"@id":"pkg:generic/python@3.13.7"}],"status":"affected","timestamp":"2026-05-14T10:25:32.886566Z","vulnerability":{"name":"CVE-2026-1299"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.924055Z","products":[{"@id":"pkg:deb/ubuntu/libssl3t64@3.0.13-0ubuntu3.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=openssl"},{"@id":"pkg:deb/ubuntu/openssl@3.0.13-0ubuntu3.5?arch=amd64\u0026distro=ubuntu-24.04"},{"@id":"pkg:generic/openssl@3.0.16"}],"status":"affected","timestamp":"2026-05-14T10:25:32.877606Z","vulnerability":{"name":"CVE-2025-69421"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.924062Z","products":[{"@id":"pkg:generic/python@3.13.7"}],"status":"affected","timestamp":"2026-05-14T10:25:32.886936Z","vulnerability":{"name":"CVE-2026-3644"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.924084Z","products":[{"@id":"pkg:generic/python@3.13.7"}],"status":"affected","timestamp":"2026-05-14T10:25:32.88878Z","vulnerability":{"name":"CVE-2025-11468"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.92409Z","products":[{"@id":"pkg:generic/node@22.17.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.888827Z","vulnerability":{"name":"CVE-2025-59466"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.9241Z","products":[{"@id":"pkg:generic/python@3.13.7"}],"status":"affected","timestamp":"2026-05-14T10:25:32.889441Z","vulnerability":{"name":"CVE-2026-4224"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.924117Z","products":[{"@id":"pkg:npm/tar@6.2.1"}],"status":"affected","timestamp":"2026-05-14T10:25:32.890445Z","vulnerability":{"name":"CVE-2026-24842"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.924138Z","products":[{"@id":"pkg:generic/python@3.13.7"}],"status":"affected","timestamp":"2026-05-14T10:25:32.891295Z","vulnerability":{"name":"CVE-2026-3446"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.924143Z","products":[{"@id":"pkg:generic/python@3.13.7"}],"status":"affected","timestamp":"2026-05-14T10:25:32.891388Z","vulnerability":{"name":"CVE-2026-6019"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.924161Z","products":[{"@id":"pkg:generic/python@3.13.7"}],"status":"affected","timestamp":"2026-05-14T10:25:32.89221Z","vulnerability":{"name":"CVE-2026-4786"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.924175Z","products":[{"@id":"pkg:generic/node@22.17.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.893409Z","vulnerability":{"name":"CVE-2025-55130"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.924196Z","products":[{"@id":"pkg:generic/python@3.13.7"}],"status":"affected","timestamp":"2026-05-14T10:25:32.894383Z","vulnerability":{"name":"CVE-2026-2297"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.924209Z","products":[{"@id":"pkg:deb/ubuntu/libxml2@2.9.14%2Bdfsg-1.3ubuntu3.4?arch=amd64\u0026distro=ubuntu-24.04"}],"status":"affected","timestamp":"2026-05-14T10:25:32.895042Z","vulnerability":{"name":"CVE-2026-0992"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.924321Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.903569Z","vulnerability":{"name":"CVE-2025-61731"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.924331Z","products":[{"@id":"pkg:deb/ubuntu/libssl3t64@3.0.13-0ubuntu3.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=openssl"},{"@id":"pkg:deb/ubuntu/openssl@3.0.13-0ubuntu3.5?arch=amd64\u0026distro=ubuntu-24.04"},{"@id":"pkg:generic/openssl@3.0.16"}],"status":"affected","timestamp":"2026-05-14T10:25:32.893772Z","vulnerability":{"name":"CVE-2025-68160"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.92423Z","products":[{"@id":"pkg:deb/ubuntu/libxml2@2.9.14%2Bdfsg-1.3ubuntu3.4?arch=amd64\u0026distro=ubuntu-24.04"}],"status":"affected","timestamp":"2026-05-14T10:25:32.895347Z","vulnerability":{"name":"CVE-2026-0989"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.924251Z","products":[{"@id":"pkg:pypi/wheel@0.45.1"}],"status":"affected","timestamp":"2026-05-14T10:25:32.896861Z","vulnerability":{"name":"CVE-2026-24049"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.924263Z","products":[{"@id":"pkg:deb/ubuntu/libpng16-16t64@1.6.43-5build1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=libpng1.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.898116Z","vulnerability":{"name":"CVE-2026-22801"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.924268Z","products":[{"@id":"pkg:deb/ubuntu/libpng16-16t64@1.6.43-5build1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=libpng1.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.898199Z","vulnerability":{"name":"CVE-2025-28162"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.924274Z","products":[{"@id":"pkg:deb/ubuntu/libpng16-16t64@1.6.43-5build1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=libpng1.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.898245Z","vulnerability":{"name":"CVE-2025-28164"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.924285Z","products":[{"@id":"pkg:deb/ubuntu/libxml2@2.9.14%2Bdfsg-1.3ubuntu3.4?arch=amd64\u0026distro=ubuntu-24.04"}],"status":"affected","timestamp":"2026-05-14T10:25:32.898331Z","vulnerability":{"name":"CVE-2025-8732"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.924302Z","products":[{"@id":"pkg:deb/ubuntu/libavahi-client3@0.8-13ubuntu6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=avahi"},{"@id":"pkg:deb/ubuntu/libavahi-common3@0.8-13ubuntu6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=avahi"},{"@id":"pkg:deb/ubuntu/libavahi-common-data@0.8-13ubuntu6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=avahi"}],"status":"affected","timestamp":"2026-05-14T10:25:32.899076Z","vulnerability":{"name":"CVE-2025-68471"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.924343Z","products":[{"@id":"pkg:deb/ubuntu/libavahi-client3@0.8-13ubuntu6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=avahi"},{"@id":"pkg:deb/ubuntu/libavahi-common3@0.8-13ubuntu6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=avahi"},{"@id":"pkg:deb/ubuntu/libavahi-common-data@0.8-13ubuntu6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=avahi"}],"status":"affected","timestamp":"2026-05-14T10:25:32.906204Z","vulnerability":{"name":"CVE-2025-68468"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.924357Z","products":[{"@id":"pkg:npm/tar@6.2.1"}],"status":"affected","timestamp":"2026-05-14T10:25:32.907434Z","vulnerability":{"name":"CVE-2026-23950"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.924376Z","products":[{"@id":"pkg:deb/ubuntu/libssl3t64@3.0.13-0ubuntu3.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=openssl"},{"@id":"pkg:deb/ubuntu/openssl@3.0.13-0ubuntu3.5?arch=amd64\u0026distro=ubuntu-24.04"},{"@id":"pkg:generic/openssl@3.0.16"}],"status":"affected","timestamp":"2026-05-14T10:25:32.895845Z","vulnerability":{"name":"CVE-2026-22795"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.924383Z","products":[{"@id":"pkg:npm/tar@6.2.1"}],"status":"affected","timestamp":"2026-05-14T10:25:32.909543Z","vulnerability":{"name":"CVE-2026-23745"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.924393Z","products":[{"@id":"pkg:deb/ubuntu/libc6@2.39-0ubuntu8.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=glibc"},{"@id":"pkg:deb/ubuntu/libc-bin@2.39-0ubuntu8.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=glibc"},{"@id":"pkg:deb/ubuntu/locales@2.39-0ubuntu8.5?arch=all\u0026distro=ubuntu-24.04\u0026upstream=glibc"}],"status":"affected","timestamp":"2026-05-14T10:25:32.911525Z","vulnerability":{"name":"CVE-2026-0861"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.924404Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.915026Z","vulnerability":{"name":"CVE-2025-61730"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.92441Z","products":[{"@id":"pkg:generic/node@22.17.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.915488Z","vulnerability":{"name":"CVE-2025-55132"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.924445Z","products":[{"@id":"pkg:generic/python@3.13.7"}],"status":"affected","timestamp":"2026-05-14T10:25:32.916005Z","vulnerability":{"name":"CVE-2026-4519"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.924462Z","products":[{"@id":"pkg:deb/ubuntu/libavahi-client3@0.8-13ubuntu6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=avahi"},{"@id":"pkg:deb/ubuntu/libavahi-common3@0.8-13ubuntu6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=avahi"},{"@id":"pkg:deb/ubuntu/libavahi-common-data@0.8-13ubuntu6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=avahi"}],"status":"affected","timestamp":"2026-05-14T10:25:32.918148Z","vulnerability":{"name":"CVE-2025-68276"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.924468Z","products":[{"@id":"pkg:generic/python@3.13.7"}],"status":"affected","timestamp":"2026-05-14T10:25:32.918285Z","vulnerability":{"name":"CVE-2025-13462"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.924484Z","products":[{"@id":"pkg:deb/ubuntu/libssl3t64@3.0.13-0ubuntu3.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=openssl"},{"@id":"pkg:deb/ubuntu/openssl@3.0.13-0ubuntu3.5?arch=amd64\u0026distro=ubuntu-24.04"},{"@id":"pkg:generic/openssl@3.0.16"}],"status":"affected","timestamp":"2026-05-14T10:25:32.916109Z","vulnerability":{"name":"CVE-2025-69418"}},{"action_statement":"This vulnerability was fixed in: 1.64.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:25:35.223202Z","products":[{"@id":"pkg:deb/ubuntu/libglib2.0-0t64@2.80.0-6ubuntu3.4?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=glib2.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.89216Z","vulnerability":{"name":"CVE-2025-7039"}},{"action_statement":"This vulnerability was fixed in: 1.63.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:19:48.896053Z","products":[{"@id":"pkg:deb/ubuntu/libcups2t64@2.4.7-1.2ubuntu7.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=cups"}],"status":"affected","timestamp":"2026-05-14T10:25:32.892282Z","vulnerability":{"name":"CVE-2025-58436"}},{"action_statement":"This vulnerability was fixed in: 1.63.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:19:48.89641Z","products":[{"@id":"pkg:npm/aws-sdk@2.1370.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.922808Z","vulnerability":{"name":"GHSA-j965-2qgj-vjmq"}},{"action_statement":"This vulnerability was fixed in: 1.62.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:03:42.951261Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.899782Z","vulnerability":{"name":"CVE-2025-58189"}},{"action_statement":"This vulnerability was fixed in: 1.62.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:03:42.951273Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.900691Z","vulnerability":{"name":"CVE-2025-58183"}},{"action_statement":"This vulnerability was fixed in: 1.62.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:03:42.951307Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.907266Z","vulnerability":{"name":"CVE-2025-58188"}},{"action_statement":"This vulnerability was fixed in: 1.61.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:54:52.064451Z","products":[{"@id":"pkg:generic/haproxy@2.4.28"}],"status":"affected","timestamp":"2026-05-14T10:25:32.873656Z","vulnerability":{"name":"CVE-2025-11230"}},{"action_statement":"This vulnerability was fixed in: 1.60.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:44:05.316593Z","products":[{"@id":"pkg:deb/ubuntu/libopenjp2-7@2.5.0-2ubuntu0.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=openjpeg2"}],"status":"affected","timestamp":"2026-05-14T10:25:32.880544Z","vulnerability":{"name":"CVE-2025-50952"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480235Z","products":[{"@id":"pkg:generic/deno@2.0.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.873538Z","vulnerability":{"name":"CVE-2026-27190"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480246Z","products":[{"@id":"pkg:deb/ubuntu/libgdk-pixbuf-2.0-0@2.42.10%2Bdfsg-3ubuntu3.2?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=gdk-pixbuf"},{"@id":"pkg:deb/ubuntu/libgdk-pixbuf2.0-common@2.42.10%2Bdfsg-3ubuntu3.2?arch=all\u0026distro=ubuntu-24.04\u0026upstream=gdk-pixbuf"}],"status":"affected","timestamp":"2026-05-14T10:25:32.873594Z","vulnerability":{"name":"CVE-2026-5201"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480255Z","products":[{"@id":"pkg:generic/deno@2.0.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.874211Z","vulnerability":{"name":"CVE-2025-48934"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480261Z","products":[{"@id":"pkg:generic/deno@2.0.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.874765Z","vulnerability":{"name":"CVE-2025-21620"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480266Z","products":[{"@id":"pkg:generic/deno@2.0.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.875017Z","vulnerability":{"name":"CVE-2025-48888"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480313Z","products":[{"@id":"pkg:generic/deno@2.0.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.875825Z","vulnerability":{"name":"CVE-2025-24015"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480351Z","products":[{"@id":"pkg:npm/jsonpath@1.1.1"}],"status":"affected","timestamp":"2026-05-14T10:25:32.876091Z","vulnerability":{"name":"CVE-2026-1615"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480366Z","products":[{"@id":"pkg:npm/%40xmldom/xmldom@0.8.10"}],"status":"affected","timestamp":"2026-05-14T10:25:32.876274Z","vulnerability":{"name":"CVE-2026-41673"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480376Z","products":[{"@id":"pkg:npm/%40xmldom/xmldom@0.8.10"}],"status":"affected","timestamp":"2026-05-14T10:25:32.877725Z","vulnerability":{"name":"CVE-2026-41672"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.48038Z","products":[{"@id":"pkg:npm/node-forge@1.3.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.87797Z","vulnerability":{"name":"CVE-2026-33891"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"This is a Remote Command Execution made available by the \"type\" fields of protobuf definitions, which will then execute during object decoding using that definition. An attacker that is authorized to run Synthetics tests that execute on that private location will be able to run JavaScript commands that inherit the execution context and permissions of the hosting Node.js process. PR #9754 fixes the issue and the release 1.67.7 will be avaiable shortly.","justification":"","last_updated":"2026-05-14T11:37:19.480388Z","products":[{"@id":"pkg:npm/protobufjs@7.4.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.878112Z","vulnerability":{"name":"CVE-2026-41242"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480393Z","products":[{"@id":"pkg:npm/%40xmldom/xmldom@0.8.10"}],"status":"affected","timestamp":"2026-05-14T10:25:32.878485Z","vulnerability":{"name":"CVE-2026-41674"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.4804Z","products":[{"@id":"pkg:npm/%40xmldom/xmldom@0.8.10"}],"status":"affected","timestamp":"2026-05-14T10:25:32.878532Z","vulnerability":{"name":"CVE-2026-41675"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480408Z","products":[{"@id":"pkg:npm/%40xmldom/xmldom@0.8.10"}],"status":"affected","timestamp":"2026-05-14T10:25:32.879637Z","vulnerability":{"name":"CVE-2026-34601"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480415Z","products":[{"@id":"pkg:npm/basic-ftp@5.0.3"}],"status":"affected","timestamp":"2026-05-14T10:25:32.880267Z","vulnerability":{"name":"CVE-2026-41324"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480419Z","products":[{"@id":"pkg:npm/path-to-regexp@0.1.12"}],"status":"affected","timestamp":"2026-05-14T10:25:32.880334Z","vulnerability":{"name":"CVE-2026-4867"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480427Z","products":[{"@id":"pkg:npm/node-forge@1.3.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.881416Z","vulnerability":{"name":"CVE-2026-33894"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480432Z","products":[{"@id":"pkg:npm/node-forge@1.3.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.882062Z","vulnerability":{"name":"CVE-2026-33895"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480437Z","products":[{"@id":"pkg:npm/lodash@4.17.21"}],"status":"affected","timestamp":"2026-05-14T10:25:32.882163Z","vulnerability":{"name":"CVE-2026-4800"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480444Z","products":[{"@id":"pkg:generic/deno@2.0.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.882433Z","vulnerability":{"name":"CVE-2026-22864"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480465Z","products":[{"@id":"pkg:npm/node-forge@1.3.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.88532Z","vulnerability":{"name":"CVE-2026-33896"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480566Z","products":[{"@id":"pkg:deb/ubuntu/libpam-systemd@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=systemd"},{"@id":"pkg:deb/ubuntu/libsystemd0@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=systemd"},{"@id":"pkg:deb/ubuntu/libsystemd-shared@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=systemd"},{"@id":"pkg:deb/ubuntu/libudev1@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=systemd"},{"@id":"pkg:deb/ubuntu/systemd@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04"},{"@id":"pkg:deb/ubuntu/systemd-dev@255.4-1ubuntu8.10?arch=all\u0026distro=ubuntu-24.04\u0026upstream=systemd"},{"@id":"pkg:deb/ubuntu/systemd-sysv@255.4-1ubuntu8.10?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=systemd"}],"status":"affected","timestamp":"2026-05-14T10:25:32.895514Z","vulnerability":{"name":"CVE-2026-29111"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480579Z","products":[{"@id":"pkg:generic/node@22.17.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.896958Z","vulnerability":{"name":"CVE-2026-21714"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480588Z","products":[{"@id":"pkg:deb/ubuntu/libcurl4t64@8.5.0-2ubuntu10.6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=curl"}],"status":"affected","timestamp":"2026-05-14T10:25:32.899146Z","vulnerability":{"name":"CVE-2026-6429"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480603Z","products":[{"@id":"pkg:generic/deno@2.0.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.904212Z","vulnerability":{"name":"CVE-2026-22863"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480611Z","products":[{"@id":"pkg:generic/deno@2.0.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.907205Z","vulnerability":{"name":"CVE-2025-61786"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480621Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.907682Z","vulnerability":{"name":"CVE-2026-32289"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480615Z","products":[{"@id":"pkg:generic/node@22.17.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.907382Z","vulnerability":{"name":"CVE-2026-21713"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480626Z","products":[{"@id":"pkg:deb/ubuntu/libcurl4t64@8.5.0-2ubuntu10.6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=curl"}],"status":"affected","timestamp":"2026-05-14T10:25:32.910722Z","vulnerability":{"name":"CVE-2026-5773"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.48063Z","products":[{"@id":"pkg:generic/deno@2.0.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.911001Z","vulnerability":{"name":"CVE-2025-61785"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480635Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.911213Z","vulnerability":{"name":"CVE-2026-32282"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480641Z","products":[{"@id":"pkg:deb/ubuntu/libcap2@1%3A2.66-5ubuntu2.2?arch=amd64\u0026distro=ubuntu-24.04"},{"@id":"pkg:deb/ubuntu/libcap2-bin@1%3A2.66-5ubuntu2.2?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=libcap2"}],"status":"affected","timestamp":"2026-05-14T10:25:32.914405Z","vulnerability":{"name":"CVE-2026-4878"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480647Z","products":[{"@id":"pkg:deb/ubuntu/libtiff6@4.5.1%2Bgit230720-4ubuntu2.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=tiff"}],"status":"affected","timestamp":"2026-05-14T10:25:32.915694Z","vulnerability":{"name":"CVE-2025-61143"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480668Z","products":[{"@id":"pkg:deb/ubuntu/sed@4.9-2build1?arch=amd64\u0026distro=ubuntu-24.04"}],"status":"affected","timestamp":"2026-05-14T10:25:32.91883Z","vulnerability":{"name":"CVE-2026-5958"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480673Z","products":[{"@id":"pkg:deb/ubuntu/libcurl4t64@8.5.0-2ubuntu10.6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=curl"}],"status":"affected","timestamp":"2026-05-14T10:25:32.919558Z","vulnerability":{"name":"CVE-2026-6276"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480679Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.919789Z","vulnerability":{"name":"CVE-2026-32288"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480652Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.915841Z","vulnerability":{"name":"CVE-2026-27144"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480658Z","products":[{"@id":"pkg:deb/ubuntu/libcurl4t64@8.5.0-2ubuntu10.6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=curl"}],"status":"affected","timestamp":"2026-05-14T10:25:32.916255Z","vulnerability":{"name":"CVE-2026-4873"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480685Z","products":[{"@id":"pkg:deb/ubuntu/libssl3t64@3.0.13-0ubuntu3.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=openssl"},{"@id":"pkg:deb/ubuntu/openssl@3.0.13-0ubuntu3.5?arch=amd64\u0026distro=ubuntu-24.04"},{"@id":"pkg:generic/openssl@3.0.16"}],"status":"affected","timestamp":"2026-05-14T10:25:32.911404Z","vulnerability":{"name":"CVE-2026-31789"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480689Z","products":[{"@id":"pkg:generic/node@22.17.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.920322Z","vulnerability":{"name":"CVE-2026-21715"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480693Z","products":[{"@id":"pkg:generic/node@22.17.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.920371Z","vulnerability":{"name":"CVE-2026-21716"}},{"action_statement":"This vulnerability was fixed in: 1.67.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:37:19.480709Z","products":[{"@id":"pkg:npm/basic-ftp@5.0.3"}],"status":"affected","timestamp":"2026-05-14T10:25:32.920649Z","vulnerability":{"name":"GHSA-6v7q-wjvx-w8wg"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.171749Z","products":[{"@id":"pkg:npm/basic-ftp@5.0.3"}],"status":"affected","timestamp":"2026-05-14T10:25:32.874858Z","vulnerability":{"name":"CVE-2026-27699"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.171861Z","products":[{"@id":"pkg:deb/ubuntu/libcurl4t64@8.5.0-2ubuntu10.6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=curl"}],"status":"affected","timestamp":"2026-05-14T10:25:32.875855Z","vulnerability":{"name":"CVE-2025-0167"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.171912Z","products":[{"@id":"pkg:deb/ubuntu/libssh-4@0.10.6-2ubuntu0.1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=libssh"}],"status":"affected","timestamp":"2026-05-14T10:25:32.878318Z","vulnerability":{"name":"CVE-2026-3731"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.171938Z","products":[{"@id":"pkg:deb/ubuntu/libpng16-16t64@1.6.43-5build1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=libpng1.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.880366Z","vulnerability":{"name":"CVE-2026-25646"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.171945Z","products":[{"@id":"pkg:npm/jsonpath@1.1.1"}],"status":"affected","timestamp":"2026-05-14T10:25:32.880407Z","vulnerability":{"name":"CVE-2025-61140"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.171962Z","products":[{"@id":"pkg:deb/ubuntu/libcurl4t64@8.5.0-2ubuntu10.6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=curl"}],"status":"affected","timestamp":"2026-05-14T10:25:32.88155Z","vulnerability":{"name":"CVE-2025-10148"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.171974Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.881634Z","vulnerability":{"name":"CVE-2026-25679"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.17198Z","products":[{"@id":"pkg:deb/ubuntu/libcurl4t64@8.5.0-2ubuntu10.6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=curl"}],"status":"affected","timestamp":"2026-05-14T10:25:32.881893Z","vulnerability":{"name":"CVE-2026-1965"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.171992Z","products":[{"@id":"pkg:deb/ubuntu/libcurl4t64@8.5.0-2ubuntu10.6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=curl"}],"status":"affected","timestamp":"2026-05-14T10:25:32.882222Z","vulnerability":{"name":"CVE-2025-15224"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.171998Z","products":[{"@id":"pkg:deb/ubuntu/libnss3@2%3A3.98-1build1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=nss"},{"@id":"pkg:deb/ubuntu/libnss3-tools@2%3A3.98-1build1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=nss"}],"status":"affected","timestamp":"2026-05-14T10:25:32.882332Z","vulnerability":{"name":"CVE-2026-2781"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.171987Z","products":[{"@id":"pkg:deb/ubuntu/libgnutls30t64@3.8.3-1.1ubuntu3.4?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=gnutls28"}],"status":"affected","timestamp":"2026-05-14T10:25:32.882191Z","vulnerability":{"name":"CVE-2025-14831"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.172007Z","products":[{"@id":"pkg:npm/minimatch@3.0.5"},{"@id":"pkg:npm/minimatch@5.1.6"},{"@id":"pkg:npm/minimatch@9.0.5"}],"status":"affected","timestamp":"2026-05-14T10:25:32.882732Z","vulnerability":{"name":"CVE-2026-27903"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.172039Z","products":[{"@id":"pkg:npm/minimatch@3.0.5"},{"@id":"pkg:npm/minimatch@5.1.6"},{"@id":"pkg:npm/minimatch@9.0.5"}],"status":"affected","timestamp":"2026-05-14T10:25:32.88836Z","vulnerability":{"name":"CVE-2026-26996"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.17205Z","products":[{"@id":"pkg:npm/minimatch@3.0.5"},{"@id":"pkg:npm/minimatch@5.1.6"},{"@id":"pkg:npm/minimatch@9.0.5"}],"status":"affected","timestamp":"2026-05-14T10:25:32.889088Z","vulnerability":{"name":"CVE-2026-27904"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.17206Z","products":[{"@id":"pkg:npm/fast-xml-parser@4.4.1"}],"status":"affected","timestamp":"2026-05-14T10:25:32.890077Z","vulnerability":{"name":"CVE-2026-25896"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.172065Z","products":[{"@id":"pkg:deb/ubuntu/libcurl4t64@8.5.0-2ubuntu10.6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=curl"}],"status":"affected","timestamp":"2026-05-14T10:25:32.890117Z","vulnerability":{"name":"CVE-2025-14819"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.172081Z","products":[{"@id":"pkg:npm/lodash@4.17.21"}],"status":"affected","timestamp":"2026-05-14T10:25:32.89059Z","vulnerability":{"name":"CVE-2025-13465"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.172095Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.89066Z","vulnerability":{"name":"CVE-2025-68121"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.172103Z","products":[{"@id":"pkg:npm/underscore@1.13.2"}],"status":"affected","timestamp":"2026-05-14T10:25:32.891043Z","vulnerability":{"name":"CVE-2026-27601"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.172107Z","products":[{"@id":"pkg:npm/fast-xml-parser@4.4.1"}],"status":"affected","timestamp":"2026-05-14T10:25:32.891181Z","vulnerability":{"name":"CVE-2026-27942"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.172112Z","products":[{"@id":"pkg:deb/ubuntu/libssh-4@0.10.6-2ubuntu0.1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=libssh"}],"status":"affected","timestamp":"2026-05-14T10:25:32.891343Z","vulnerability":{"name":"CVE-2026-0966"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.172128Z","products":[{"@id":"pkg:deb/ubuntu/libssh-4@0.10.6-2ubuntu0.1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=libssh"}],"status":"affected","timestamp":"2026-05-14T10:25:32.892093Z","vulnerability":{"name":"CVE-2025-8277"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.172136Z","products":[{"@id":"pkg:deb/ubuntu/libcurl4t64@8.5.0-2ubuntu10.6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=curl"}],"status":"affected","timestamp":"2026-05-14T10:25:32.892627Z","vulnerability":{"name":"CVE-2025-15079"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.172148Z","products":[{"@id":"pkg:deb/ubuntu/libcurl4t64@8.5.0-2ubuntu10.6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=curl"}],"status":"affected","timestamp":"2026-05-14T10:25:32.89409Z","vulnerability":{"name":"CVE-2026-3783"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.172153Z","products":[{"@id":"pkg:npm/bn.js@4.11.8"}],"status":"affected","timestamp":"2026-05-14T10:25:32.894291Z","vulnerability":{"name":"CVE-2026-2739"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.172164Z","products":[{"@id":"pkg:deb/ubuntu/libcurl4t64@8.5.0-2ubuntu10.6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=curl"}],"status":"affected","timestamp":"2026-05-14T10:25:32.895413Z","vulnerability":{"name":"CVE-2025-14524"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.172178Z","products":[{"@id":"pkg:deb/ubuntu/libvpx9@1.14.0-1ubuntu2.2?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=libvpx"}],"status":"affected","timestamp":"2026-05-14T10:25:32.896688Z","vulnerability":{"name":"CVE-2026-2447"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.172187Z","products":[{"@id":"pkg:deb/ubuntu/libglib2.0-0t64@2.80.0-6ubuntu3.4?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=glib2.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.897Z","vulnerability":{"name":"CVE-2026-1489"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.172191Z","products":[{"@id":"pkg:deb/ubuntu/libglib2.0-0t64@2.80.0-6ubuntu3.4?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=glib2.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.898285Z","vulnerability":{"name":"CVE-2026-1484"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.172201Z","products":[{"@id":"pkg:deb/ubuntu/libfreetype6@2.13.2%2Bdfsg-1build3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=freetype"}],"status":"affected","timestamp":"2026-05-14T10:25:32.898592Z","vulnerability":{"name":"CVE-2026-23865"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.172218Z","products":[{"@id":"pkg:npm/ajv@8.5.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.90297Z","vulnerability":{"name":"CVE-2025-69873"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.172227Z","products":[{"@id":"pkg:deb/ubuntu/libssh-4@0.10.6-2ubuntu0.1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=libssh"}],"status":"affected","timestamp":"2026-05-14T10:25:32.903974Z","vulnerability":{"name":"CVE-2026-0964"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.172232Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.904158Z","vulnerability":{"name":"CVE-2026-27142"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.172243Z","products":[{"@id":"pkg:deb/ubuntu/libcurl4t64@8.5.0-2ubuntu10.6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=curl"}],"status":"affected","timestamp":"2026-05-14T10:25:32.907325Z","vulnerability":{"name":"CVE-2026-3784"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.172251Z","products":[{"@id":"pkg:npm/tar@6.2.1"}],"status":"affected","timestamp":"2026-05-14T10:25:32.907587Z","vulnerability":{"name":"CVE-2026-31802"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.172257Z","products":[{"@id":"pkg:npm/tar@6.2.1"}],"status":"affected","timestamp":"2026-05-14T10:25:32.907637Z","vulnerability":{"name":"CVE-2026-29786"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.172274Z","products":[{"@id":"pkg:deb/ubuntu/libssh-4@0.10.6-2ubuntu0.1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=libssh"}],"status":"affected","timestamp":"2026-05-14T10:25:32.909405Z","vulnerability":{"name":"CVE-2026-0968"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.172266Z","products":[{"@id":"pkg:npm/tar@6.2.1"}],"status":"affected","timestamp":"2026-05-14T10:25:32.909023Z","vulnerability":{"name":"CVE-2026-26960"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.172271Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.909267Z","vulnerability":{"name":"CVE-2025-61732"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.172287Z","products":[{"@id":"pkg:deb/ubuntu/libcurl4t64@8.5.0-2ubuntu10.6?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=curl"}],"status":"affected","timestamp":"2026-05-14T10:25:32.914797Z","vulnerability":{"name":"CVE-2025-14017"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.172292Z","products":[{"@id":"pkg:deb/ubuntu/sudo@1.9.15p5-3ubuntu5.24.04.1?arch=amd64\u0026distro=ubuntu-24.04"}],"status":"affected","timestamp":"2026-05-14T10:25:32.915579Z","vulnerability":{"name":"CVE-2026-35535"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.172307Z","products":[{"@id":"pkg:deb/ubuntu/libasound2-data@1.2.11-1ubuntu0.1?arch=all\u0026distro=ubuntu-24.04\u0026upstream=alsa-lib"},{"@id":"pkg:deb/ubuntu/libasound2t64@1.2.11-1ubuntu0.1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=alsa-lib"}],"status":"affected","timestamp":"2026-05-14T10:25:32.917185Z","vulnerability":{"name":"CVE-2026-25068"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.172312Z","products":[{"@id":"pkg:deb/ubuntu/libexpat1@2.6.1-2ubuntu0.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=expat"}],"status":"affected","timestamp":"2026-05-14T10:25:32.917525Z","vulnerability":{"name":"CVE-2026-25210"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.172318Z","products":[{"@id":"pkg:deb/ubuntu/libexpat1@2.6.1-2ubuntu0.3?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=expat"}],"status":"affected","timestamp":"2026-05-14T10:25:32.918014Z","vulnerability":{"name":"CVE-2026-24515"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.172322Z","products":[{"@id":"pkg:deb/ubuntu/libglib2.0-0t64@2.80.0-6ubuntu3.4?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=glib2.0"}],"status":"affected","timestamp":"2026-05-14T10:25:32.918099Z","vulnerability":{"name":"CVE-2026-1485"}},{"action_statement":"This vulnerability was fixed in: 1.66.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:34:32.172329Z","products":[{"@id":"pkg:deb/ubuntu/libgnutls30t64@3.8.3-1.1ubuntu3.4?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=gnutls28"}],"status":"affected","timestamp":"2026-05-14T10:25:32.918392Z","vulnerability":{"name":"CVE-2025-9820"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.924067Z","products":[{"@id":"pkg:generic/python@3.13.7"}],"status":"affected","timestamp":"2026-05-14T10:25:32.887017Z","vulnerability":{"name":"CVE-2025-12781"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.924154Z","products":[{"@id":"pkg:deb/ubuntu/libpng16-16t64@1.6.43-5build1?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=libpng1.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.891876Z","vulnerability":{"name":"CVE-2026-22695"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.924218Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:25:32.895128Z","vulnerability":{"name":"CVE-2025-61728"}},{"action_statement":"This vulnerability was fixed in: 1.65.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:10.924224Z","products":[{"@id":"pkg:deb/ubuntu/libc6@2.39-0ubuntu8.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=glibc"},{"@id":"pkg:deb/ubuntu/libc-bin@2.39-0ubuntu8.5?arch=amd64\u0026distro=ubuntu-24.04\u0026upstream=glibc"},{"@id":"pkg:deb/ubuntu/locales@2.39-0ubuntu8.5?arch=all\u0026distro=ubuntu-24.04\u0026upstream=glibc"}],"status":"affected","timestamp":"2026-05-14T10:25:32.895261Z","vulnerability":{"name":"CVE-2026-0915"}}],"timestamp":"2026-03-23T11:42:42.262837254Z","tooling":"","version":14}