vex-hub merges CSAF and OVAL so Trivy's --vex flag sees what Red Hat CSAF alone misses.
CVE-2025-2487 on RHEL 9.6 EUScurl -X POST https://vex.getreel.dev/v1/resolve \
-H "Content-Type: application/json" \
-d '{
"cves": ["CVE-2026-2100"],
"products": ["pkg:rpm/redhat/p11-kit"],
"format": "openvex"
}' > vex.jsontrivy image --vex vex.json --show-suppressed \
registry.access.redhat.com/ubi9/ubi:latesttrivy image --format json \
registry.access.redhat.com/ubi9/ubi:latest > scan.jsoncurl -X POST https://vex.getreel.dev/v1/resolve \
-H "Content-Type: application/json" \
-d '{"cves":["CVE-2026-2100"],
"products":["pkg:rpm/redhat/p11-kit"],
"format":"openvex"}' > vex.jsontrivy image --vex vex.json --show-suppressed \
registry.access.redhat.com/ubi9/ubi:latestSuppressed Vulnerabilities (Total: 1) ===================================== ┌────────────┬───────────────┬──────────┬──────────────┬─────────────────────────────┬──────────┐ │ Library │ Vulnerability │ Severity │ Status │ Statement │ Source │ ├────────────┼───────────────┼──────────┼──────────────┼─────────────────────────────┼──────────┤ │ p11-kit │ CVE-2026-2100 │ MEDIUM │ not_affected │ vulnerable_code_not_present │ vex.json │ └────────────┴───────────────┴──────────┴──────────────┴─────────────────────────────┴──────────┘