Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/103145?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/103145?format=api", "purl": "pkg:rpm/redhat/kernel-alt@4.14.0-115.21.2?arch=el7a", "type": "rpm", "namespace": "redhat", "name": "kernel-alt", "version": "4.14.0-115.21.2", "qualifiers": { "arch": "el7a" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79276?format=api", "vulnerability_id": "VCID-1x5s-sp31-63f8", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9383.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9383.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-9383", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26476", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.2619", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26248", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26241", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26528", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26573", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26357", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26426", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26483", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26437", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26378", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26385", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26356", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26318", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-9383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1810685", "reference_id": "1810685", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1810685" }, { "reference_url": "https://security.archlinux.org/ASA-202003-6", "reference_id": "ASA-202003-6", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202003-6" }, { "reference_url": "https://security.archlinux.org/AVG-1108", "reference_id": "AVG-1108", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1108" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2104", "reference_id": "RHSA-2020:2104", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2104" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4060", "reference_id": "RHSA-2020:4060", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4060" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4062", "reference_id": "RHSA-2020:4062", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4062" }, { "reference_url": "https://usn.ubuntu.com/4342-1/", "reference_id": "USN-4342-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4342-1/" }, { "reference_url": "https://usn.ubuntu.com/4344-1/", "reference_id": "USN-4344-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4344-1/" }, { "reference_url": "https://usn.ubuntu.com/4345-1/", "reference_id": "USN-4345-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4345-1/" }, { "reference_url": "https://usn.ubuntu.com/4346-1/", "reference_id": "USN-4346-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4346-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-9383" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1x5s-sp31-63f8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81762?format=api", "vulnerability_id": "VCID-2ed6-g4ep-yfh1", "summary": "kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19447.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19447.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19447", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01689", "scoring_system": "epss", "scoring_elements": "0.82153", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01689", "scoring_system": "epss", "scoring_elements": "0.82166", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01689", "scoring_system": "epss", "scoring_elements": "0.82187", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01689", "scoring_system": "epss", "scoring_elements": "0.82183", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01689", "scoring_system": "epss", "scoring_elements": "0.82209", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01689", "scoring_system": "epss", "scoring_elements": "0.82217", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01689", "scoring_system": "epss", "scoring_elements": "0.82236", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01689", "scoring_system": "epss", "scoring_elements": "0.82228", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01689", "scoring_system": "epss", "scoring_elements": "0.82223", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01689", "scoring_system": "epss", "scoring_elements": "0.82259", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01689", "scoring_system": "epss", "scoring_elements": "0.8226", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01689", "scoring_system": "epss", "scoring_elements": "0.82282", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01689", "scoring_system": "epss", "scoring_elements": "0.82293", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01689", "scoring_system": "epss", "scoring_elements": "0.82298", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19447" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19447", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19447" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781679", "reference_id": "1781679", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781679" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2104", "reference_id": "RHSA-2020:2104", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2104" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4060", "reference_id": "RHSA-2020:4060", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4060" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4062", "reference_id": "RHSA-2020:4062", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4062" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4431", "reference_id": "RHSA-2020:4431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4609", "reference_id": "RHSA-2020:4609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5206", "reference_id": "RHSA-2020:5206", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5206" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5430", "reference_id": "RHSA-2020:5430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5656", "reference_id": "RHSA-2020:5656", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5656" } ], "fixed_packages": [], "aliases": [ "CVE-2019-19447" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2ed6-g4ep-yfh1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81858?format=api", "vulnerability_id": "VCID-2w4w-t45z-v3bf", "summary": "kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19524.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19524.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19524", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12713", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12819", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12868", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12671", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12751", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12803", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12771", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12734", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12687", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12592", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12603", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12715", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12727", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.1269", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12576", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19524" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19524", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19524" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783459", "reference_id": "1783459", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783459" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2104", "reference_id": "RHSA-2020:2104", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2104" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4060", "reference_id": "RHSA-2020:4060", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4060" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4062", "reference_id": "RHSA-2020:4062", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4062" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4431", "reference_id": "RHSA-2020:4431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4609", "reference_id": "RHSA-2020:4609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "reference_url": "https://usn.ubuntu.com/4225-1/", "reference_id": "USN-4225-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4225-1/" }, { "reference_url": "https://usn.ubuntu.com/4225-2/", "reference_id": "USN-4225-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4225-2/" }, { "reference_url": "https://usn.ubuntu.com/4226-1/", "reference_id": "USN-4226-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4226-1/" }, { "reference_url": "https://usn.ubuntu.com/4227-1/", "reference_id": "USN-4227-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4227-1/" }, { "reference_url": "https://usn.ubuntu.com/4227-2/", "reference_id": "USN-4227-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4227-2/" }, { "reference_url": "https://usn.ubuntu.com/4228-1/", "reference_id": "USN-4228-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4228-1/" }, { "reference_url": "https://usn.ubuntu.com/4228-2/", "reference_id": "USN-4228-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4228-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2019-19524" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2w4w-t45z-v3bf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82248?format=api", "vulnerability_id": "VCID-5zsw-fkhr-3ffj", "summary": "kernel: out of bounds write in function i2c_smbus_xfer_emulated in drivers/i2c/i2c-core-smbus.c", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18551.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18551.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18551", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32749", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32385", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32734", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32583", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32467", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.3288", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32915", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32737", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32784", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32811", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32812", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32775", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32748", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32789", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32765", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18551" }, { "reference_url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.15", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.15" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18551", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18551" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89c6efa61f5709327ecfa24bff18e57a4e80c7fa", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89c6efa61f5709327ecfa24bff18e57a4e80c7fa" }, { "reference_url": "https://support.f5.com/csp/article/K48073202?utm_source=f5support&%3Butm_medium=RSS", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.f5.com/csp/article/K48073202?utm_source=f5support&%3Butm_medium=RSS" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757368", "reference_id": "1757368", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757368" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18551", "reference_id": "CVE-2017-18551", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "6.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18551" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2104", "reference_id": "RHSA-2020:2104", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2104" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4060", "reference_id": "RHSA-2020:4060", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4060" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4062", "reference_id": "RHSA-2020:4062", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4062" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5206", "reference_id": "RHSA-2020:5206", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5206" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5430", "reference_id": "RHSA-2020:5430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5656", "reference_id": "RHSA-2020:5656", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5656" } ], "fixed_packages": [], "aliases": [ "CVE-2017-18551" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5zsw-fkhr-3ffj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82499?format=api", "vulnerability_id": "VCID-9sy3-h5gv-hkfj", "summary": "kernel: null pointer dereference in dlpar_parse_cc_property in arch/powerrc/platforms/pseries/dlpar.c causing denial of service", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12614.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12614.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-12614", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24569", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24647", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24684", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24456", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24526", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.2457", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24586", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24542", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24488", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24501", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24493", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24469", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24409", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24393", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24351", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-12614" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12614", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12614" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1718176", "reference_id": "1718176", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1718176" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2104", "reference_id": "RHSA-2020:2104", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2104" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4060", "reference_id": "RHSA-2020:4060", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4060" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4431", "reference_id": "RHSA-2020:4431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "reference_url": "https://usn.ubuntu.com/4093-1/", "reference_id": "USN-4093-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4093-1/" }, { "reference_url": "https://usn.ubuntu.com/4094-1/", "reference_id": "USN-4094-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4094-1/" }, { "reference_url": "https://usn.ubuntu.com/4095-1/", "reference_id": "USN-4095-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4095-1/" }, { "reference_url": "https://usn.ubuntu.com/4095-2/", "reference_id": "USN-4095-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4095-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2019-12614" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9sy3-h5gv-hkfj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79277?format=api", "vulnerability_id": "VCID-baxd-14v9-jqc9", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10711.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10711.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10711", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05438", "scoring_system": "epss", "scoring_elements": "0.90132", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05438", "scoring_system": "epss", "scoring_elements": "0.90135", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05438", "scoring_system": "epss", "scoring_elements": "0.90147", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05438", "scoring_system": "epss", "scoring_elements": "0.90152", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05438", "scoring_system": "epss", "scoring_elements": "0.90167", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05438", "scoring_system": "epss", "scoring_elements": "0.90172", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05438", "scoring_system": "epss", "scoring_elements": "0.90181", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05438", "scoring_system": "epss", "scoring_elements": "0.9018", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05438", "scoring_system": "epss", "scoring_elements": "0.90175", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05438", "scoring_system": "epss", "scoring_elements": "0.90193", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05438", "scoring_system": "epss", "scoring_elements": "0.90189", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05438", "scoring_system": "epss", "scoring_elements": "0.90204", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.05438", "scoring_system": "epss", "scoring_elements": "0.90203", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.05438", "scoring_system": "epss", "scoring_elements": "0.902", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10711" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3016", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3016" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12768", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12768" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1825116", "reference_id": "1825116", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1825116" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2082", "reference_id": "RHSA-2020:2082", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2082" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2085", "reference_id": "RHSA-2020:2085", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2085" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2102", "reference_id": "RHSA-2020:2102", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2102" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2103", "reference_id": "RHSA-2020:2103", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2103" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2104", "reference_id": "RHSA-2020:2104", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2104" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2125", "reference_id": "RHSA-2020:2125", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2125" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2171", "reference_id": "RHSA-2020:2171", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2171" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2199", "reference_id": "RHSA-2020:2199", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2199" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2203", "reference_id": "RHSA-2020:2203", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2203" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2214", "reference_id": "RHSA-2020:2214", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2214" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2242", "reference_id": "RHSA-2020:2242", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2242" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2277", "reference_id": "RHSA-2020:2277", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2277" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2285", "reference_id": "RHSA-2020:2285", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2285" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2289", "reference_id": "RHSA-2020:2289", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2289" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2291", "reference_id": "RHSA-2020:2291", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2291" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2429", "reference_id": "RHSA-2020:2429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2519", "reference_id": "RHSA-2020:2519", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2519" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2522", "reference_id": "RHSA-2020:2522", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2522" }, { "reference_url": "https://usn.ubuntu.com/4411-1/", "reference_id": "USN-4411-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4411-1/" }, { "reference_url": "https://usn.ubuntu.com/4412-1/", "reference_id": "USN-4412-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4412-1/" }, { "reference_url": "https://usn.ubuntu.com/4413-1/", "reference_id": "USN-4413-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4413-1/" }, { "reference_url": "https://usn.ubuntu.com/4414-1/", "reference_id": "USN-4414-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4414-1/" }, { "reference_url": "https://usn.ubuntu.com/4419-1/", "reference_id": "USN-4419-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4419-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-10711" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-baxd-14v9-jqc9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79268?format=api", "vulnerability_id": "VCID-fb84-2es5-q3hc", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19768.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19768.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19768", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01401", "scoring_system": "epss", "scoring_elements": "0.80372", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01401", "scoring_system": "epss", "scoring_elements": "0.80378", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01401", "scoring_system": "epss", "scoring_elements": "0.80398", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01401", "scoring_system": "epss", "scoring_elements": "0.80387", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01401", "scoring_system": "epss", "scoring_elements": "0.80416", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01401", "scoring_system": "epss", "scoring_elements": "0.80426", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01401", "scoring_system": "epss", "scoring_elements": "0.80445", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01401", "scoring_system": "epss", "scoring_elements": "0.8043", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01401", "scoring_system": "epss", "scoring_elements": "0.80423", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01401", "scoring_system": "epss", "scoring_elements": "0.80453", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01401", "scoring_system": "epss", "scoring_elements": "0.80454", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01401", "scoring_system": "epss", "scoring_elements": "0.80457", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01401", "scoring_system": "epss", "scoring_elements": "0.80482", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01401", "scoring_system": "epss", "scoring_elements": "0.80488", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01401", "scoring_system": "epss", "scoring_elements": "0.80505", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19768" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786164", "reference_id": "1786164", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786164" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1567", "reference_id": "RHSA-2020:1567", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1769", "reference_id": "RHSA-2020:1769", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1966", "reference_id": "RHSA-2020:1966", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1966" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2082", "reference_id": "RHSA-2020:2082", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2082" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2085", "reference_id": "RHSA-2020:2085", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2085" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2104", "reference_id": "RHSA-2020:2104", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2104" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2199", "reference_id": "RHSA-2020:2199", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2199" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2203", "reference_id": "RHSA-2020:2203", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2203" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2214", "reference_id": "RHSA-2020:2214", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2214" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2242", "reference_id": "RHSA-2020:2242", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2242" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2277", "reference_id": "RHSA-2020:2277", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2277" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2285", "reference_id": "RHSA-2020:2285", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2285" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2289", "reference_id": "RHSA-2020:2289", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2289" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2291", "reference_id": "RHSA-2020:2291", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2291" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2519", "reference_id": "RHSA-2020:2519", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2519" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2522", "reference_id": "RHSA-2020:2522", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2522" }, { "reference_url": "https://usn.ubuntu.com/4342-1/", "reference_id": "USN-4342-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4342-1/" }, { "reference_url": "https://usn.ubuntu.com/4344-1/", "reference_id": "USN-4344-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4344-1/" }, { "reference_url": "https://usn.ubuntu.com/4345-1/", "reference_id": "USN-4345-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4345-1/" }, { "reference_url": "https://usn.ubuntu.com/4346-1/", "reference_id": "USN-4346-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4346-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2019-19768" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fb84-2es5-q3hc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82141?format=api", "vulnerability_id": "VCID-feqr-yruq-pfhh", "summary": "kernel: out of bounds write in i2c driver leads to local escalation of privilege", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9454.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9454.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9454", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05644", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05935", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.0589", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05926", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05678", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05719", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05712", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05752", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05778", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05756", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05748", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05743", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05698", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05708", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05859", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9454" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9454", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9454" }, { "reference_url": "https://source.android.com/security/bulletin/pixel/2019-09-01", "reference_id": "", "reference_type": "", "scores": [], "url": "https://source.android.com/security/bulletin/pixel/2019-09-01" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1818818", "reference_id": "1818818", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1818818" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9454", "reference_id": "CVE-2019-9454", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "6.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9454" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2104", "reference_id": "RHSA-2020:2104", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2104" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4060", "reference_id": "RHSA-2020:4060", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4060" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4062", "reference_id": "RHSA-2020:4062", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4062" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5206", "reference_id": "RHSA-2020:5206", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5206" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5430", "reference_id": "RHSA-2020:5430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5656", "reference_id": "RHSA-2020:5656", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5656" } ], "fixed_packages": [], "aliases": [ "CVE-2019-9454" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-feqr-yruq-pfhh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82124?format=api", "vulnerability_id": "VCID-jybz-x1kz-hyh7", "summary": "kernel: double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18595.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18595.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18595", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.3191", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31519", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31897", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.3173", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31603", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.32038", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.32078", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31902", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31954", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31983", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31986", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31946", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31913", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31947", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31925", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18595" }, { "reference_url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.11", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.11" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18595", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18595" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4397f04575c44e1440ec2e49b6302785c95fd2f8", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4397f04575c44e1440ec2e49b6302785c95fd2f8" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758671", "reference_id": "1758671", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758671" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18595", "reference_id": "CVE-2017-18595", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18595" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2082", "reference_id": "RHSA-2020:2082", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2082" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2085", "reference_id": "RHSA-2020:2085", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2085" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2104", "reference_id": "RHSA-2020:2104", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2104" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2214", "reference_id": "RHSA-2020:2214", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2214" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2242", "reference_id": "RHSA-2020:2242", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2242" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2277", "reference_id": "RHSA-2020:2277", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2277" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2285", "reference_id": "RHSA-2020:2285", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2285" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2289", "reference_id": "RHSA-2020:2289", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2289" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2522", "reference_id": "RHSA-2020:2522", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2522" } ], "fixed_packages": [], "aliases": [ "CVE-2017-18595" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jybz-x1kz-hyh7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82218?format=api", "vulnerability_id": "VCID-kqh6-xctg-b3dv", "summary": "kernel: denial of service in in xfs_setattr_nonsize in fs/xfs/xfs_iops.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15538.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15538.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-15538", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.16428", "scoring_system": "epss", "scoring_elements": "0.94847", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.16428", "scoring_system": "epss", "scoring_elements": "0.94856", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.16428", "scoring_system": "epss", "scoring_elements": "0.9486", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.16428", "scoring_system": "epss", "scoring_elements": "0.94862", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.16428", "scoring_system": "epss", "scoring_elements": "0.94871", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.16428", "scoring_system": "epss", "scoring_elements": "0.94875", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.16428", "scoring_system": "epss", "scoring_elements": "0.94879", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.16428", "scoring_system": "epss", "scoring_elements": "0.94882", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.16428", "scoring_system": "epss", "scoring_elements": "0.94883", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.16428", "scoring_system": "epss", "scoring_elements": "0.9489", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.16428", "scoring_system": "epss", "scoring_elements": "0.94894", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.16428", "scoring_system": "epss", "scoring_elements": "0.94897", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.16428", "scoring_system": "epss", "scoring_elements": "0.94898", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-15538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15538" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1746777", "reference_id": "1746777", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1746777" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2104", "reference_id": "RHSA-2020:2104", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2104" }, { "reference_url": "https://usn.ubuntu.com/4144-1/", "reference_id": "USN-4144-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4144-1/" }, { "reference_url": "https://usn.ubuntu.com/4147-1/", "reference_id": "USN-4147-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4147-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2019-15538" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kqh6-xctg-b3dv" } ], "fixing_vulnerabilities": [], "risk_score": "4.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-alt@4.14.0-115.21.2%3Farch=el7a" }