Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/docker@2:1.13.1-161.git64e9980?arch=el7_8
Typerpm
Namespaceredhat
Namedocker
Version2:1.13.1-161.git64e9980
Qualifiers
arch el7_8
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-2h42-q2a4-xba5
vulnerability_id VCID-2h42-q2a4-xba5
summary containers/image: Container images read entire image manifest into memory
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1702.json
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1702.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-1702
reference_id
reference_type
scores
0
value 0.00169
scoring_system epss
scoring_elements 0.38048
published_at 2026-04-01T12:55:00Z
1
value 0.00169
scoring_system epss
scoring_elements 0.38228
published_at 2026-04-02T12:55:00Z
2
value 0.00169
scoring_system epss
scoring_elements 0.38251
published_at 2026-04-04T12:55:00Z
3
value 0.00169
scoring_system epss
scoring_elements 0.38121
published_at 2026-04-07T12:55:00Z
4
value 0.00169
scoring_system epss
scoring_elements 0.38171
published_at 2026-04-08T12:55:00Z
5
value 0.00169
scoring_system epss
scoring_elements 0.38179
published_at 2026-04-09T12:55:00Z
6
value 0.00169
scoring_system epss
scoring_elements 0.38197
published_at 2026-04-11T12:55:00Z
7
value 0.00169
scoring_system epss
scoring_elements 0.38162
published_at 2026-04-12T12:55:00Z
8
value 0.00169
scoring_system epss
scoring_elements 0.38138
published_at 2026-04-13T12:55:00Z
9
value 0.00169
scoring_system epss
scoring_elements 0.38183
published_at 2026-04-16T12:55:00Z
10
value 0.00169
scoring_system epss
scoring_elements 0.38165
published_at 2026-04-18T12:55:00Z
11
value 0.00169
scoring_system epss
scoring_elements 0.381
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-1702
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1792796
reference_id 1792796
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1792796
3
reference_url https://access.redhat.com/errata/RHSA-2020:1227
reference_id RHSA-2020:1227
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1227
4
reference_url https://access.redhat.com/errata/RHSA-2020:1234
reference_id RHSA-2020:1234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1234
5
reference_url https://access.redhat.com/errata/RHSA-2020:1937
reference_id RHSA-2020:1937
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1937
6
reference_url https://access.redhat.com/errata/RHSA-2020:2116
reference_id RHSA-2020:2116
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2116
7
reference_url https://access.redhat.com/errata/RHSA-2020:2218
reference_id RHSA-2020:2218
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2218
8
reference_url https://access.redhat.com/errata/RHSA-2020:2681
reference_id RHSA-2020:2681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2681
fixed_packages
aliases CVE-2020-1702
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2h42-q2a4-xba5
1
url VCID-vfxz-vfmr-w3d1
vulnerability_id VCID-vfxz-vfmr-w3d1
summary
GPGME Go wrapper contains Use After Free
The proglottis Go wrapper before 0.1.1 for the GPGME library has a use-after-free, as demonstrated by use for container image pulls by Docker or CRI-O. This leads to a crash or potential code execution during GPG signature verification.
references
0
reference_url https://access.redhat.com/errata/RHSA-2020:0679
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2020:0679
1
reference_url https://access.redhat.com/errata/RHSA-2020:0689
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2020:0689
2
reference_url https://access.redhat.com/errata/RHSA-2020:0697
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2020:0697
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8945.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8945.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-8945
reference_id
reference_type
scores
0
value 0.01939
scoring_system epss
scoring_elements 0.83416
published_at 2026-04-09T12:55:00Z
1
value 0.01939
scoring_system epss
scoring_elements 0.8343
published_at 2026-04-11T12:55:00Z
2
value 0.01939
scoring_system epss
scoring_elements 0.83425
published_at 2026-04-12T12:55:00Z
3
value 0.01939
scoring_system epss
scoring_elements 0.83382
published_at 2026-04-04T12:55:00Z
4
value 0.01939
scoring_system epss
scoring_elements 0.83367
published_at 2026-04-02T12:55:00Z
5
value 0.01939
scoring_system epss
scoring_elements 0.83354
published_at 2026-04-01T12:55:00Z
6
value 0.01939
scoring_system epss
scoring_elements 0.8342
published_at 2026-04-13T12:55:00Z
7
value 0.01939
scoring_system epss
scoring_elements 0.83456
published_at 2026-04-16T12:55:00Z
8
value 0.01939
scoring_system epss
scoring_elements 0.83457
published_at 2026-04-21T12:55:00Z
9
value 0.01939
scoring_system epss
scoring_elements 0.83406
published_at 2026-04-08T12:55:00Z
10
value 0.01939
scoring_system epss
scoring_elements 0.83381
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-8945
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1795838
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1795838
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8945
7
reference_url https://github.com/containers/image/commit/4c7a23f82ef09127b0ff28366d1cf31316dd6cc1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/containers/image/commit/4c7a23f82ef09127b0ff28366d1cf31316dd6cc1
8
reference_url https://github.com/proglottis/gpgme
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/proglottis/gpgme
9
reference_url https://github.com/proglottis/gpgme/commit/92153bcb59bd2f511e502262c46c7bd660e21733
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/proglottis/gpgme/commit/92153bcb59bd2f511e502262c46c7bd660e21733
10
reference_url https://github.com/proglottis/gpgme/compare/v0.1.0...v0.1.1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/proglottis/gpgme/compare/v0.1.0...v0.1.1
11
reference_url https://github.com/proglottis/gpgme/pull/23
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/proglottis/gpgme/pull/23
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3SOCLOPTSYABTE4CLTSPDIFE6ZZZR4LX
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3SOCLOPTSYABTE4CLTSPDIFE6ZZZR4LX
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H6P6SSNKN4H6GSEVROHBDXA64PX7EOED
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H6P6SSNKN4H6GSEVROHBDXA64PX7EOED
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KDBT77KV3U7BESJX3P4S4MPVDGRTAQA2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KDBT77KV3U7BESJX3P4S4MPVDGRTAQA2
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WXV7NZELYWRRCXATXU3FYD3G3WJT3WYM
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WXV7NZELYWRRCXATXU3FYD3G3WJT3WYM
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-8945
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-8945
17
reference_url https://pkg.go.dev/vuln/GO-2021-0096
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://pkg.go.dev/vuln/GO-2021-0096
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=951372
reference_id 951372
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=951372
19
reference_url https://access.redhat.com/errata/RHSA-2020:0863
reference_id RHSA-2020:0863
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0863
20
reference_url https://access.redhat.com/errata/RHSA-2020:0928
reference_id RHSA-2020:0928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0928
21
reference_url https://access.redhat.com/errata/RHSA-2020:0934
reference_id RHSA-2020:0934
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0934
22
reference_url https://access.redhat.com/errata/RHSA-2020:1230
reference_id RHSA-2020:1230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1230
23
reference_url https://access.redhat.com/errata/RHSA-2020:1231
reference_id RHSA-2020:1231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1231
24
reference_url https://access.redhat.com/errata/RHSA-2020:1234
reference_id RHSA-2020:1234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1234
25
reference_url https://access.redhat.com/errata/RHSA-2020:1396
reference_id RHSA-2020:1396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1396
26
reference_url https://access.redhat.com/errata/RHSA-2020:1402
reference_id RHSA-2020:1402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1402
27
reference_url https://access.redhat.com/errata/RHSA-2020:1937
reference_id RHSA-2020:1937
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1937
28
reference_url https://access.redhat.com/errata/RHSA-2020:1940
reference_id RHSA-2020:1940
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1940
29
reference_url https://access.redhat.com/errata/RHSA-2020:2027
reference_id RHSA-2020:2027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2027
30
reference_url https://access.redhat.com/errata/RHSA-2020:2117
reference_id RHSA-2020:2117
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2117
31
reference_url https://access.redhat.com/errata/RHSA-2020:2413
reference_id RHSA-2020:2413
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2413
32
reference_url https://access.redhat.com/errata/RHSA-2020:2927
reference_id RHSA-2020:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2927
33
reference_url https://access.redhat.com/errata/RHSA-2020:2992
reference_id RHSA-2020:2992
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2992
34
reference_url https://access.redhat.com/errata/RHSA-2020:3167
reference_id RHSA-2020:3167
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3167
fixed_packages
aliases CVE-2020-8945, GHSA-m6wg-2mwg-4rfq
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vfxz-vfmr-w3d1
2
url VCID-zex4-9xyf-6yf1
vulnerability_id VCID-zex4-9xyf-6yf1
summary
Multiple vulnerabilities have been discovered in runC, the worst of
    which may lead to privilege escalation.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00073.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00073.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00009.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00009.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00010.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00010.html
3
reference_url https://access.redhat.com/errata/RHSA-2019:3940
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:3940
4
reference_url https://access.redhat.com/errata/RHSA-2019:4074
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4074
5
reference_url https://access.redhat.com/errata/RHSA-2019:4269
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4269
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16884.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16884.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-16884
reference_id
reference_type
scores
0
value 0.00335
scoring_system epss
scoring_elements 0.56364
published_at 2026-04-09T12:55:00Z
1
value 0.00335
scoring_system epss
scoring_elements 0.56359
published_at 2026-04-08T12:55:00Z
2
value 0.00335
scoring_system epss
scoring_elements 0.56308
published_at 2026-04-07T12:55:00Z
3
value 0.00348
scoring_system epss
scoring_elements 0.57348
published_at 2026-04-21T12:55:00Z
4
value 0.00348
scoring_system epss
scoring_elements 0.57389
published_at 2026-04-11T12:55:00Z
5
value 0.00348
scoring_system epss
scoring_elements 0.57374
published_at 2026-04-16T12:55:00Z
6
value 0.00348
scoring_system epss
scoring_elements 0.57369
published_at 2026-04-18T12:55:00Z
7
value 0.00485
scoring_system epss
scoring_elements 0.65308
published_at 2026-04-02T12:55:00Z
8
value 0.00485
scoring_system epss
scoring_elements 0.65333
published_at 2026-04-04T12:55:00Z
9
value 0.00485
scoring_system epss
scoring_elements 0.65258
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-16884
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16884
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://github.com/crosbymichael/runc/commit/78dce1cf1ec36bbe7fe6767bdb81f7cbf6d34d70
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/crosbymichael/runc/commit/78dce1cf1ec36bbe7fe6767bdb81f7cbf6d34d70
11
reference_url https://github.com/opencontainers/runc
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc
12
reference_url https://github.com/opencontainers/runc/commit/cad42f6e0932db0ce08c3a3d9e89e6063ec283e4
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc/commit/cad42f6e0932db0ce08c3a3d9e89e6063ec283e4
13
reference_url https://github.com/opencontainers/runc/issues/2128
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc/issues/2128
14
reference_url https://github.com/opencontainers/runc/pull/2129
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc/pull/2129
15
reference_url https://github.com/opencontainers/runc/pull/2130
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc/pull/2130
16
reference_url https://github.com/opencontainers/selinux/commit/03b517dc4fd57245b1cf506e8ba7b817b6d309da
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/selinux/commit/03b517dc4fd57245b1cf506e8ba7b817b6d309da
17
reference_url https://lists.debian.org/debian-lts-announce/2023/02/msg00016.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2023/02/msg00016.html
18
reference_url https://lists.debian.org/debian-lts-announce/2023/03/msg00023.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2023/03/msg00023.html
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62OQ2P7K5YDZ5BRCH2Q6DHUJIHQD3QCD/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62OQ2P7K5YDZ5BRCH2Q6DHUJIHQD3QCD/
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DGK6IV5JGVDXHOXEKJOJWKOVNZLT6MYR/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DGK6IV5JGVDXHOXEKJOJWKOVNZLT6MYR/
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPK4JWP32BUIVDJ3YODZSOEVEW6BHQCF/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPK4JWP32BUIVDJ3YODZSOEVEW6BHQCF/
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62OQ2P7K5YDZ5BRCH2Q6DHUJIHQD3QCD
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62OQ2P7K5YDZ5BRCH2Q6DHUJIHQD3QCD
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGK6IV5JGVDXHOXEKJOJWKOVNZLT6MYR
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGK6IV5JGVDXHOXEKJOJWKOVNZLT6MYR
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPK4JWP32BUIVDJ3YODZSOEVEW6BHQCF
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPK4JWP32BUIVDJ3YODZSOEVEW6BHQCF
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-16884
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2019-16884
26
reference_url https://pkg.go.dev/vuln/GO-2021-0085
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://pkg.go.dev/vuln/GO-2021-0085
27
reference_url https://security.netapp.com/advisory/ntap-20220221-0004
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20220221-0004
28
reference_url https://security.netapp.com/advisory/ntap-20220221-0004/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20220221-0004/
29
reference_url https://usn.ubuntu.com/4297-1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://usn.ubuntu.com/4297-1
30
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1757214
reference_id 1757214
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1757214
31
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942026
reference_id 942026
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942026
32
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942027
reference_id 942027
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942027
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:docker:docker:*:*:*:*:community:*:*:*
reference_id cpe:2.3:a:docker:docker:*:*:*:*:community:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:docker:docker:*:*:*:*:community:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:runc:1.0.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc1:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:runc:1.0.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc2:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:runc:1.0.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc3:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:runc:1.0.0:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc4:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc5:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:runc:1.0.0:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc5:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc6:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:runc:1.0.0:rc6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc6:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc7:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:runc:1.0.0:rc7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc7:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc8:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:runc:1.0.0:rc8:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc8:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift_container_platform:4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
60
reference_url https://security.gentoo.org/glsa/202003-21
reference_id GLSA-202003-21
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/202003-21
61
reference_url https://access.redhat.com/errata/RHSA-2020:1234
reference_id RHSA-2020:1234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1234
62
reference_url https://usn.ubuntu.com/4297-1/
reference_id USN-4297-1
reference_type
scores
url https://usn.ubuntu.com/4297-1/
63
reference_url https://usn.ubuntu.com/USN-4867-1/
reference_id USN-USN-4867-1
reference_type
scores
url https://usn.ubuntu.com/USN-4867-1/
fixed_packages
aliases CVE-2019-16884, GHSA-fgv8-vj5c-2ppq
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zex4-9xyf-6yf1
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/docker@2:1.13.1-161.git64e9980%3Farch=el7_8