Lookup for vulnerable packages by Package URL.

GET /api/packages/104911?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/104911?format=api",
    "purl": "pkg:rpm/redhat/kernel-alt@4.14.0-115.18.1?arch=el7a",
    "type": "rpm",
    "namespace": "redhat",
    "name": "kernel-alt",
    "version": "4.14.0-115.18.1",
    "qualifiers": {
        "arch": "el7a"
    },
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82123?format=api",
            "vulnerability_id": "VCID-cjcd-saft-fqds",
            "summary": "kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15916.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15916.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-15916",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02564",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85576",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02564",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85522",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02564",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85545",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02564",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8555",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02564",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85546",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02564",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85568",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02564",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85578",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02564",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85484",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02564",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85504",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02564",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85512",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02564",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85527",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02564",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85525",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02605",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85565",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02605",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85583",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02605",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85553",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-15916"
                },
                {
                    "reference_url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.1"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15916",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15916"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=895a5e96dbd6386c8e78e5b78e067dcc67b7f0ab",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=895a5e96dbd6386c8e78e5b78e067dcc67b7f0ab"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20191004-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20191004-0001/"
                },
                {
                    "reference_url": "https://support.f5.com/csp/article/K57418558?utm_source=f5support&amp%3Butm_medium=RSS",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.f5.com/csp/article/K57418558?utm_source=f5support&amp%3Butm_medium=RSS"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1750813",
                    "reference_id": "1750813",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1750813"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15916",
                    "reference_id": "CVE-2019-15916",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:C"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15916"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:3309",
                    "reference_id": "RHSA-2019:3309",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:3309"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:3517",
                    "reference_id": "RHSA-2019:3517",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:3517"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0740",
                    "reference_id": "RHSA-2020:0740",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0740"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1016",
                    "reference_id": "RHSA-2020:1016",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1016"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1070",
                    "reference_id": "RHSA-2020:1070",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1070"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:2522",
                    "reference_id": "RHSA-2020:2522",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:2522"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:2851",
                    "reference_id": "RHSA-2020:2851",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:2851"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2019-15916"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cjcd-saft-fqds"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82877?format=api",
            "vulnerability_id": "VCID-ffu4-v4aq-1bdz",
            "summary": "kernel: Heap address information leak while using L2CAP_GET_CONF_OPT",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3459.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3459.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3459",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00465",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64267",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00465",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64416",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00465",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64381",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00465",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64392",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00465",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64383",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00465",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64403",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00465",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64325",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00465",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64353",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00465",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64311",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00465",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64359",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00465",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64374",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00465",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64386",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00465",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64345",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3459"
                },
                {
                    "reference_url": "https://bugzilla.novell.com/show_bug.cgi?id=1120758",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.novell.com/show_bug.cgi?id=1120758"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3459",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3459"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/linus/7c9cbd0b5e38a1672fcd137894ace3b042dfbf69",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://git.kernel.org/linus/7c9cbd0b5e38a1672fcd137894ace3b042dfbf69"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html"
                },
                {
                    "reference_url": "https://lore.kernel.org/linux-bluetooth/20190110062833.GA15047%40kroah.com/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lore.kernel.org/linux-bluetooth/20190110062833.GA15047%40kroah.com/"
                },
                {
                    "reference_url": "https://marc.info/?l=oss-security&m=154721580222522&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://marc.info/?l=oss-security&m=154721580222522&w=2"
                },
                {
                    "reference_url": "https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3459.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3459.html"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2019/06/27/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2019/06/27/2"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2019/06/27/7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2019/06/27/7"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2019/06/28/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2019/06/28/1"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2019/06/28/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2019/06/28/2"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2019/08/12/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2019/08/12/1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663176",
                    "reference_id": "1663176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663176"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-988",
                    "reference_id": "AVG-988",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-988"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3459",
                    "reference_id": "CVE-2019-3459",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:A/AC:L/Au:N/C:P/I:N/A:N"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3459"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:2029",
                    "reference_id": "RHSA-2019:2029",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:2029"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:2043",
                    "reference_id": "RHSA-2019:2043",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:2043"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:3309",
                    "reference_id": "RHSA-2019:3309",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:3309"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:3517",
                    "reference_id": "RHSA-2019:3517",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:3517"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0740",
                    "reference_id": "RHSA-2020:0740",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0740"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3930-1/",
                    "reference_id": "USN-3930-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3930-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3930-2/",
                    "reference_id": "USN-3930-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3930-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3931-1/",
                    "reference_id": "USN-3931-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3931-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3931-2/",
                    "reference_id": "USN-3931-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3931-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3932-1/",
                    "reference_id": "USN-3932-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3932-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3932-2/",
                    "reference_id": "USN-3932-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3932-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3933-1/",
                    "reference_id": "USN-3933-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3933-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3933-2/",
                    "reference_id": "USN-3933-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3933-2/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2019-3459"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ffu4-v4aq-1bdz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82117?format=api",
            "vulnerability_id": "VCID-ftpc-yjny-9qdw",
            "summary": "kernel: powerpc: local user can read vector registers of other users' processes via a Facility Unavailable exception",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15030.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15030.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-15030",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23298",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23129",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23335",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23144",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23137",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23471",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23508",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23292",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23364",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23415",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23435",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23397",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23344",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23361",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23355",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-15030"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15030",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15030"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8205d5d98ef7f155de211f5e2eb6ca03d95a5a60",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8205d5d98ef7f155de211f5e2eb6ca03d95a5a60"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20191004-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20191004-0001/"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2019/09/10/3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2019/09/10/3"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759313",
                    "reference_id": "1759313",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759313"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15030",
                    "reference_id": "CVE-2019-15030",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:N/A:P"
                        },
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15030"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0740",
                    "reference_id": "RHSA-2020:0740",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0740"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1372",
                    "reference_id": "RHSA-2020:1372",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1372"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4135-1/",
                    "reference_id": "USN-4135-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4135-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4135-2/",
                    "reference_id": "USN-4135-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4135-2/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2019-15030"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ftpc-yjny-9qdw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82878?format=api",
            "vulnerability_id": "VCID-h2h4-ypwg-rbh8",
            "summary": "kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3460.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3460.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3460",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00465",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64267",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00465",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64416",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00465",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64381",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00465",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64392",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00465",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64383",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00465",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64403",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00465",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64325",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00465",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64353",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00465",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64311",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00465",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64359",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00465",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64374",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00465",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64386",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00465",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64345",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3460"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3460",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3460"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.kernel.org/linus/af3d5d1c87664a4f150fcf3534c6567cb19909b0",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://git.kernel.org/linus/af3d5d1c87664a4f150fcf3534c6567cb19909b0"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html"
                },
                {
                    "reference_url": "https://lore.kernel.org/linux-bluetooth/20190110062917.GB15047%40kroah.com/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lore.kernel.org/linux-bluetooth/20190110062917.GB15047%40kroah.com/"
                },
                {
                    "reference_url": "https://marc.info/?l=oss-security&m=154721580222522&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://marc.info/?l=oss-security&m=154721580222522&w=2"
                },
                {
                    "reference_url": "https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3460.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3460.html"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2019/06/27/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2019/06/27/2"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2019/06/27/7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2019/06/27/7"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2019/06/28/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2019/06/28/1"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2019/06/28/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2019/06/28/2"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2019/08/12/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2019/08/12/1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663179",
                    "reference_id": "1663179",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663179"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-988",
                    "reference_id": "AVG-988",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-988"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3460",
                    "reference_id": "CVE-2019-3460",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:A/AC:L/Au:N/C:P/I:N/A:N"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3460"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:2029",
                    "reference_id": "RHSA-2019:2029",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:2029"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:2043",
                    "reference_id": "RHSA-2019:2043",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:2043"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:3309",
                    "reference_id": "RHSA-2019:3309",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:3309"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:3517",
                    "reference_id": "RHSA-2019:3517",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:3517"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0740",
                    "reference_id": "RHSA-2020:0740",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0740"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3930-1/",
                    "reference_id": "USN-3930-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3930-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3930-2/",
                    "reference_id": "USN-3930-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3930-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3931-1/",
                    "reference_id": "USN-3931-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3931-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3931-2/",
                    "reference_id": "USN-3931-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3931-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3932-1/",
                    "reference_id": "USN-3932-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3932-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3932-2/",
                    "reference_id": "USN-3932-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3932-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3933-1/",
                    "reference_id": "USN-3933-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3933-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3933-2/",
                    "reference_id": "USN-3933-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3933-2/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2019-3460"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h2h4-ypwg-rbh8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82641?format=api",
            "vulnerability_id": "VCID-h5gr-4v52-kybw",
            "summary": "kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-18805.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-18805.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-18805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68541",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68559",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68577",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68554",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68605",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68623",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68648",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68635",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68606",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68645",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68656",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68636",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68685",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6869",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68695",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-18805"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18805"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771496",
                    "reference_id": "1771496",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771496"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0740",
                    "reference_id": "RHSA-2020:0740",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0740"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1567",
                    "reference_id": "RHSA-2020:1567",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1567"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1769",
                    "reference_id": "RHSA-2020:1769",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1769"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2019-18805"
            ],
            "risk_score": 3.3,
            "exploitability": "0.5",
            "weighted_severity": "6.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h5gr-4v52-kybw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79052?format=api",
            "vulnerability_id": "VCID-jqvb-tqv1-dfe5",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11884.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11884.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11884",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14775",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14825",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14904",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14705",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14796",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14856",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14813",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14776",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1472",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14614",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14621",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14684",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14715",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14714",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1465",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11884"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10126",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10126"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11486",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11486"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11599",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11599"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11815",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11815"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11833",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11833"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11884",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11884"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3846",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3846"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5489",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5489"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9500",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9500"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9503",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9503"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709837",
                    "reference_id": "1709837",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709837"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:3309",
                    "reference_id": "RHSA-2019:3309",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:3309"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:3517",
                    "reference_id": "RHSA-2019:3517",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:3517"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0740",
                    "reference_id": "RHSA-2020:0740",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0740"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1016",
                    "reference_id": "RHSA-2020:1016",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1016"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1070",
                    "reference_id": "RHSA-2020:1070",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1070"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4068-1/",
                    "reference_id": "USN-4068-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4068-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4068-2/",
                    "reference_id": "USN-4068-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4068-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4069-1/",
                    "reference_id": "USN-4069-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4069-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4069-2/",
                    "reference_id": "USN-4069-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4069-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4076-1/",
                    "reference_id": "USN-4076-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4076-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4118-1/",
                    "reference_id": "USN-4118-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4118-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2019-11884"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jqvb-tqv1-dfe5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82497?format=api",
            "vulnerability_id": "VCID-w97y-ev7x-b7cv",
            "summary": "kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16871.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16871.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16871",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81216",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81225",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81248",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81246",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81275",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8128",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.813",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81287",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81279",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81316",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81318",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8134",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81347",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81352",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16871"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16871",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16871"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655162",
                    "reference_id": "1655162",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655162"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:1873",
                    "reference_id": "RHSA-2019:1873",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:1873"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:1891",
                    "reference_id": "RHSA-2019:1891",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:1891"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:2696",
                    "reference_id": "RHSA-2019:2696",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:2696"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:2730",
                    "reference_id": "RHSA-2019:2730",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:2730"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0740",
                    "reference_id": "RHSA-2020:0740",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0740"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1567",
                    "reference_id": "RHSA-2020:1567",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1567"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1769",
                    "reference_id": "RHSA-2020:1769",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1769"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2018-16871"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w97y-ev7x-b7cv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81908?format=api",
            "vulnerability_id": "VCID-yy9m-hrxz-mkhg",
            "summary": "kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17666.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17666.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17666",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63457",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63598",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63593",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63578",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6358",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63589",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63572",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6359",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63603",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63516",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63544",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63508",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6356",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63577",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17666"
                },
                {
                    "reference_url": "https://arstechnica.com/information-technology/2019/10/unpatched-linux-flaw-may-let-attackers-crash-or-compromise-nearby-devices/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://arstechnica.com/information-technology/2019/10/unpatched-linux-flaw-may-let-attackers-crash-or-compromise-nearby-devices/"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17666",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17666"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRBP4O6D2SQ2NHCRHTJONGCZLWOIV5MN/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRBP4O6D2SQ2NHCRHTJONGCZLWOIV5MN/"
                },
                {
                    "reference_url": "https://lkml.org/lkml/2019/10/16/1226",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lkml.org/lkml/2019/10/16/1226"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20191031-0005/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20191031-0005/"
                },
                {
                    "reference_url": "https://twitter.com/nicowaisman/status/1184864519316758535",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://twitter.com/nicowaisman/status/1184864519316758535"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763690",
                    "reference_id": "1763690",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763690"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201911-10",
                    "reference_id": "ASA-201911-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201911-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201911-11",
                    "reference_id": "ASA-201911-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201911-11"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201911-12",
                    "reference_id": "ASA-201911-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201911-12"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201911-9",
                    "reference_id": "ASA-201911-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201911-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1063",
                    "reference_id": "AVG-1063",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1063"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1064",
                    "reference_id": "AVG-1064",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1064"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1065",
                    "reference_id": "AVG-1065",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1065"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1066",
                    "reference_id": "AVG-1066",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1066"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17666",
                    "reference_id": "CVE-2019-17666",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:A/AC:L/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17666"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0328",
                    "reference_id": "RHSA-2020:0328",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0328"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0339",
                    "reference_id": "RHSA-2020:0339",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0339"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0543",
                    "reference_id": "RHSA-2020:0543",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0543"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0661",
                    "reference_id": "RHSA-2020:0661",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0661"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0740",
                    "reference_id": "RHSA-2020:0740",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0740"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0831",
                    "reference_id": "RHSA-2020:0831",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0831"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0834",
                    "reference_id": "RHSA-2020:0834",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0834"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0839",
                    "reference_id": "RHSA-2020:0839",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0839"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1347",
                    "reference_id": "RHSA-2020:1347",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1347"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1353",
                    "reference_id": "RHSA-2020:1353",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1353"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1465",
                    "reference_id": "RHSA-2020:1465",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1465"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1473",
                    "reference_id": "RHSA-2020:1473",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1473"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1524",
                    "reference_id": "RHSA-2020:1524",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1524"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4183-1/",
                    "reference_id": "USN-4183-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4183-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4184-1/",
                    "reference_id": "USN-4184-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4184-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4185-1/",
                    "reference_id": "USN-4185-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4185-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4186-1/",
                    "reference_id": "USN-4186-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4186-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4186-2/",
                    "reference_id": "USN-4186-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4186-2/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2019-17666"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yy9m-hrxz-mkhg"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "4.5",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-alt@4.14.0-115.18.1%3Farch=el7a"
}