Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/106124?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/106124?format=api", "purl": "pkg:rpm/redhat/qemu-kvm-rhev@10:2.12.0-33?arch=el7", "type": "rpm", "namespace": "redhat", "name": "qemu-kvm-rhev", "version": "10:2.12.0-33", "qualifiers": { "arch": "el7" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43770?format=api", "vulnerability_id": "VCID-32jy-dr7t-2uas", "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20815.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20815.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20815", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03861", "scoring_system": "epss", "scoring_elements": "0.88157", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03861", "scoring_system": "epss", "scoring_elements": "0.88166", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03861", "scoring_system": "epss", "scoring_elements": "0.88182", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03861", "scoring_system": "epss", "scoring_elements": "0.88188", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03861", "scoring_system": "epss", "scoring_elements": "0.88208", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03861", "scoring_system": "epss", "scoring_elements": "0.88214", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03861", "scoring_system": "epss", "scoring_elements": "0.88224", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03861", "scoring_system": "epss", "scoring_elements": "0.88217", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03861", "scoring_system": "epss", "scoring_elements": "0.8823", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03861", "scoring_system": "epss", "scoring_elements": "0.88229", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20815" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20815", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20815" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13164", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13164" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14378", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14378" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1693101", "reference_id": "1693101", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1693101" }, { "reference_url": "https://security.gentoo.org/glsa/201904-25", "reference_id": "GLSA-201904-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201904-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1175", "reference_id": "RHSA-2019:1175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1175" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1667", "reference_id": "RHSA-2019:1667", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1667" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1723", "reference_id": "RHSA-2019:1723", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1723" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1743", "reference_id": "RHSA-2019:1743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1743" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1881", "reference_id": "RHSA-2019:1881", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1881" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1968", "reference_id": "RHSA-2019:1968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2507", "reference_id": "RHSA-2019:2507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2553", "reference_id": "RHSA-2019:2553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2553" }, { "reference_url": "https://usn.ubuntu.com/3978-1/", "reference_id": "USN-3978-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3978-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2018-20815" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-32jy-dr7t-2uas" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83218?format=api", "vulnerability_id": "VCID-56ng-2tm1-5qhk", "summary": "QEMU: seccomp: blacklist is not applied to all threads", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15746.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15746.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-15746", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16659", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16829", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16887", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16671", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16756", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.1681", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16789", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16745", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16687", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16624", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16631", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.1667", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-15746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15746" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1615637", "reference_id": "1615637", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1615637" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907500", "reference_id": "907500", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2425", "reference_id": "RHSA-2019:2425", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2425" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3267", "reference_id": "RHSA-2020:3267", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3267" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3906", "reference_id": "RHSA-2020:3906", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3906" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3907", "reference_id": "RHSA-2020:3907", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3907" } ], "fixed_packages": [], "aliases": [ "CVE-2018-15746" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-56ng-2tm1-5qhk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73621?format=api", "vulnerability_id": "VCID-7w8v-hby8-dya5", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17958.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17958.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-17958", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00888", "scoring_system": "epss", "scoring_elements": "0.75425", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00888", "scoring_system": "epss", "scoring_elements": "0.75428", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00888", "scoring_system": "epss", "scoring_elements": "0.7546", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00888", "scoring_system": "epss", "scoring_elements": "0.7544", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00888", "scoring_system": "epss", "scoring_elements": "0.75483", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00888", "scoring_system": "epss", "scoring_elements": "0.75492", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00888", "scoring_system": "epss", "scoring_elements": "0.75511", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00888", "scoring_system": "epss", "scoring_elements": "0.7549", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00888", "scoring_system": "epss", "scoring_elements": "0.7548", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00888", "scoring_system": "epss", "scoring_elements": "0.75522", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00888", "scoring_system": "epss", "scoring_elements": "0.75527", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00888", "scoring_system": "epss", "scoring_elements": "0.75516", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-17958" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11806", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11806" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12617", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12617" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16872", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16872" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17958", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17958" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18849", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18849" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18954", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18954" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12155", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12155" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3812", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3812" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6778", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6778" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9824" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1636712", "reference_id": "1636712", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1636712" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=911499", "reference_id": "911499", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=911499" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2425", "reference_id": "RHSA-2019:2425", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2425" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2553", "reference_id": "RHSA-2019:2553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2553" }, { "reference_url": "https://usn.ubuntu.com/3826-1/", "reference_id": "USN-3826-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3826-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2018-17958" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7w8v-hby8-dya5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4184?format=api", "vulnerability_id": "VCID-9yut-bdsw-gkfy", "summary": "Microarchitectural Data Sampling speculative side channel", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12127.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12127.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12127", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65634", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65683", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65713", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65678", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.6573", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65742", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65763", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65748", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65719", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65754", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65767", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65753", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1667782", "reference_id": "1667782", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1667782" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929129", "reference_id": "929129", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929129" }, { "reference_url": "https://security.gentoo.org/glsa/202003-56", "reference_id": "GLSA-202003-56", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1155", "reference_id": "RHSA-2019:1155", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1155" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1167", "reference_id": "RHSA-2019:1167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1168", "reference_id": "RHSA-2019:1168", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1168" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1169", "reference_id": "RHSA-2019:1169", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1169" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1170", "reference_id": "RHSA-2019:1170", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1170" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1171", "reference_id": "RHSA-2019:1171", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1171" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1172", "reference_id": "RHSA-2019:1172", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1172" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1174", "reference_id": "RHSA-2019:1174", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1174" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1175", "reference_id": "RHSA-2019:1175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1175" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1176", "reference_id": "RHSA-2019:1176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1176" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1177", "reference_id": "RHSA-2019:1177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1177" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1178", "reference_id": "RHSA-2019:1178", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1178" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1179", "reference_id": "RHSA-2019:1179", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1179" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1180", "reference_id": "RHSA-2019:1180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1180" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1181", "reference_id": "RHSA-2019:1181", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1181" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1182", "reference_id": "RHSA-2019:1182", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1182" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1183", "reference_id": "RHSA-2019:1183", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1183" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1184", "reference_id": "RHSA-2019:1184", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1184" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1185", "reference_id": "RHSA-2019:1185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1186", "reference_id": "RHSA-2019:1186", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1186" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1187", "reference_id": "RHSA-2019:1187", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1187" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1188", "reference_id": "RHSA-2019:1188", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1188" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1189", "reference_id": "RHSA-2019:1189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1190", "reference_id": "RHSA-2019:1190", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1190" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1193", "reference_id": "RHSA-2019:1193", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1193" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1194", "reference_id": "RHSA-2019:1194", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1194" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1195", "reference_id": "RHSA-2019:1195", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1195" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1196", "reference_id": "RHSA-2019:1196", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1196" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1197", "reference_id": "RHSA-2019:1197", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1197" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1198", "reference_id": "RHSA-2019:1198", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1198" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1199", "reference_id": "RHSA-2019:1199", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1199" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1200", "reference_id": "RHSA-2019:1200", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1200" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1201", "reference_id": "RHSA-2019:1201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1201" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1202", "reference_id": "RHSA-2019:1202", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1202" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1203", "reference_id": "RHSA-2019:1203", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1203" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1204", "reference_id": "RHSA-2019:1204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1205", "reference_id": "RHSA-2019:1205", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1205" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1206", "reference_id": "RHSA-2019:1206", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1206" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1207", "reference_id": "RHSA-2019:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1207" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1208", "reference_id": "RHSA-2019:1208", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1208" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1209", "reference_id": "RHSA-2019:1209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1455", "reference_id": "RHSA-2019:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1455" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2553", "reference_id": "RHSA-2019:2553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2553" }, { "reference_url": "https://usn.ubuntu.com/3977-1/", "reference_id": "USN-3977-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-1/" }, { "reference_url": "https://usn.ubuntu.com/3977-2/", "reference_id": "USN-3977-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-2/" }, { "reference_url": "https://usn.ubuntu.com/3977-3/", "reference_id": "USN-3977-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-3/" }, { "reference_url": "https://usn.ubuntu.com/3978-1/", "reference_id": "USN-3978-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3978-1/" }, { "reference_url": "https://usn.ubuntu.com/3979-1/", "reference_id": "USN-3979-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3979-1/" }, { "reference_url": "https://usn.ubuntu.com/3980-1/", "reference_id": "USN-3980-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3980-1/" }, { "reference_url": "https://usn.ubuntu.com/3980-2/", "reference_id": "USN-3980-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3980-2/" }, { "reference_url": "https://usn.ubuntu.com/3981-1/", "reference_id": "USN-3981-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3981-1/" }, { "reference_url": "https://usn.ubuntu.com/3981-2/", "reference_id": "USN-3981-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3981-2/" }, { "reference_url": "https://usn.ubuntu.com/3982-1/", "reference_id": "USN-3982-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3982-1/" }, { "reference_url": "https://usn.ubuntu.com/3982-2/", "reference_id": "USN-3982-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3982-2/" }, { "reference_url": "https://usn.ubuntu.com/3983-1/", "reference_id": "USN-3983-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3983-1/" }, { "reference_url": "https://usn.ubuntu.com/3983-2/", "reference_id": "USN-3983-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3983-2/" }, { "reference_url": "https://usn.ubuntu.com/3984-1/", "reference_id": "USN-3984-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3984-1/" }, { "reference_url": "https://usn.ubuntu.com/3985-1/", "reference_id": "USN-3985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3985-1/" }, { "reference_url": "https://usn.ubuntu.com/3985-2/", "reference_id": "USN-3985-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3985-2/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-297.html", "reference_id": "XSA-297", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-297.html" } ], "fixed_packages": [], "aliases": [ "CVE-2018-12127" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9yut-bdsw-gkfy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73373?format=api", "vulnerability_id": "VCID-f4w9-adpm-tuht", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17963.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17963.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-17963", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01526", "scoring_system": "epss", "scoring_elements": "0.81221", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01526", "scoring_system": "epss", "scoring_elements": "0.81229", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01526", "scoring_system": "epss", "scoring_elements": "0.81253", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01526", "scoring_system": "epss", "scoring_elements": "0.81251", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01526", "scoring_system": "epss", "scoring_elements": "0.81279", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01526", "scoring_system": "epss", "scoring_elements": "0.81284", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01526", "scoring_system": "epss", "scoring_elements": "0.81305", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01526", "scoring_system": "epss", "scoring_elements": "0.81291", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01526", "scoring_system": "epss", "scoring_elements": "0.81321", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01526", "scoring_system": "epss", "scoring_elements": "0.81323", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01526", "scoring_system": "epss", "scoring_elements": "0.81322", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-17963" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10839", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10839" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17962", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17962" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17963", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17963" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1636777", "reference_id": "1636777", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1636777" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=911469", "reference_id": "911469", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=911469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2166", "reference_id": "RHSA-2019:2166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2425", "reference_id": "RHSA-2019:2425", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2425" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2553", "reference_id": "RHSA-2019:2553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2553" }, { "reference_url": "https://usn.ubuntu.com/3826-1/", "reference_id": "USN-3826-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3826-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2018-17963" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f4w9-adpm-tuht" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4186?format=api", "vulnerability_id": "VCID-k45n-139y-pyeq", "summary": "Microarchitectural Data Sampling speculative side channel", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11091.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11091.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11091", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82207", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.8222", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.8224", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82236", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82262", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.8227", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82289", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82282", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82276", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82312", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82314", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11091" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705312", "reference_id": "1705312", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705312" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929129", "reference_id": "929129", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929129" }, { "reference_url": "https://security.gentoo.org/glsa/202003-56", "reference_id": "GLSA-202003-56", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1155", "reference_id": "RHSA-2019:1155", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1155" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1167", "reference_id": "RHSA-2019:1167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1168", "reference_id": "RHSA-2019:1168", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1168" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1169", "reference_id": "RHSA-2019:1169", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1169" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1170", "reference_id": "RHSA-2019:1170", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1170" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1171", "reference_id": "RHSA-2019:1171", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1171" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1172", "reference_id": "RHSA-2019:1172", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1172" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1174", "reference_id": "RHSA-2019:1174", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1174" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1175", "reference_id": "RHSA-2019:1175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1175" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1176", "reference_id": "RHSA-2019:1176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1176" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1177", "reference_id": "RHSA-2019:1177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1177" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1178", "reference_id": "RHSA-2019:1178", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1178" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1179", "reference_id": "RHSA-2019:1179", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1179" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1180", "reference_id": "RHSA-2019:1180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1180" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1181", "reference_id": "RHSA-2019:1181", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1181" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1182", "reference_id": "RHSA-2019:1182", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1182" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1183", "reference_id": "RHSA-2019:1183", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1183" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1184", "reference_id": "RHSA-2019:1184", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1184" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1185", "reference_id": "RHSA-2019:1185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1186", "reference_id": "RHSA-2019:1186", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1186" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1187", "reference_id": "RHSA-2019:1187", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1187" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1188", "reference_id": "RHSA-2019:1188", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1188" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1189", "reference_id": "RHSA-2019:1189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1190", "reference_id": "RHSA-2019:1190", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1190" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1193", "reference_id": "RHSA-2019:1193", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1193" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1194", "reference_id": "RHSA-2019:1194", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1194" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1195", "reference_id": "RHSA-2019:1195", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1195" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1196", "reference_id": "RHSA-2019:1196", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1196" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1197", "reference_id": "RHSA-2019:1197", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1197" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1198", "reference_id": "RHSA-2019:1198", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1198" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1199", "reference_id": "RHSA-2019:1199", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1199" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1200", "reference_id": "RHSA-2019:1200", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1200" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1201", "reference_id": "RHSA-2019:1201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1201" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1202", "reference_id": "RHSA-2019:1202", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1202" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1203", "reference_id": "RHSA-2019:1203", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1203" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1204", "reference_id": "RHSA-2019:1204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1205", "reference_id": "RHSA-2019:1205", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1205" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1206", "reference_id": "RHSA-2019:1206", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1206" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1207", "reference_id": "RHSA-2019:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1207" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1208", "reference_id": "RHSA-2019:1208", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1208" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1209", "reference_id": "RHSA-2019:1209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1455", "reference_id": "RHSA-2019:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1455" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2553", "reference_id": "RHSA-2019:2553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2553" }, { "reference_url": "https://usn.ubuntu.com/3977-1/", "reference_id": "USN-3977-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-1/" }, { "reference_url": "https://usn.ubuntu.com/3977-2/", "reference_id": "USN-3977-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-2/" }, { "reference_url": "https://usn.ubuntu.com/3977-3/", "reference_id": "USN-3977-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-3/" }, { "reference_url": "https://usn.ubuntu.com/3978-1/", "reference_id": "USN-3978-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3978-1/" }, { "reference_url": "https://usn.ubuntu.com/3979-1/", "reference_id": "USN-3979-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3979-1/" }, { "reference_url": "https://usn.ubuntu.com/3980-1/", "reference_id": "USN-3980-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3980-1/" }, { "reference_url": "https://usn.ubuntu.com/3980-2/", "reference_id": "USN-3980-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3980-2/" }, { "reference_url": "https://usn.ubuntu.com/3981-1/", "reference_id": "USN-3981-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3981-1/" }, { "reference_url": "https://usn.ubuntu.com/3981-2/", "reference_id": "USN-3981-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3981-2/" }, { "reference_url": "https://usn.ubuntu.com/3982-1/", "reference_id": "USN-3982-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3982-1/" }, { "reference_url": "https://usn.ubuntu.com/3982-2/", "reference_id": "USN-3982-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3982-2/" }, { "reference_url": "https://usn.ubuntu.com/3983-1/", "reference_id": "USN-3983-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3983-1/" }, { "reference_url": "https://usn.ubuntu.com/3983-2/", "reference_id": "USN-3983-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3983-2/" }, { "reference_url": "https://usn.ubuntu.com/3984-1/", "reference_id": "USN-3984-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3984-1/" }, { "reference_url": "https://usn.ubuntu.com/3985-1/", "reference_id": "USN-3985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3985-1/" }, { "reference_url": "https://usn.ubuntu.com/3985-2/", "reference_id": "USN-3985-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3985-2/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-297.html", "reference_id": "XSA-297", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-297.html" } ], "fixed_packages": [], "aliases": [ "CVE-2019-11091" ], "risk_score": 1.7, "exploitability": "0.5", "weighted_severity": "3.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k45n-139y-pyeq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73636?format=api", "vulnerability_id": "VCID-mzsa-tcqf-effc", "summary": "security update", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00073.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00073.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00072.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00072.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00001.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6778.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6778.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-6778", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22685", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22721", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22753", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22767", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22762", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22861", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22905", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22697", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22773", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22825", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22847", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.2281", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-6778" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11806", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11806" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12617", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12617" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16872", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16872" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17958", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17958" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18849", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18849" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18954", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18954" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12155", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12155" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3812", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3812" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6778", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6778" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9824" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CGCFIFSIWUREEQQOZDZFBYKWZHXCWBZN/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CGCFIFSIWUREEQQOZDZFBYKWZHXCWBZN/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJMTVGDLA654HNCDGLCUEIP36SNJEKK7/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJMTVGDLA654HNCDGLCUEIP36SNJEKK7/" }, { "reference_url": "https://lists.gnu.org/archive/html/qemu-devel/2019-01/msg03132.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.gnu.org/archive/html/qemu-devel/2019-01/msg03132.html" }, { "reference_url": "https://seclists.org/bugtraq/2019/May/76", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/May/76" }, { "reference_url": "https://www.debian.org/security/2019/dsa-4454", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2019/dsa-4454" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2019/01/24/5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2019/01/24/5" }, { "reference_url": "http://www.securityfocus.com/bid/106758", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/106758" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664205", "reference_id": "1664205", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664205" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921525", "reference_id": "921525", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921525" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:3.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:qemu:qemu:3.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:3.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6778", "reference_id": "CVE-2019-6778", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6778" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1883", "reference_id": "RHSA-2019:1883", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1883" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1968", "reference_id": "RHSA-2019:1968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2425", "reference_id": "RHSA-2019:2425", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2425" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2892", "reference_id": "RHSA-2019:2892", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2892" }, { "reference_url": "https://usn.ubuntu.com/3923-1/", "reference_id": "USN-3923-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3923-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2019-6778" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mzsa-tcqf-effc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43771?format=api", "vulnerability_id": "VCID-rdgu-3kat-j7c6", "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9824.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9824.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9824", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28427", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28501", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28544", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28339", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28405", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28447", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.2845", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28408", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.2835", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28361", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28293", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11806", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11806" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12617", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12617" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16872", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16872" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17958", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17958" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18849", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18849" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18954", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18954" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12155", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12155" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3812", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3812" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6778", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6778" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9824" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1678515", "reference_id": "1678515", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1678515" }, { "reference_url": "https://security.gentoo.org/glsa/201904-25", "reference_id": "GLSA-201904-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201904-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1650", "reference_id": "RHSA-2019:1650", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1650" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2078", "reference_id": "RHSA-2019:2078", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2078" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2425", "reference_id": "RHSA-2019:2425", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2425" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2553", "reference_id": "RHSA-2019:2553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3345", "reference_id": "RHSA-2019:3345", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3345" }, { "reference_url": "https://usn.ubuntu.com/3978-1/", "reference_id": "USN-3978-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3978-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2019-9824" ], "risk_score": 1.2, "exploitability": "0.5", "weighted_severity": "2.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rdgu-3kat-j7c6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4183?format=api", "vulnerability_id": "VCID-vh89-pyaz-xbdg", "summary": "Microarchitectural Data Sampling speculative side channel", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12126.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12126.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12126", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65634", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65683", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65713", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65678", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.6573", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65742", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65763", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65748", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65719", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65754", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65767", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65753", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646781", "reference_id": "1646781", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646781" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929129", "reference_id": "929129", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929129" }, { "reference_url": "https://security.gentoo.org/glsa/202003-56", "reference_id": "GLSA-202003-56", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1155", "reference_id": "RHSA-2019:1155", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1155" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1167", "reference_id": "RHSA-2019:1167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1168", "reference_id": "RHSA-2019:1168", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1168" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1169", "reference_id": "RHSA-2019:1169", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1169" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1170", "reference_id": "RHSA-2019:1170", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1170" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1171", "reference_id": "RHSA-2019:1171", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1171" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1172", "reference_id": "RHSA-2019:1172", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1172" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1174", "reference_id": "RHSA-2019:1174", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1174" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1175", "reference_id": "RHSA-2019:1175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1175" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1176", "reference_id": "RHSA-2019:1176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1176" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1177", "reference_id": "RHSA-2019:1177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1177" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1178", "reference_id": "RHSA-2019:1178", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1178" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1179", "reference_id": "RHSA-2019:1179", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1179" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1180", "reference_id": "RHSA-2019:1180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1180" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1181", "reference_id": "RHSA-2019:1181", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1181" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1182", "reference_id": "RHSA-2019:1182", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1182" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1183", "reference_id": "RHSA-2019:1183", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1183" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1184", "reference_id": "RHSA-2019:1184", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1184" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1185", "reference_id": "RHSA-2019:1185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1186", "reference_id": "RHSA-2019:1186", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1186" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1187", "reference_id": "RHSA-2019:1187", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1187" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1188", "reference_id": "RHSA-2019:1188", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1188" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1189", "reference_id": "RHSA-2019:1189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1190", "reference_id": "RHSA-2019:1190", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1190" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1193", "reference_id": "RHSA-2019:1193", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1193" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1194", "reference_id": "RHSA-2019:1194", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1194" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1195", "reference_id": "RHSA-2019:1195", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1195" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1196", "reference_id": "RHSA-2019:1196", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1196" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1197", "reference_id": "RHSA-2019:1197", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1197" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1198", "reference_id": "RHSA-2019:1198", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1198" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1199", "reference_id": "RHSA-2019:1199", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1199" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1200", "reference_id": "RHSA-2019:1200", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1200" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1201", "reference_id": "RHSA-2019:1201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1201" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1202", "reference_id": "RHSA-2019:1202", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1202" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1203", "reference_id": "RHSA-2019:1203", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1203" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1204", "reference_id": "RHSA-2019:1204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1205", "reference_id": "RHSA-2019:1205", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1205" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1206", "reference_id": "RHSA-2019:1206", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1206" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1207", "reference_id": "RHSA-2019:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1207" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1208", "reference_id": "RHSA-2019:1208", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1208" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1209", "reference_id": "RHSA-2019:1209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1455", "reference_id": "RHSA-2019:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1455" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2553", "reference_id": "RHSA-2019:2553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2553" }, { "reference_url": "https://usn.ubuntu.com/3977-1/", "reference_id": "USN-3977-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-1/" }, { "reference_url": "https://usn.ubuntu.com/3977-2/", "reference_id": "USN-3977-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-2/" }, { "reference_url": "https://usn.ubuntu.com/3977-3/", "reference_id": "USN-3977-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-3/" }, { "reference_url": "https://usn.ubuntu.com/3978-1/", "reference_id": "USN-3978-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3978-1/" }, { "reference_url": "https://usn.ubuntu.com/3979-1/", "reference_id": "USN-3979-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3979-1/" }, { "reference_url": "https://usn.ubuntu.com/3980-1/", "reference_id": "USN-3980-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3980-1/" }, { "reference_url": "https://usn.ubuntu.com/3980-2/", "reference_id": "USN-3980-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3980-2/" }, { "reference_url": "https://usn.ubuntu.com/3981-1/", "reference_id": "USN-3981-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3981-1/" }, { "reference_url": "https://usn.ubuntu.com/3981-2/", "reference_id": "USN-3981-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3981-2/" }, { "reference_url": "https://usn.ubuntu.com/3982-1/", "reference_id": "USN-3982-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3982-1/" }, { "reference_url": "https://usn.ubuntu.com/3982-2/", "reference_id": "USN-3982-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3982-2/" }, { "reference_url": "https://usn.ubuntu.com/3983-1/", "reference_id": "USN-3983-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3983-1/" }, { "reference_url": "https://usn.ubuntu.com/3983-2/", "reference_id": "USN-3983-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3983-2/" }, { "reference_url": "https://usn.ubuntu.com/3984-1/", "reference_id": "USN-3984-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3984-1/" }, { "reference_url": "https://usn.ubuntu.com/3985-1/", "reference_id": "USN-3985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3985-1/" }, { "reference_url": "https://usn.ubuntu.com/3985-2/", "reference_id": "USN-3985-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3985-2/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-297.html", "reference_id": "XSA-297", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-297.html" } ], "fixed_packages": [], "aliases": [ "CVE-2018-12126", "XSA-297" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vh89-pyaz-xbdg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4185?format=api", "vulnerability_id": "VCID-z9r8-s6v7-zkgd", "summary": "Microarchitectural Data Sampling speculative side channel", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12130.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12130.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12130", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67464", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.675", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67521", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67551", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67565", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67588", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67574", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67541", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67576", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67589", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67568", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646784", "reference_id": "1646784", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646784" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929129", "reference_id": "929129", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929129" }, { "reference_url": "https://security.gentoo.org/glsa/202003-56", "reference_id": "GLSA-202003-56", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1155", "reference_id": "RHSA-2019:1155", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1155" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1167", "reference_id": "RHSA-2019:1167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1168", "reference_id": "RHSA-2019:1168", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1168" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1169", "reference_id": "RHSA-2019:1169", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1169" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1170", "reference_id": "RHSA-2019:1170", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1170" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1171", "reference_id": "RHSA-2019:1171", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1171" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1172", "reference_id": "RHSA-2019:1172", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1172" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1174", "reference_id": "RHSA-2019:1174", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1174" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1175", "reference_id": "RHSA-2019:1175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1175" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1176", "reference_id": "RHSA-2019:1176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1176" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1177", "reference_id": "RHSA-2019:1177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1177" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1178", "reference_id": "RHSA-2019:1178", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1178" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1179", "reference_id": "RHSA-2019:1179", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1179" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1180", "reference_id": "RHSA-2019:1180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1180" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1181", "reference_id": "RHSA-2019:1181", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1181" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1182", "reference_id": "RHSA-2019:1182", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1182" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1183", "reference_id": "RHSA-2019:1183", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1183" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1184", "reference_id": "RHSA-2019:1184", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1184" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1185", "reference_id": "RHSA-2019:1185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1186", "reference_id": "RHSA-2019:1186", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1186" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1187", "reference_id": "RHSA-2019:1187", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1187" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1188", "reference_id": "RHSA-2019:1188", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1188" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1189", "reference_id": "RHSA-2019:1189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1190", "reference_id": "RHSA-2019:1190", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1190" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1193", "reference_id": "RHSA-2019:1193", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1193" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1194", "reference_id": "RHSA-2019:1194", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1194" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1195", "reference_id": "RHSA-2019:1195", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1195" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1196", "reference_id": "RHSA-2019:1196", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1196" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1197", "reference_id": "RHSA-2019:1197", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1197" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1198", "reference_id": "RHSA-2019:1198", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1198" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1199", "reference_id": "RHSA-2019:1199", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1199" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1200", "reference_id": "RHSA-2019:1200", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1200" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1201", "reference_id": "RHSA-2019:1201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1201" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1202", "reference_id": "RHSA-2019:1202", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1202" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1203", "reference_id": "RHSA-2019:1203", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1203" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1204", "reference_id": "RHSA-2019:1204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1205", "reference_id": "RHSA-2019:1205", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1205" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1206", "reference_id": "RHSA-2019:1206", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1206" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1207", "reference_id": "RHSA-2019:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1207" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1208", "reference_id": "RHSA-2019:1208", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1208" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1209", "reference_id": "RHSA-2019:1209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1455", "reference_id": "RHSA-2019:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1455" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2553", "reference_id": "RHSA-2019:2553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2553" }, { "reference_url": "https://usn.ubuntu.com/3977-1/", "reference_id": "USN-3977-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-1/" }, { "reference_url": "https://usn.ubuntu.com/3977-2/", "reference_id": "USN-3977-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-2/" }, { "reference_url": "https://usn.ubuntu.com/3977-3/", "reference_id": "USN-3977-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-3/" }, { "reference_url": "https://usn.ubuntu.com/3978-1/", "reference_id": "USN-3978-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3978-1/" }, { "reference_url": "https://usn.ubuntu.com/3979-1/", "reference_id": "USN-3979-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3979-1/" }, { "reference_url": "https://usn.ubuntu.com/3980-1/", "reference_id": "USN-3980-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3980-1/" }, { "reference_url": "https://usn.ubuntu.com/3980-2/", "reference_id": "USN-3980-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3980-2/" }, { "reference_url": "https://usn.ubuntu.com/3981-1/", "reference_id": "USN-3981-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3981-1/" }, { "reference_url": "https://usn.ubuntu.com/3981-2/", "reference_id": "USN-3981-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3981-2/" }, { "reference_url": "https://usn.ubuntu.com/3982-1/", "reference_id": "USN-3982-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3982-1/" }, { "reference_url": "https://usn.ubuntu.com/3982-2/", "reference_id": "USN-3982-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3982-2/" }, { "reference_url": "https://usn.ubuntu.com/3983-1/", "reference_id": "USN-3983-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3983-1/" }, { "reference_url": "https://usn.ubuntu.com/3983-2/", "reference_id": "USN-3983-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3983-2/" }, { "reference_url": "https://usn.ubuntu.com/3984-1/", "reference_id": "USN-3984-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3984-1/" }, { "reference_url": "https://usn.ubuntu.com/3985-1/", "reference_id": "USN-3985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3985-1/" }, { "reference_url": "https://usn.ubuntu.com/3985-2/", "reference_id": "USN-3985-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3985-2/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-297.html", "reference_id": "XSA-297", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-297.html" } ], "fixed_packages": [], "aliases": [ "CVE-2018-12130" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z9r8-s6v7-zkgd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82880?format=api", "vulnerability_id": "VCID-zfwq-v3sh-kkbp", "summary": "QEMU: scsi-generic: possible OOB access while handling inquiry request", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6501.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6501.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-6501", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30839", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.3081", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30834", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30865", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30845", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30966", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.31013", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30831", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30889", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30919", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30921", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30879", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-6501" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6501", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6501" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJMTVGDLA654HNCDGLCUEIP36SNJEKK7/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJMTVGDLA654HNCDGLCUEIP36SNJEKK7/" }, { "reference_url": "https://lists.gnu.org/archive/html/qemu-devel/2019-01/msg02324.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.gnu.org/archive/html/qemu-devel/2019-01/msg02324.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190411-0006/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190411-0006/" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2019/01/24/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2019/01/24/1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1668160", "reference_id": "1668160", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1668160" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920222", "reference_id": "920222", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920222" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:qemu:qemu:3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6501", "reference_id": "CVE-2019-6501", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6501" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2166", "reference_id": "RHSA-2019:2166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2425", "reference_id": "RHSA-2019:2425", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2425" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2553", "reference_id": "RHSA-2019:2553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2553" } ], "fixed_packages": [], "aliases": [ "CVE-2019-6501" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zfwq-v3sh-kkbp" } ], "fixing_vulnerabilities": [], "risk_score": "3.5", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/qemu-kvm-rhev@10:2.12.0-33%3Farch=el7" }