Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/106145?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/106145?format=api", "purl": "pkg:rpm/redhat/kernel@3.10.0-862.46.1?arch=el7", "type": "rpm", "namespace": "redhat", "name": "kernel", "version": "3.10.0-862.46.1", "qualifiers": { "arch": "el7" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82558?format=api", "vulnerability_id": "VCID-du8n-633p-7fba", "summary": "kernel: use-after-free in drivers/char/ipmi/ipmi_si_intf.c, ipmi_si_mem_io.c, ipmi_si_port_io.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11811.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11811.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11811", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20788", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20975", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20954", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20824", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20821", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20924", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21005", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21065", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21081", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21038", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20986", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21406", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.2146", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.2125", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11811" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11811", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11811" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709180", "reference_id": "1709180", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709180" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1873", "reference_id": "RHSA-2019:1873", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1873" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1891", "reference_id": "RHSA-2019:1891", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1891" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1959", "reference_id": "RHSA-2019:1959", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1959" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1971", "reference_id": "RHSA-2019:1971", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1971" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:4057", "reference_id": "RHSA-2019:4057", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:4057" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:4058", "reference_id": "RHSA-2019:4058", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:4058" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0036", "reference_id": "RHSA-2020:0036", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0036" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2854", "reference_id": "RHSA-2020:2854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2854" } ], "fixed_packages": [], "aliases": [ "CVE-2019-11811" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-du8n-633p-7fba" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84589?format=api", "vulnerability_id": "VCID-e6h3-w8qc-xufh", "summary": "kernel: Handling of might_cancel queueing is not properly pretected against race", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10661.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10661.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10661", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.25699", "scoring_system": "epss", "scoring_elements": "0.96262", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.25699", "scoring_system": "epss", "scoring_elements": "0.96257", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.25699", "scoring_system": "epss", "scoring_elements": "0.96258", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.25699", "scoring_system": "epss", "scoring_elements": "0.9626", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.30004", "scoring_system": "epss", "scoring_elements": "0.96629", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.30004", "scoring_system": "epss", "scoring_elements": "0.96637", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.30004", "scoring_system": "epss", "scoring_elements": "0.96645", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.30004", "scoring_system": "epss", "scoring_elements": "0.96647", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.30004", "scoring_system": "epss", "scoring_elements": "0.96649", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.30004", "scoring_system": "epss", "scoring_elements": "0.9665", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.30004", "scoring_system": "epss", "scoring_elements": "0.96652", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.30004", "scoring_system": "epss", "scoring_elements": "0.96659", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.30004", "scoring_system": "epss", "scoring_elements": "0.96663", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.30004", "scoring_system": "epss", "scoring_elements": "0.9662", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.30004", "scoring_system": "epss", "scoring_elements": "0.96634", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10661" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:C/A:C" }, { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481136", "reference_id": "1481136", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481136" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/43345.c", "reference_id": "CVE-2017-10661", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/43345.c" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3083", "reference_id": "RHSA-2018:3083", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3083" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3096", "reference_id": "RHSA-2018:3096", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3096" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:4057", "reference_id": "RHSA-2019:4057", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:4057" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:4058", "reference_id": "RHSA-2019:4058", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:4058" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0036", "reference_id": "RHSA-2020:0036", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0036" }, { "reference_url": "https://usn.ubuntu.com/3470-1/", "reference_id": "USN-3470-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3470-1/" }, { "reference_url": "https://usn.ubuntu.com/3470-2/", "reference_id": "USN-3470-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3470-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-10661" ], "risk_score": 9.6, "exploitability": "2.0", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e6h3-w8qc-xufh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63436?format=api", "vulnerability_id": "VCID-es33-k15y-7qa6", "summary": "security update", "references": [ { "reference_url": "http://lists.alioth.debian.org/pipermail/secure-testing-commits/2017-December/059967.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.alioth.debian.org/pipermail/secure-testing-commits/2017-December/059967.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-0861.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-0861.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-0861", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24655", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24448", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24559", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24503", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24489", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24731", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.2477", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24543", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24614", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24661", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24677", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24636", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.2458", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24592", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24583", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-0861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=362bca57f5d78220f8b5907b875961af9436e229", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=362bca57f5d78220f8b5907b875961af9436e229" }, { "reference_url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", "reference_id": "", "reference_type": "", "scores": [], "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html" }, { "reference_url": "https://security-tracker.debian.org/tracker/CVE-2017-0861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security-tracker.debian.org/tracker/CVE-2017-0861" }, { "reference_url": "https://source.android.com/security/bulletin/pixel/2017-11-01", "reference_id": "", "reference_type": "", "scores": [], "url": "https://source.android.com/security/bulletin/pixel/2017-11-01" }, { "reference_url": "https://www.debian.org/security/2018/dsa-4187", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2018/dsa-4187" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujul2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "reference_url": "http://www.securityfocus.com/bid/102329", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/102329" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563994", "reference_id": "1563994", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563994" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-0861", "reference_id": "CVE-2017-0861", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-0861" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2390", "reference_id": "RHSA-2018:2390", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3083", "reference_id": "RHSA-2018:3083", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3083" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3096", "reference_id": "RHSA-2018:3096", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3096" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0036", "reference_id": "RHSA-2020:0036", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0036" }, { "reference_url": "https://usn.ubuntu.com/3583-1/", "reference_id": "USN-3583-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3583-1/" }, { "reference_url": "https://usn.ubuntu.com/3583-2/", "reference_id": "USN-3583-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3583-2/" }, { "reference_url": "https://usn.ubuntu.com/3617-1/", "reference_id": "USN-3617-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3617-1/" }, { "reference_url": "https://usn.ubuntu.com/3617-2/", "reference_id": "USN-3617-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3617-2/" }, { "reference_url": "https://usn.ubuntu.com/3617-3/", "reference_id": "USN-3617-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3617-3/" }, { "reference_url": "https://usn.ubuntu.com/3619-1/", "reference_id": "USN-3619-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3619-1/" }, { "reference_url": "https://usn.ubuntu.com/3619-2/", "reference_id": "USN-3619-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3619-2/" }, { "reference_url": "https://usn.ubuntu.com/3632-1/", "reference_id": "USN-3632-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3632-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-0861" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-es33-k15y-7qa6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83409?format=api", "vulnerability_id": "VCID-nytu-b95a-f7ap", "summary": "kernel: kvm: guest userspace to guest kernel write", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10853.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10853.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10853", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08526", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08553", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08606", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08524", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08597", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08621", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08619", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08596", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08584", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08474", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08461", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.0861", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08622", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08575", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08581", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10853" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10853", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10853" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1589890", "reference_id": "1589890", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1589890" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2029", "reference_id": "RHSA-2019:2029", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2029" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2043", "reference_id": "RHSA-2019:2043", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2043" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0036", "reference_id": "RHSA-2020:0036", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0036" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0103", "reference_id": "RHSA-2020:0103", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0103" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0179", "reference_id": "RHSA-2020:0179", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0179" }, { "reference_url": "https://usn.ubuntu.com/3777-1/", "reference_id": "USN-3777-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3777-1/" }, { "reference_url": "https://usn.ubuntu.com/3777-2/", "reference_id": "USN-3777-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3777-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2018-10853" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nytu-b95a-f7ap" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82557?format=api", "vulnerability_id": "VCID-pqhu-q25g-nuc7", "summary": "kernel: a NULL pointer dereference in drivers/scsi/megaraid/megaraid_sas_base.c leading to DoS", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11810.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11810.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11810", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0184", "scoring_system": "epss", "scoring_elements": "0.8289", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0184", "scoring_system": "epss", "scoring_elements": "0.82906", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0184", "scoring_system": "epss", "scoring_elements": "0.82919", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0184", "scoring_system": "epss", "scoring_elements": "0.82915", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0184", "scoring_system": "epss", "scoring_elements": "0.8294", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0184", "scoring_system": "epss", "scoring_elements": "0.82947", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0184", "scoring_system": "epss", "scoring_elements": "0.82963", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0184", "scoring_system": "epss", "scoring_elements": "0.82958", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0184", "scoring_system": "epss", "scoring_elements": "0.82954", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0184", "scoring_system": "epss", "scoring_elements": "0.82992", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0184", "scoring_system": "epss", "scoring_elements": "0.82996", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0184", "scoring_system": "epss", "scoring_elements": "0.83018", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0184", "scoring_system": "epss", "scoring_elements": "0.83026", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0184", "scoring_system": "epss", "scoring_elements": "0.83032", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11810" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11810", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11810" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709164", "reference_id": "1709164", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709164" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1959", "reference_id": "RHSA-2019:1959", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1959" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1971", "reference_id": "RHSA-2019:1971", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1971" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2029", "reference_id": "RHSA-2019:2029", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2029" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2043", "reference_id": "RHSA-2019:2043", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2043" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2736", "reference_id": "RHSA-2019:2736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2837", "reference_id": "RHSA-2019:2837", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2837" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3217", "reference_id": "RHSA-2019:3217", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3217" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0036", "reference_id": "RHSA-2020:0036", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0036" }, { "reference_url": "https://usn.ubuntu.com/4005-1/", "reference_id": "USN-4005-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4005-1/" }, { "reference_url": "https://usn.ubuntu.com/4008-1/", "reference_id": "USN-4008-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4008-1/" }, { "reference_url": "https://usn.ubuntu.com/4008-3/", "reference_id": "USN-4008-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4008-3/" }, { "reference_url": "https://usn.ubuntu.com/4115-1/", "reference_id": "USN-4115-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4115-1/" }, { "reference_url": "https://usn.ubuntu.com/4118-1/", "reference_id": "USN-4118-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4118-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2019-11810" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pqhu-q25g-nuc7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83049?format=api", "vulnerability_id": "VCID-t1jd-qqks-4qam", "summary": "kernel: TLB flush happens too late on mremap", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18281.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18281.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18281", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00422", "scoring_system": "epss", "scoring_elements": "0.6196", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00422", "scoring_system": "epss", "scoring_elements": "0.62031", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00422", "scoring_system": "epss", "scoring_elements": "0.62062", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00422", "scoring_system": "epss", "scoring_elements": "0.62032", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00422", "scoring_system": "epss", "scoring_elements": "0.62082", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00422", "scoring_system": "epss", "scoring_elements": "0.62099", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00422", "scoring_system": "epss", "scoring_elements": "0.62119", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00422", "scoring_system": "epss", "scoring_elements": "0.62109", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00422", "scoring_system": "epss", "scoring_elements": "0.62088", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00422", "scoring_system": "epss", "scoring_elements": "0.62132", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00422", "scoring_system": "epss", "scoring_elements": "0.62137", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00422", "scoring_system": "epss", "scoring_elements": "0.62121", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00422", "scoring_system": "epss", "scoring_elements": "0.62135", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00422", "scoring_system": "epss", "scoring_elements": "0.62128", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18281" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18281", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18281" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1645121", "reference_id": "1645121", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1645121" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:0831", "reference_id": "RHSA-2019:0831", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:0831" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2029", "reference_id": "RHSA-2019:2029", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2029" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2043", "reference_id": "RHSA-2019:2043", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2043" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0036", "reference_id": "RHSA-2020:0036", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0036" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0100", "reference_id": "RHSA-2020:0100", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0100" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0103", "reference_id": "RHSA-2020:0103", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0103" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0179", "reference_id": "RHSA-2020:0179", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0179" }, { "reference_url": "https://usn.ubuntu.com/3832-1/", "reference_id": "USN-3832-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3832-1/" }, { "reference_url": "https://usn.ubuntu.com/3835-1/", "reference_id": "USN-3835-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3835-1/" }, { "reference_url": "https://usn.ubuntu.com/3871-1/", "reference_id": "USN-3871-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3871-1/" }, { "reference_url": "https://usn.ubuntu.com/3871-3/", "reference_id": "USN-3871-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3871-3/" }, { "reference_url": "https://usn.ubuntu.com/3871-4/", "reference_id": "USN-3871-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3871-4/" }, { "reference_url": "https://usn.ubuntu.com/3871-5/", "reference_id": "USN-3871-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3871-5/" }, { "reference_url": "https://usn.ubuntu.com/3880-1/", "reference_id": "USN-3880-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3880-1/" }, { "reference_url": "https://usn.ubuntu.com/3880-2/", "reference_id": "USN-3880-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3880-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2018-18281" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t1jd-qqks-4qam" } ], "fixing_vulnerabilities": [], "risk_score": "9.6", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@3.10.0-862.46.1%3Farch=el7" }