Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/dogtag-pki@10.9.1-1?distro=bullseye
Typedeb
Namespacedebian
Namedogtag-pki
Version10.9.1-1
Qualifiers
distro bullseye
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version10.10.2-2
Latest_non_vulnerable_version10.10.2-3
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-23u7-hejn-dkdk
vulnerability_id VCID-23u7-hejn-dkdk
summary pki: Dogtag's python client does not validate certificates
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15720.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15720.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15720
reference_id
reference_type
scores
0
value 0.00186
scoring_system epss
scoring_elements 0.40364
published_at 2026-04-01T12:55:00Z
1
value 0.00186
scoring_system epss
scoring_elements 0.40451
published_at 2026-04-08T12:55:00Z
2
value 0.00186
scoring_system epss
scoring_elements 0.40477
published_at 2026-04-04T12:55:00Z
3
value 0.00186
scoring_system epss
scoring_elements 0.404
published_at 2026-04-07T12:55:00Z
4
value 0.00186
scoring_system epss
scoring_elements 0.40462
published_at 2026-04-09T12:55:00Z
5
value 0.00186
scoring_system epss
scoring_elements 0.40483
published_at 2026-04-11T12:55:00Z
6
value 0.00186
scoring_system epss
scoring_elements 0.40445
published_at 2026-04-12T12:55:00Z
7
value 0.00186
scoring_system epss
scoring_elements 0.40426
published_at 2026-04-13T12:55:00Z
8
value 0.00186
scoring_system epss
scoring_elements 0.40473
published_at 2026-04-16T12:55:00Z
9
value 0.00186
scoring_system epss
scoring_elements 0.40442
published_at 2026-04-18T12:55:00Z
10
value 0.00186
scoring_system epss
scoring_elements 0.40367
published_at 2026-04-21T12:55:00Z
11
value 0.00186
scoring_system epss
scoring_elements 0.40258
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15720
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15720
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1855273
reference_id 1855273
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1855273
4
reference_url https://access.redhat.com/errata/RHSA-2020:4847
reference_id RHSA-2020:4847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4847
fixed_packages
0
url pkg:deb/debian/dogtag-pki@10.9.1-1?distro=bullseye
purl pkg:deb/debian/dogtag-pki@10.9.1-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dogtag-pki@10.9.1-1%3Fdistro=bullseye
1
url pkg:deb/debian/dogtag-pki@10.10.2-3?distro=bullseye
purl pkg:deb/debian/dogtag-pki@10.10.2-3?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dogtag-pki@10.10.2-3%3Fdistro=bullseye
aliases CVE-2020-15720
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-23u7-hejn-dkdk
1
url VCID-7v3m-meaa-sudu
vulnerability_id VCID-7v3m-meaa-sudu
summary pki-core/pki-kra: Reflected XSS in recoveryID search field at KRA's DRM agent page in authorize recovery tab
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10179.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10179.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10179
reference_id
reference_type
scores
0
value 0.00451
scoring_system epss
scoring_elements 0.63614
published_at 2026-04-01T12:55:00Z
1
value 0.00451
scoring_system epss
scoring_elements 0.63743
published_at 2026-04-24T12:55:00Z
2
value 0.00451
scoring_system epss
scoring_elements 0.63729
published_at 2026-04-16T12:55:00Z
3
value 0.00451
scoring_system epss
scoring_elements 0.63739
published_at 2026-04-18T12:55:00Z
4
value 0.00451
scoring_system epss
scoring_elements 0.63725
published_at 2026-04-21T12:55:00Z
5
value 0.00451
scoring_system epss
scoring_elements 0.63673
published_at 2026-04-02T12:55:00Z
6
value 0.00451
scoring_system epss
scoring_elements 0.637
published_at 2026-04-04T12:55:00Z
7
value 0.00451
scoring_system epss
scoring_elements 0.6366
published_at 2026-04-07T12:55:00Z
8
value 0.00451
scoring_system epss
scoring_elements 0.63711
published_at 2026-04-08T12:55:00Z
9
value 0.00451
scoring_system epss
scoring_elements 0.63728
published_at 2026-04-12T12:55:00Z
10
value 0.00451
scoring_system epss
scoring_elements 0.63742
published_at 2026-04-11T12:55:00Z
11
value 0.00451
scoring_system epss
scoring_elements 0.63694
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10179
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10179
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10179
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10179
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1695901
reference_id 1695901
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1695901
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:dogtagpki:dogtagpki:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:dogtagpki:dogtagpki:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:dogtagpki:dogtagpki:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-10179
reference_id CVE-2019-10179
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
2
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-10179
9
reference_url https://access.redhat.com/errata/RHSA-2020:4847
reference_id RHSA-2020:4847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4847
10
reference_url https://access.redhat.com/errata/RHSA-2021:0819
reference_id RHSA-2021:0819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0819
11
reference_url https://access.redhat.com/errata/RHSA-2021:0851
reference_id RHSA-2021:0851
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0851
12
reference_url https://access.redhat.com/errata/RHSA-2021:0975
reference_id RHSA-2021:0975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0975
fixed_packages
0
url pkg:deb/debian/dogtag-pki@10.9.1-1?distro=bullseye
purl pkg:deb/debian/dogtag-pki@10.9.1-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dogtag-pki@10.9.1-1%3Fdistro=bullseye
1
url pkg:deb/debian/dogtag-pki@10.10.2-3?distro=bullseye
purl pkg:deb/debian/dogtag-pki@10.10.2-3?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dogtag-pki@10.10.2-3%3Fdistro=bullseye
aliases CVE-2019-10179
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7v3m-meaa-sudu
2
url VCID-97tw-ymj8-6bbj
vulnerability_id VCID-97tw-ymj8-6bbj
summary pki-core: Reflected XSS in getcookies?url= endpoint in CA
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10221.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10221.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10221
reference_id
reference_type
scores
0
value 0.00694
scoring_system epss
scoring_elements 0.71847
published_at 2026-04-01T12:55:00Z
1
value 0.00694
scoring_system epss
scoring_elements 0.71962
published_at 2026-04-24T12:55:00Z
2
value 0.00694
scoring_system epss
scoring_elements 0.71929
published_at 2026-04-16T12:55:00Z
3
value 0.00694
scoring_system epss
scoring_elements 0.71934
published_at 2026-04-18T12:55:00Z
4
value 0.00694
scoring_system epss
scoring_elements 0.71917
published_at 2026-04-21T12:55:00Z
5
value 0.00694
scoring_system epss
scoring_elements 0.71856
published_at 2026-04-02T12:55:00Z
6
value 0.00694
scoring_system epss
scoring_elements 0.71875
published_at 2026-04-04T12:55:00Z
7
value 0.00694
scoring_system epss
scoring_elements 0.71848
published_at 2026-04-07T12:55:00Z
8
value 0.00694
scoring_system epss
scoring_elements 0.71887
published_at 2026-04-13T12:55:00Z
9
value 0.00694
scoring_system epss
scoring_elements 0.71898
published_at 2026-04-09T12:55:00Z
10
value 0.00694
scoring_system epss
scoring_elements 0.71922
published_at 2026-04-11T12:55:00Z
11
value 0.00694
scoring_system epss
scoring_elements 0.71904
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10221
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10221
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10221
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10221
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10221
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1732565
reference_id 1732565
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1732565
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:dogtagpki:dogtagpki:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:dogtagpki:dogtagpki:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:dogtagpki:dogtagpki:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-10221
reference_id CVE-2019-10221
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
2
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-10221
9
reference_url https://access.redhat.com/errata/RHSA-2020:4847
reference_id RHSA-2020:4847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4847
10
reference_url https://access.redhat.com/errata/RHSA-2021:0819
reference_id RHSA-2021:0819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0819
11
reference_url https://access.redhat.com/errata/RHSA-2021:0851
reference_id RHSA-2021:0851
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0851
12
reference_url https://access.redhat.com/errata/RHSA-2021:0975
reference_id RHSA-2021:0975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0975
fixed_packages
0
url pkg:deb/debian/dogtag-pki@10.9.1-1?distro=bullseye
purl pkg:deb/debian/dogtag-pki@10.9.1-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dogtag-pki@10.9.1-1%3Fdistro=bullseye
1
url pkg:deb/debian/dogtag-pki@10.10.2-3?distro=bullseye
purl pkg:deb/debian/dogtag-pki@10.10.2-3?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dogtag-pki@10.10.2-3%3Fdistro=bullseye
aliases CVE-2019-10221
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-97tw-ymj8-6bbj
3
url VCID-pf14-dtsb-ebd2
vulnerability_id VCID-pf14-dtsb-ebd2
summary pki-core: KRA vulnerable to reflected XSS via the getPk12 page
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1721.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1721.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-1721
reference_id
reference_type
scores
0
value 0.00746
scoring_system epss
scoring_elements 0.7301
published_at 2026-04-01T12:55:00Z
1
value 0.00746
scoring_system epss
scoring_elements 0.73019
published_at 2026-04-02T12:55:00Z
2
value 0.00746
scoring_system epss
scoring_elements 0.7304
published_at 2026-04-04T12:55:00Z
3
value 0.00746
scoring_system epss
scoring_elements 0.73015
published_at 2026-04-07T12:55:00Z
4
value 0.00746
scoring_system epss
scoring_elements 0.73052
published_at 2026-04-08T12:55:00Z
5
value 0.00825
scoring_system epss
scoring_elements 0.7452
published_at 2026-04-24T12:55:00Z
6
value 0.00825
scoring_system epss
scoring_elements 0.74486
published_at 2026-04-16T12:55:00Z
7
value 0.00825
scoring_system epss
scoring_elements 0.74494
published_at 2026-04-18T12:55:00Z
8
value 0.00825
scoring_system epss
scoring_elements 0.74485
published_at 2026-04-21T12:55:00Z
9
value 0.00825
scoring_system epss
scoring_elements 0.74449
published_at 2026-04-13T12:55:00Z
10
value 0.01211
scoring_system epss
scoring_elements 0.79019
published_at 2026-04-11T12:55:00Z
11
value 0.01211
scoring_system epss
scoring_elements 0.79004
published_at 2026-04-12T12:55:00Z
12
value 0.01211
scoring_system epss
scoring_elements 0.78994
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-1721
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1721
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1777579
reference_id 1777579
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1777579
4
reference_url https://access.redhat.com/errata/RHSA-2020:4847
reference_id RHSA-2020:4847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4847
5
reference_url https://access.redhat.com/errata/RHSA-2021:0819
reference_id RHSA-2021:0819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0819
6
reference_url https://access.redhat.com/errata/RHSA-2021:0851
reference_id RHSA-2021:0851
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0851
7
reference_url https://access.redhat.com/errata/RHSA-2021:0975
reference_id RHSA-2021:0975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0975
fixed_packages
0
url pkg:deb/debian/dogtag-pki@10.9.1-1?distro=bullseye
purl pkg:deb/debian/dogtag-pki@10.9.1-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dogtag-pki@10.9.1-1%3Fdistro=bullseye
1
url pkg:deb/debian/dogtag-pki@10.10.2-3?distro=bullseye
purl pkg:deb/debian/dogtag-pki@10.10.2-3?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dogtag-pki@10.10.2-3%3Fdistro=bullseye
aliases CVE-2020-1721
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pf14-dtsb-ebd2
4
url VCID-qwg3-thj2-tkav
vulnerability_id VCID-qwg3-thj2-tkav
summary pki-core: Reflected XSS in 'path length' constraint field in CA's Agent page
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10146.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10146.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10146
reference_id
reference_type
scores
0
value 0.00191
scoring_system epss
scoring_elements 0.40901
published_at 2026-04-01T12:55:00Z
1
value 0.00191
scoring_system epss
scoring_elements 0.40805
published_at 2026-04-24T12:55:00Z
2
value 0.00191
scoring_system epss
scoring_elements 0.41006
published_at 2026-04-16T12:55:00Z
3
value 0.00191
scoring_system epss
scoring_elements 0.40977
published_at 2026-04-18T12:55:00Z
4
value 0.00191
scoring_system epss
scoring_elements 0.40898
published_at 2026-04-21T12:55:00Z
5
value 0.00191
scoring_system epss
scoring_elements 0.40982
published_at 2026-04-02T12:55:00Z
6
value 0.00191
scoring_system epss
scoring_elements 0.41014
published_at 2026-04-04T12:55:00Z
7
value 0.00191
scoring_system epss
scoring_elements 0.4094
published_at 2026-04-07T12:55:00Z
8
value 0.00191
scoring_system epss
scoring_elements 0.40989
published_at 2026-04-08T12:55:00Z
9
value 0.00191
scoring_system epss
scoring_elements 0.40997
published_at 2026-04-09T12:55:00Z
10
value 0.00191
scoring_system epss
scoring_elements 0.41015
published_at 2026-04-11T12:55:00Z
11
value 0.00191
scoring_system epss
scoring_elements 0.4098
published_at 2026-04-12T12:55:00Z
12
value 0.00191
scoring_system epss
scoring_elements 0.40964
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10146
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10146
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10146
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10146
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10146
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1710171
reference_id 1710171
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1710171
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:dogtagpki:dogtagpki:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:dogtagpki:dogtagpki:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:dogtagpki:dogtagpki:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-10146
reference_id CVE-2019-10146
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:P/A:N
1
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
2
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-10146
8
reference_url https://access.redhat.com/errata/RHSA-2020:4847
reference_id RHSA-2020:4847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4847
9
reference_url https://access.redhat.com/errata/RHSA-2021:0819
reference_id RHSA-2021:0819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0819
10
reference_url https://access.redhat.com/errata/RHSA-2021:0851
reference_id RHSA-2021:0851
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0851
11
reference_url https://access.redhat.com/errata/RHSA-2021:0975
reference_id RHSA-2021:0975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0975
fixed_packages
0
url pkg:deb/debian/dogtag-pki@10.9.1-1?distro=bullseye
purl pkg:deb/debian/dogtag-pki@10.9.1-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dogtag-pki@10.9.1-1%3Fdistro=bullseye
1
url pkg:deb/debian/dogtag-pki@10.10.2-3?distro=bullseye
purl pkg:deb/debian/dogtag-pki@10.10.2-3?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dogtag-pki@10.10.2-3%3Fdistro=bullseye
aliases CVE-2019-10146
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qwg3-thj2-tkav
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/dogtag-pki@10.9.1-1%3Fdistro=bullseye