Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@4.18.0-240?arch=el8
Typerpm
Namespaceredhat
Namekernel
Version4.18.0-240
Qualifiers
arch el8
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-18fe-ukxa-h3g4
vulnerability_id VCID-18fe-ukxa-h3g4
summary kernel: memory leak in af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-18809.json
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-18809.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-18809
reference_id
reference_type
scores
0
value 0.00093
scoring_system epss
scoring_elements 0.26166
published_at 2026-04-01T12:55:00Z
1
value 0.00093
scoring_system epss
scoring_elements 0.25909
published_at 2026-04-29T12:55:00Z
2
value 0.00093
scoring_system epss
scoring_elements 0.26023
published_at 2026-04-21T12:55:00Z
3
value 0.00093
scoring_system epss
scoring_elements 0.25962
published_at 2026-04-24T12:55:00Z
4
value 0.00093
scoring_system epss
scoring_elements 0.25958
published_at 2026-04-26T12:55:00Z
5
value 0.00093
scoring_system epss
scoring_elements 0.26247
published_at 2026-04-02T12:55:00Z
6
value 0.00093
scoring_system epss
scoring_elements 0.26287
published_at 2026-04-04T12:55:00Z
7
value 0.00093
scoring_system epss
scoring_elements 0.26057
published_at 2026-04-07T12:55:00Z
8
value 0.00093
scoring_system epss
scoring_elements 0.26123
published_at 2026-04-08T12:55:00Z
9
value 0.00093
scoring_system epss
scoring_elements 0.26172
published_at 2026-04-09T12:55:00Z
10
value 0.00093
scoring_system epss
scoring_elements 0.2618
published_at 2026-04-11T12:55:00Z
11
value 0.00093
scoring_system epss
scoring_elements 0.26134
published_at 2026-04-12T12:55:00Z
12
value 0.00093
scoring_system epss
scoring_elements 0.26075
published_at 2026-04-13T12:55:00Z
13
value 0.00093
scoring_system epss
scoring_elements 0.2608
published_at 2026-04-16T12:55:00Z
14
value 0.00093
scoring_system epss
scoring_elements 0.26058
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-18809
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18809
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/torvalds/linux/commit/2289adbfa559050d2a38bcd9caac1c18b800e928
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/2289adbfa559050d2a38bcd9caac1c18b800e928
6
reference_url https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/
9
reference_url https://security.netapp.com/advisory/ntap-20191205-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20191205-0001/
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1777449
reference_id 1777449
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1777449
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-18809
reference_id CVE-2019-18809
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-18809
21
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
22
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
23
reference_url https://usn.ubuntu.com/4285-1/
reference_id USN-4285-1
reference_type
scores
url https://usn.ubuntu.com/4285-1/
24
reference_url https://usn.ubuntu.com/4287-1/
reference_id USN-4287-1
reference_type
scores
url https://usn.ubuntu.com/4287-1/
25
reference_url https://usn.ubuntu.com/4287-2/
reference_id USN-4287-2
reference_type
scores
url https://usn.ubuntu.com/4287-2/
26
reference_url https://usn.ubuntu.com/4300-1/
reference_id USN-4300-1
reference_type
scores
url https://usn.ubuntu.com/4300-1/
fixed_packages
aliases CVE-2019-18809
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-18fe-ukxa-h3g4
1
url VCID-24fh-sca7-q3fz
vulnerability_id VCID-24fh-sca7-q3fz
summary kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data coruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12659.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12659.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12659
reference_id
reference_type
scores
0
value 0.00097
scoring_system epss
scoring_elements 0.26852
published_at 2026-04-01T12:55:00Z
1
value 0.00097
scoring_system epss
scoring_elements 0.26893
published_at 2026-04-02T12:55:00Z
2
value 0.00097
scoring_system epss
scoring_elements 0.26928
published_at 2026-04-04T12:55:00Z
3
value 0.00097
scoring_system epss
scoring_elements 0.26715
published_at 2026-04-18T12:55:00Z
4
value 0.00097
scoring_system epss
scoring_elements 0.26784
published_at 2026-04-08T12:55:00Z
5
value 0.00097
scoring_system epss
scoring_elements 0.26832
published_at 2026-04-09T12:55:00Z
6
value 0.00097
scoring_system epss
scoring_elements 0.26836
published_at 2026-04-11T12:55:00Z
7
value 0.00097
scoring_system epss
scoring_elements 0.26791
published_at 2026-04-12T12:55:00Z
8
value 0.00097
scoring_system epss
scoring_elements 0.26734
published_at 2026-04-13T12:55:00Z
9
value 0.00097
scoring_system epss
scoring_elements 0.26743
published_at 2026-04-16T12:55:00Z
10
value 0.00097
scoring_system epss
scoring_elements 0.26679
published_at 2026-04-21T12:55:00Z
11
value 0.00097
scoring_system epss
scoring_elements 0.26623
published_at 2026-04-24T12:55:00Z
12
value 0.00097
scoring_system epss
scoring_elements 0.26615
published_at 2026-04-26T12:55:00Z
13
value 0.00097
scoring_system epss
scoring_elements 0.26543
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12659
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12659
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1832876
reference_id 1832876
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1832876
5
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
6
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
7
reference_url https://usn.ubuntu.com/4387-1/
reference_id USN-4387-1
reference_type
scores
url https://usn.ubuntu.com/4387-1/
8
reference_url https://usn.ubuntu.com/4388-1/
reference_id USN-4388-1
reference_type
scores
url https://usn.ubuntu.com/4388-1/
9
reference_url https://usn.ubuntu.com/4389-1/
reference_id USN-4389-1
reference_type
scores
url https://usn.ubuntu.com/4389-1/
fixed_packages
aliases CVE-2020-12659
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-24fh-sca7-q3fz
2
url VCID-2cup-r3jw-77fy
vulnerability_id VCID-2cup-r3jw-77fy
summary kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20054.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20054.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-20054
reference_id
reference_type
scores
0
value 0.00113
scoring_system epss
scoring_elements 0.29909
published_at 2026-04-01T12:55:00Z
1
value 0.00113
scoring_system epss
scoring_elements 0.29953
published_at 2026-04-02T12:55:00Z
2
value 0.00113
scoring_system epss
scoring_elements 0.30001
published_at 2026-04-04T12:55:00Z
3
value 0.00113
scoring_system epss
scoring_elements 0.29814
published_at 2026-04-07T12:55:00Z
4
value 0.00113
scoring_system epss
scoring_elements 0.29877
published_at 2026-04-08T12:55:00Z
5
value 0.00113
scoring_system epss
scoring_elements 0.29912
published_at 2026-04-09T12:55:00Z
6
value 0.00113
scoring_system epss
scoring_elements 0.29918
published_at 2026-04-11T12:55:00Z
7
value 0.00113
scoring_system epss
scoring_elements 0.29872
published_at 2026-04-12T12:55:00Z
8
value 0.00113
scoring_system epss
scoring_elements 0.29823
published_at 2026-04-13T12:55:00Z
9
value 0.00113
scoring_system epss
scoring_elements 0.29841
published_at 2026-04-16T12:55:00Z
10
value 0.00113
scoring_system epss
scoring_elements 0.29821
published_at 2026-04-18T12:55:00Z
11
value 0.00113
scoring_system epss
scoring_elements 0.29774
published_at 2026-04-21T12:55:00Z
12
value 0.00113
scoring_system epss
scoring_elements 0.29697
published_at 2026-04-24T12:55:00Z
13
value 0.00113
scoring_system epss
scoring_elements 0.29583
published_at 2026-04-26T12:55:00Z
14
value 0.00113
scoring_system epss
scoring_elements 0.29521
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-20054
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20054
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20054
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1790063
reference_id 1790063
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1790063
5
reference_url https://access.redhat.com/errata/RHSA-2020:1493
reference_id RHSA-2020:1493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1493
6
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
7
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
8
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
9
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
fixed_packages
aliases CVE-2019-20054
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2cup-r3jw-77fy
3
url VCID-2ed6-g4ep-yfh1
vulnerability_id VCID-2ed6-g4ep-yfh1
summary kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19447.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19447.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19447
reference_id
reference_type
scores
0
value 0.01689
scoring_system epss
scoring_elements 0.82153
published_at 2026-04-01T12:55:00Z
1
value 0.01689
scoring_system epss
scoring_elements 0.82166
published_at 2026-04-02T12:55:00Z
2
value 0.01689
scoring_system epss
scoring_elements 0.82187
published_at 2026-04-04T12:55:00Z
3
value 0.01689
scoring_system epss
scoring_elements 0.82183
published_at 2026-04-07T12:55:00Z
4
value 0.01689
scoring_system epss
scoring_elements 0.82209
published_at 2026-04-08T12:55:00Z
5
value 0.01689
scoring_system epss
scoring_elements 0.82217
published_at 2026-04-09T12:55:00Z
6
value 0.01689
scoring_system epss
scoring_elements 0.82236
published_at 2026-04-11T12:55:00Z
7
value 0.01689
scoring_system epss
scoring_elements 0.82228
published_at 2026-04-12T12:55:00Z
8
value 0.01689
scoring_system epss
scoring_elements 0.82223
published_at 2026-04-13T12:55:00Z
9
value 0.01689
scoring_system epss
scoring_elements 0.82259
published_at 2026-04-16T12:55:00Z
10
value 0.01689
scoring_system epss
scoring_elements 0.8226
published_at 2026-04-21T12:55:00Z
11
value 0.01689
scoring_system epss
scoring_elements 0.82282
published_at 2026-04-24T12:55:00Z
12
value 0.01689
scoring_system epss
scoring_elements 0.82293
published_at 2026-04-26T12:55:00Z
13
value 0.01689
scoring_system epss
scoring_elements 0.82298
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19447
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19447
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19447
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1781679
reference_id 1781679
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1781679
5
reference_url https://access.redhat.com/errata/RHSA-2020:2104
reference_id RHSA-2020:2104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2104
6
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
7
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
8
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
9
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
10
reference_url https://access.redhat.com/errata/RHSA-2020:5206
reference_id RHSA-2020:5206
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5206
11
reference_url https://access.redhat.com/errata/RHSA-2020:5430
reference_id RHSA-2020:5430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5430
12
reference_url https://access.redhat.com/errata/RHSA-2020:5656
reference_id RHSA-2020:5656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5656
fixed_packages
aliases CVE-2019-19447
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2ed6-g4ep-yfh1
4
url VCID-2w4w-t45z-v3bf
vulnerability_id VCID-2w4w-t45z-v3bf
summary kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19524.json
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19524.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19524
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.12713
published_at 2026-04-01T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12819
published_at 2026-04-02T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.12868
published_at 2026-04-04T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12671
published_at 2026-04-07T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12751
published_at 2026-04-08T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.12803
published_at 2026-04-09T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.12771
published_at 2026-04-11T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.12734
published_at 2026-04-12T12:55:00Z
8
value 0.00042
scoring_system epss
scoring_elements 0.12687
published_at 2026-04-13T12:55:00Z
9
value 0.00042
scoring_system epss
scoring_elements 0.12592
published_at 2026-04-16T12:55:00Z
10
value 0.00042
scoring_system epss
scoring_elements 0.12603
published_at 2026-04-18T12:55:00Z
11
value 0.00042
scoring_system epss
scoring_elements 0.12715
published_at 2026-04-21T12:55:00Z
12
value 0.00042
scoring_system epss
scoring_elements 0.12727
published_at 2026-04-24T12:55:00Z
13
value 0.00042
scoring_system epss
scoring_elements 0.1269
published_at 2026-04-26T12:55:00Z
14
value 0.00042
scoring_system epss
scoring_elements 0.12576
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19524
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19524
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1783459
reference_id 1783459
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1783459
5
reference_url https://access.redhat.com/errata/RHSA-2020:2104
reference_id RHSA-2020:2104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2104
6
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
7
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
8
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
9
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
10
reference_url https://usn.ubuntu.com/4225-1/
reference_id USN-4225-1
reference_type
scores
url https://usn.ubuntu.com/4225-1/
11
reference_url https://usn.ubuntu.com/4225-2/
reference_id USN-4225-2
reference_type
scores
url https://usn.ubuntu.com/4225-2/
12
reference_url https://usn.ubuntu.com/4226-1/
reference_id USN-4226-1
reference_type
scores
url https://usn.ubuntu.com/4226-1/
13
reference_url https://usn.ubuntu.com/4227-1/
reference_id USN-4227-1
reference_type
scores
url https://usn.ubuntu.com/4227-1/
14
reference_url https://usn.ubuntu.com/4227-2/
reference_id USN-4227-2
reference_type
scores
url https://usn.ubuntu.com/4227-2/
15
reference_url https://usn.ubuntu.com/4228-1/
reference_id USN-4228-1
reference_type
scores
url https://usn.ubuntu.com/4228-1/
16
reference_url https://usn.ubuntu.com/4228-2/
reference_id USN-4228-2
reference_type
scores
url https://usn.ubuntu.com/4228-2/
fixed_packages
aliases CVE-2019-19524
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2w4w-t45z-v3bf
5
url VCID-58rf-uzww-3fg4
vulnerability_id VCID-58rf-uzww-3fg4
summary kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19046.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19046.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19046
reference_id
reference_type
scores
0
value 0.00833
scoring_system epss
scoring_elements 0.74661
published_at 2026-04-29T12:55:00Z
1
value 0.00833
scoring_system epss
scoring_elements 0.74618
published_at 2026-04-21T12:55:00Z
2
value 0.00833
scoring_system epss
scoring_elements 0.74653
published_at 2026-04-24T12:55:00Z
3
value 0.00833
scoring_system epss
scoring_elements 0.74659
published_at 2026-04-26T12:55:00Z
4
value 0.01256
scoring_system epss
scoring_elements 0.7934
published_at 2026-04-02T12:55:00Z
5
value 0.01256
scoring_system epss
scoring_elements 0.79364
published_at 2026-04-04T12:55:00Z
6
value 0.01256
scoring_system epss
scoring_elements 0.7935
published_at 2026-04-07T12:55:00Z
7
value 0.01256
scoring_system epss
scoring_elements 0.79377
published_at 2026-04-08T12:55:00Z
8
value 0.01256
scoring_system epss
scoring_elements 0.79386
published_at 2026-04-09T12:55:00Z
9
value 0.01256
scoring_system epss
scoring_elements 0.79409
published_at 2026-04-11T12:55:00Z
10
value 0.01256
scoring_system epss
scoring_elements 0.79393
published_at 2026-04-12T12:55:00Z
11
value 0.01256
scoring_system epss
scoring_elements 0.79382
published_at 2026-04-13T12:55:00Z
12
value 0.01256
scoring_system epss
scoring_elements 0.79414
published_at 2026-04-16T12:55:00Z
13
value 0.01256
scoring_system epss
scoring_elements 0.79412
published_at 2026-04-18T12:55:00Z
14
value 0.01256
scoring_system epss
scoring_elements 0.79334
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19046
3
reference_url https://bugzilla.suse.com/show_bug.cgi?id=1157304
reference_id
reference_type
scores
url https://bugzilla.suse.com/show_bug.cgi?id=1157304
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19046
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/torvalds/linux/commit/4aa7afb0ee20a97fbf0c5bab3df028d5fb85fdab
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/4aa7afb0ee20a97fbf0c5bab3df028d5fb85fdab
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1774988
reference_id 1774988
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1774988
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-19046
reference_id CVE-2019-19046
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-19046
15
reference_url https://access.redhat.com/errata/RHSA-2020:3545
reference_id RHSA-2020:3545
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3545
16
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
17
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
18
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
19
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
20
reference_url https://access.redhat.com/errata/RHSA-2020:5206
reference_id RHSA-2020:5206
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5206
21
reference_url https://access.redhat.com/errata/RHSA-2020:5656
reference_id RHSA-2020:5656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5656
22
reference_url https://usn.ubuntu.com/4302-1/
reference_id USN-4302-1
reference_type
scores
url https://usn.ubuntu.com/4302-1/
23
reference_url https://usn.ubuntu.com/4319-1/
reference_id USN-4319-1
reference_type
scores
url https://usn.ubuntu.com/4319-1/
24
reference_url https://usn.ubuntu.com/4325-1/
reference_id USN-4325-1
reference_type
scores
url https://usn.ubuntu.com/4325-1/
fixed_packages
aliases CVE-2019-19046
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-58rf-uzww-3fg4
6
url VCID-5nyh-n8he-z7ev
vulnerability_id VCID-5nyh-n8he-z7ev
summary kernel: possible to send arbitrary signals to a privileged (suidroot) parent process
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12826.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12826.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12826
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.20926
published_at 2026-04-01T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.21077
published_at 2026-04-02T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.2113
published_at 2026-04-04T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.20844
published_at 2026-04-07T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.20924
published_at 2026-04-08T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.20985
published_at 2026-04-09T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.21002
published_at 2026-04-11T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.20958
published_at 2026-04-12T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.20904
published_at 2026-04-13T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.20895
published_at 2026-04-16T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.20896
published_at 2026-04-18T12:55:00Z
11
value 0.00068
scoring_system epss
scoring_elements 0.20877
published_at 2026-04-21T12:55:00Z
12
value 0.00068
scoring_system epss
scoring_elements 0.20748
published_at 2026-04-24T12:55:00Z
13
value 0.00068
scoring_system epss
scoring_elements 0.20744
published_at 2026-04-26T12:55:00Z
14
value 0.00068
scoring_system epss
scoring_elements 0.2071
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12826
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12826
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1822077
reference_id 1822077
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1822077
5
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
6
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
7
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
8
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
9
reference_url https://usn.ubuntu.com/4367-1/
reference_id USN-4367-1
reference_type
scores
url https://usn.ubuntu.com/4367-1/
10
reference_url https://usn.ubuntu.com/4369-1/
reference_id USN-4369-1
reference_type
scores
url https://usn.ubuntu.com/4369-1/
11
reference_url https://usn.ubuntu.com/4391-1/
reference_id USN-4391-1
reference_type
scores
url https://usn.ubuntu.com/4391-1/
fixed_packages
aliases CVE-2020-12826
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5nyh-n8he-z7ev
7
url VCID-6gex-x71e-53ec
vulnerability_id VCID-6gex-x71e-53ec
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10732.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10732.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-10732
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.11675
published_at 2026-04-01T12:55:00Z
1
value 0.00039
scoring_system epss
scoring_elements 0.11798
published_at 2026-04-02T12:55:00Z
2
value 0.00039
scoring_system epss
scoring_elements 0.11842
published_at 2026-04-04T12:55:00Z
3
value 0.00039
scoring_system epss
scoring_elements 0.11631
published_at 2026-04-07T12:55:00Z
4
value 0.00039
scoring_system epss
scoring_elements 0.11715
published_at 2026-04-08T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.1177
published_at 2026-04-09T12:55:00Z
6
value 0.00039
scoring_system epss
scoring_elements 0.11781
published_at 2026-04-11T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.11742
published_at 2026-04-12T12:55:00Z
8
value 0.00039
scoring_system epss
scoring_elements 0.11717
published_at 2026-04-13T12:55:00Z
9
value 0.00039
scoring_system epss
scoring_elements 0.11579
published_at 2026-04-16T12:55:00Z
10
value 0.00039
scoring_system epss
scoring_elements 0.11581
published_at 2026-04-18T12:55:00Z
11
value 0.00039
scoring_system epss
scoring_elements 0.11704
published_at 2026-04-21T12:55:00Z
12
value 0.00039
scoring_system epss
scoring_elements 0.11662
published_at 2026-04-24T12:55:00Z
13
value 0.00039
scoring_system epss
scoring_elements 0.11623
published_at 2026-04-26T12:55:00Z
14
value 0.00039
scoring_system epss
scoring_elements 0.11549
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-10732
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3016
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12768
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
35
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1831399
reference_id 1831399
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1831399
37
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
38
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
39
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
40
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
41
reference_url https://usn.ubuntu.com/4411-1/
reference_id USN-4411-1
reference_type
scores
url https://usn.ubuntu.com/4411-1/
42
reference_url https://usn.ubuntu.com/4427-1/
reference_id USN-4427-1
reference_type
scores
url https://usn.ubuntu.com/4427-1/
43
reference_url https://usn.ubuntu.com/4439-1/
reference_id USN-4439-1
reference_type
scores
url https://usn.ubuntu.com/4439-1/
44
reference_url https://usn.ubuntu.com/4440-1/
reference_id USN-4440-1
reference_type
scores
url https://usn.ubuntu.com/4440-1/
45
reference_url https://usn.ubuntu.com/4485-1/
reference_id USN-4485-1
reference_type
scores
url https://usn.ubuntu.com/4485-1/
fixed_packages
aliases CVE-2020-10732
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6gex-x71e-53ec
8
url VCID-6trk-yszs-77ct
vulnerability_id VCID-6trk-yszs-77ct
summary kernel: cached use of fpu_fpregs_owner_ctx in arch/x86/include/asm/fpu/internal.h can lead to DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19602.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19602.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19602
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.09904
published_at 2026-04-01T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.10027
published_at 2026-04-02T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.10085
published_at 2026-04-04T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.09983
published_at 2026-04-07T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.1006
published_at 2026-04-08T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.10119
published_at 2026-04-12T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.1016
published_at 2026-04-11T12:55:00Z
7
value 0.00034
scoring_system epss
scoring_elements 0.10097
published_at 2026-04-13T12:55:00Z
8
value 0.00034
scoring_system epss
scoring_elements 0.09972
published_at 2026-04-16T12:55:00Z
9
value 0.00034
scoring_system epss
scoring_elements 0.09948
published_at 2026-04-18T12:55:00Z
10
value 0.00034
scoring_system epss
scoring_elements 0.10081
published_at 2026-04-21T12:55:00Z
11
value 0.00034
scoring_system epss
scoring_elements 0.10058
published_at 2026-04-24T12:55:00Z
12
value 0.00034
scoring_system epss
scoring_elements 0.10037
published_at 2026-04-26T12:55:00Z
13
value 0.00034
scoring_system epss
scoring_elements 0.09982
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19602
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19602
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1784572
reference_id 1784572
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1784572
5
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
6
reference_url https://usn.ubuntu.com/4284-1/
reference_id USN-4284-1
reference_type
scores
url https://usn.ubuntu.com/4284-1/
fixed_packages
aliases CVE-2019-19602
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6trk-yszs-77ct
9
url VCID-6uxt-t18n-wyad
vulnerability_id VCID-6uxt-t18n-wyad
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10942.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10942.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-10942
reference_id
reference_type
scores
0
value 0.00073
scoring_system epss
scoring_elements 0.22207
published_at 2026-04-01T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.22035
published_at 2026-04-29T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.22213
published_at 2026-04-21T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.22062
published_at 2026-04-24T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.22049
published_at 2026-04-26T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22374
published_at 2026-04-02T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.22419
published_at 2026-04-04T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.22204
published_at 2026-04-07T12:55:00Z
8
value 0.00073
scoring_system epss
scoring_elements 0.22287
published_at 2026-04-08T12:55:00Z
9
value 0.00073
scoring_system epss
scoring_elements 0.22342
published_at 2026-04-09T12:55:00Z
10
value 0.00073
scoring_system epss
scoring_elements 0.22362
published_at 2026-04-11T12:55:00Z
11
value 0.00073
scoring_system epss
scoring_elements 0.22321
published_at 2026-04-12T12:55:00Z
12
value 0.00073
scoring_system epss
scoring_elements 0.22262
published_at 2026-04-13T12:55:00Z
13
value 0.00073
scoring_system epss
scoring_elements 0.22266
published_at 2026-04-16T12:55:00Z
14
value 0.00073
scoring_system epss
scoring_elements 0.2226
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-10942
3
reference_url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.5.8
reference_id
reference_type
scores
url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.5.8
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11884
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
36
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
37
reference_url https://git.kernel.org/linus/42d84c8490f9f0931786f1623191fcab397c3d64
reference_id
reference_type
scores
url https://git.kernel.org/linus/42d84c8490f9f0931786f1623191fcab397c3d64
38
reference_url https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
39
reference_url https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
40
reference_url https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
41
reference_url https://lkml.org/lkml/2020/2/15/125
reference_id
reference_type
scores
url https://lkml.org/lkml/2020/2/15/125
42
reference_url https://security.netapp.com/advisory/ntap-20200403-0003/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20200403-0003/
43
reference_url https://www.debian.org/security/2020/dsa-4667
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4667
44
reference_url https://www.debian.org/security/2020/dsa-4698
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4698
45
reference_url http://www.openwall.com/lists/oss-security/2020/04/15/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2020/04/15/4
46
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1817718
reference_id 1817718
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1817718
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-10942
reference_id CVE-2020-10942
reference_type
scores
0
value 5.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:P/A:C
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-10942
57
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
58
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
59
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
60
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
61
reference_url https://usn.ubuntu.com/4342-1/
reference_id USN-4342-1
reference_type
scores
url https://usn.ubuntu.com/4342-1/
62
reference_url https://usn.ubuntu.com/4344-1/
reference_id USN-4344-1
reference_type
scores
url https://usn.ubuntu.com/4344-1/
63
reference_url https://usn.ubuntu.com/4345-1/
reference_id USN-4345-1
reference_type
scores
url https://usn.ubuntu.com/4345-1/
64
reference_url https://usn.ubuntu.com/4364-1/
reference_id USN-4364-1
reference_type
scores
url https://usn.ubuntu.com/4364-1/
fixed_packages
aliases CVE-2020-10942
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6uxt-t18n-wyad
10
url VCID-7v1s-4cxs-zyeg
vulnerability_id VCID-7v1s-4cxs-zyeg
summary kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16233.json
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16233.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-16233
reference_id
reference_type
scores
0
value 0.00091
scoring_system epss
scoring_elements 0.2579
published_at 2026-04-01T12:55:00Z
1
value 0.00091
scoring_system epss
scoring_elements 0.25539
published_at 2026-04-29T12:55:00Z
2
value 0.00091
scoring_system epss
scoring_elements 0.25654
published_at 2026-04-21T12:55:00Z
3
value 0.00091
scoring_system epss
scoring_elements 0.25598
published_at 2026-04-24T12:55:00Z
4
value 0.00091
scoring_system epss
scoring_elements 0.25589
published_at 2026-04-26T12:55:00Z
5
value 0.00091
scoring_system epss
scoring_elements 0.2585
published_at 2026-04-02T12:55:00Z
6
value 0.00091
scoring_system epss
scoring_elements 0.25893
published_at 2026-04-04T12:55:00Z
7
value 0.00091
scoring_system epss
scoring_elements 0.25663
published_at 2026-04-07T12:55:00Z
8
value 0.00091
scoring_system epss
scoring_elements 0.25734
published_at 2026-04-08T12:55:00Z
9
value 0.00091
scoring_system epss
scoring_elements 0.25782
published_at 2026-04-09T12:55:00Z
10
value 0.00091
scoring_system epss
scoring_elements 0.25793
published_at 2026-04-11T12:55:00Z
11
value 0.00091
scoring_system epss
scoring_elements 0.25751
published_at 2026-04-12T12:55:00Z
12
value 0.00091
scoring_system epss
scoring_elements 0.25693
published_at 2026-04-13T12:55:00Z
13
value 0.00091
scoring_system epss
scoring_elements 0.25695
published_at 2026-04-16T12:55:00Z
14
value 0.00091
scoring_system epss
scoring_elements 0.25677
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-16233
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16233
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16233
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://lkml.org/lkml/2019/9/9/487
reference_id
reference_type
scores
url https://lkml.org/lkml/2019/9/9/487
7
reference_url https://security.netapp.com/advisory/ntap-20191004-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20191004-0001/
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1760420
reference_id 1760420
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1760420
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:5.2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:5.2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:5.2.14:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-16233
reference_id CVE-2019-16233
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
1
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-16233
19
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
20
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
21
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
22
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
23
reference_url https://usn.ubuntu.com/4226-1/
reference_id USN-4226-1
reference_type
scores
url https://usn.ubuntu.com/4226-1/
24
reference_url https://usn.ubuntu.com/4227-1/
reference_id USN-4227-1
reference_type
scores
url https://usn.ubuntu.com/4227-1/
25
reference_url https://usn.ubuntu.com/4227-2/
reference_id USN-4227-2
reference_type
scores
url https://usn.ubuntu.com/4227-2/
26
reference_url https://usn.ubuntu.com/4346-1/
reference_id USN-4346-1
reference_type
scores
url https://usn.ubuntu.com/4346-1/
fixed_packages
aliases CVE-2019-16233
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7v1s-4cxs-zyeg
11
url VCID-8d8k-r7yj-vkak
vulnerability_id VCID-8d8k-r7yj-vkak
summary kernel: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c allow for a DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19063.json
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19063.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19063
reference_id
reference_type
scores
0
value 0.00074
scoring_system epss
scoring_elements 0.22279
published_at 2026-04-07T12:55:00Z
1
value 0.00074
scoring_system epss
scoring_elements 0.22445
published_at 2026-04-02T12:55:00Z
2
value 0.00074
scoring_system epss
scoring_elements 0.22491
published_at 2026-04-04T12:55:00Z
3
value 0.00074
scoring_system epss
scoring_elements 0.22362
published_at 2026-04-08T12:55:00Z
4
value 0.00074
scoring_system epss
scoring_elements 0.22417
published_at 2026-04-09T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.22439
published_at 2026-04-11T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22397
published_at 2026-04-12T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.2234
published_at 2026-04-13T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22356
published_at 2026-04-16T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.2235
published_at 2026-04-18T12:55:00Z
10
value 0.00074
scoring_system epss
scoring_elements 0.223
published_at 2026-04-21T12:55:00Z
11
value 0.00074
scoring_system epss
scoring_elements 0.2215
published_at 2026-04-24T12:55:00Z
12
value 0.00074
scoring_system epss
scoring_elements 0.22137
published_at 2026-04-26T12:55:00Z
13
value 0.00074
scoring_system epss
scoring_elements 0.22131
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19063
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19063
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1775015
reference_id 1775015
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1775015
5
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
6
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
7
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
8
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
9
reference_url https://usn.ubuntu.com/4254-1/
reference_id USN-4254-1
reference_type
scores
url https://usn.ubuntu.com/4254-1/
10
reference_url https://usn.ubuntu.com/4254-2/
reference_id USN-4254-2
reference_type
scores
url https://usn.ubuntu.com/4254-2/
11
reference_url https://usn.ubuntu.com/4284-1/
reference_id USN-4284-1
reference_type
scores
url https://usn.ubuntu.com/4284-1/
12
reference_url https://usn.ubuntu.com/4285-1/
reference_id USN-4285-1
reference_type
scores
url https://usn.ubuntu.com/4285-1/
13
reference_url https://usn.ubuntu.com/4287-1/
reference_id USN-4287-1
reference_type
scores
url https://usn.ubuntu.com/4287-1/
14
reference_url https://usn.ubuntu.com/4287-2/
reference_id USN-4287-2
reference_type
scores
url https://usn.ubuntu.com/4287-2/
fixed_packages
aliases CVE-2019-19063
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8d8k-r7yj-vkak
12
url VCID-8thm-a761-h7g5
vulnerability_id VCID-8thm-a761-h7g5
summary kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-0305.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-0305.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-0305
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.11686
published_at 2026-04-01T12:55:00Z
1
value 0.00039
scoring_system epss
scoring_elements 0.11808
published_at 2026-04-02T12:55:00Z
2
value 0.00039
scoring_system epss
scoring_elements 0.1185
published_at 2026-04-04T12:55:00Z
3
value 0.00039
scoring_system epss
scoring_elements 0.11639
published_at 2026-04-07T12:55:00Z
4
value 0.00039
scoring_system epss
scoring_elements 0.11724
published_at 2026-04-08T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.11779
published_at 2026-04-09T12:55:00Z
6
value 0.00039
scoring_system epss
scoring_elements 0.1179
published_at 2026-04-11T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.11751
published_at 2026-04-12T12:55:00Z
8
value 0.00039
scoring_system epss
scoring_elements 0.11726
published_at 2026-04-13T12:55:00Z
9
value 0.00039
scoring_system epss
scoring_elements 0.11589
published_at 2026-04-16T12:55:00Z
10
value 0.00039
scoring_system epss
scoring_elements 0.11591
published_at 2026-04-18T12:55:00Z
11
value 0.00039
scoring_system epss
scoring_elements 0.11713
published_at 2026-04-21T12:55:00Z
12
value 0.00039
scoring_system epss
scoring_elements 0.11671
published_at 2026-04-24T12:55:00Z
13
value 0.00039
scoring_system epss
scoring_elements 0.11632
published_at 2026-04-26T12:55:00Z
14
value 0.00039
scoring_system epss
scoring_elements 0.11556
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-0305
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0305
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1860065
reference_id 1860065
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1860065
5
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
6
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
fixed_packages
aliases CVE-2020-0305
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8thm-a761-h7g5
13
url VCID-8zf2-xe9p-7kb1
vulnerability_id VCID-8zf2-xe9p-7kb1
summary kernel: padata: fix UAF in padata_reorder
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21727.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21727.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-21727
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.07957
published_at 2026-04-29T12:55:00Z
1
value 0.00028
scoring_system epss
scoring_elements 0.07979
published_at 2026-04-07T12:55:00Z
2
value 0.00028
scoring_system epss
scoring_elements 0.08038
published_at 2026-04-08T12:55:00Z
3
value 0.00028
scoring_system epss
scoring_elements 0.08057
published_at 2026-04-09T12:55:00Z
4
value 0.00028
scoring_system epss
scoring_elements 0.08041
published_at 2026-04-11T12:55:00Z
5
value 0.00028
scoring_system epss
scoring_elements 0.08021
published_at 2026-04-12T12:55:00Z
6
value 0.00028
scoring_system epss
scoring_elements 0.08005
published_at 2026-04-13T12:55:00Z
7
value 0.00028
scoring_system epss
scoring_elements 0.07918
published_at 2026-04-16T12:55:00Z
8
value 0.00028
scoring_system epss
scoring_elements 0.07901
published_at 2026-04-18T12:55:00Z
9
value 0.00028
scoring_system epss
scoring_elements 0.08062
published_at 2026-04-21T12:55:00Z
10
value 0.00028
scoring_system epss
scoring_elements 0.08016
published_at 2026-04-24T12:55:00Z
11
value 0.00028
scoring_system epss
scoring_elements 0.07982
published_at 2026-04-26T12:55:00Z
12
value 0.00041
scoring_system epss
scoring_elements 0.12743
published_at 2026-04-04T12:55:00Z
13
value 0.00041
scoring_system epss
scoring_elements 0.12698
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-21727
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21727
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/0ae2f332cfd2d74cf3ce344ec9938cf3e29c3ccd
reference_id 0ae2f332cfd2d74cf3ce344ec9938cf3e29c3ccd
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:06Z/
url https://git.kernel.org/stable/c/0ae2f332cfd2d74cf3ce344ec9938cf3e29c3ccd
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348516
reference_id 2348516
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348516
6
reference_url https://git.kernel.org/stable/c/573ac9c70bf7885dc85d82fa44550581bfc3b738
reference_id 573ac9c70bf7885dc85d82fa44550581bfc3b738
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:06Z/
url https://git.kernel.org/stable/c/573ac9c70bf7885dc85d82fa44550581bfc3b738
7
reference_url https://git.kernel.org/stable/c/80231f069240d52e98b6a317456c67b2eafd0781
reference_id 80231f069240d52e98b6a317456c67b2eafd0781
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:06Z/
url https://git.kernel.org/stable/c/80231f069240d52e98b6a317456c67b2eafd0781
8
reference_url https://git.kernel.org/stable/c/bbccae982e9fa1d7abcb23a5ec81cb0ec883f7de
reference_id bbccae982e9fa1d7abcb23a5ec81cb0ec883f7de
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:06Z/
url https://git.kernel.org/stable/c/bbccae982e9fa1d7abcb23a5ec81cb0ec883f7de
9
reference_url https://git.kernel.org/stable/c/e01780ea4661172734118d2a5f41bc9720765668
reference_id e01780ea4661172734118d2a5f41bc9720765668
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:06Z/
url https://git.kernel.org/stable/c/e01780ea4661172734118d2a5f41bc9720765668
10
reference_url https://git.kernel.org/stable/c/f3e0b9f790f8e8065d59e67b565a83154d9f3079
reference_id f3e0b9f790f8e8065d59e67b565a83154d9f3079
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:06Z/
url https://git.kernel.org/stable/c/f3e0b9f790f8e8065d59e67b565a83154d9f3079
11
reference_url https://git.kernel.org/stable/c/f78170bee51469734b1a306a74fc5f777bb22ba6
reference_id f78170bee51469734b1a306a74fc5f777bb22ba6
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:06Z/
url https://git.kernel.org/stable/c/f78170bee51469734b1a306a74fc5f777bb22ba6
12
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
13
reference_url https://access.redhat.com/errata/RHSA-2025:12662
reference_id RHSA-2025:12662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12662
14
reference_url https://access.redhat.com/errata/RHSA-2025:12746
reference_id RHSA-2025:12746
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12746
15
reference_url https://access.redhat.com/errata/RHSA-2025:13061
reference_id RHSA-2025:13061
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13061
16
reference_url https://access.redhat.com/errata/RHSA-2025:13135
reference_id RHSA-2025:13135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13135
17
reference_url https://access.redhat.com/errata/RHSA-2025:13589
reference_id RHSA-2025:13589
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13589
18
reference_url https://access.redhat.com/errata/RHSA-2025:13590
reference_id RHSA-2025:13590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13590
19
reference_url https://access.redhat.com/errata/RHSA-2025:13633
reference_id RHSA-2025:13633
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13633
20
reference_url https://access.redhat.com/errata/RHSA-2025:13776
reference_id RHSA-2025:13776
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13776
21
reference_url https://access.redhat.com/errata/RHSA-2025:13781
reference_id RHSA-2025:13781
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13781
22
reference_url https://access.redhat.com/errata/RHSA-2025:14054
reference_id RHSA-2025:14054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14054
23
reference_url https://access.redhat.com/errata/RHSA-2025:14094
reference_id RHSA-2025:14094
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14094
24
reference_url https://access.redhat.com/errata/RHSA-2025:15035
reference_id RHSA-2025:15035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15035
25
reference_url https://access.redhat.com/errata/RHSA-2025:20095
reference_id RHSA-2025:20095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:20095
26
reference_url https://access.redhat.com/errata/RHSA-2025:20518
reference_id RHSA-2025:20518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:20518
27
reference_url https://usn.ubuntu.com/7510-1/
reference_id USN-7510-1
reference_type
scores
url https://usn.ubuntu.com/7510-1/
28
reference_url https://usn.ubuntu.com/7510-2/
reference_id USN-7510-2
reference_type
scores
url https://usn.ubuntu.com/7510-2/
29
reference_url https://usn.ubuntu.com/7510-3/
reference_id USN-7510-3
reference_type
scores
url https://usn.ubuntu.com/7510-3/
30
reference_url https://usn.ubuntu.com/7510-4/
reference_id USN-7510-4
reference_type
scores
url https://usn.ubuntu.com/7510-4/
31
reference_url https://usn.ubuntu.com/7510-5/
reference_id USN-7510-5
reference_type
scores
url https://usn.ubuntu.com/7510-5/
32
reference_url https://usn.ubuntu.com/7510-6/
reference_id USN-7510-6
reference_type
scores
url https://usn.ubuntu.com/7510-6/
33
reference_url https://usn.ubuntu.com/7510-7/
reference_id USN-7510-7
reference_type
scores
url https://usn.ubuntu.com/7510-7/
34
reference_url https://usn.ubuntu.com/7510-8/
reference_id USN-7510-8
reference_type
scores
url https://usn.ubuntu.com/7510-8/
35
reference_url https://usn.ubuntu.com/7511-1/
reference_id USN-7511-1
reference_type
scores
url https://usn.ubuntu.com/7511-1/
36
reference_url https://usn.ubuntu.com/7511-2/
reference_id USN-7511-2
reference_type
scores
url https://usn.ubuntu.com/7511-2/
37
reference_url https://usn.ubuntu.com/7511-3/
reference_id USN-7511-3
reference_type
scores
url https://usn.ubuntu.com/7511-3/
38
reference_url https://usn.ubuntu.com/7512-1/
reference_id USN-7512-1
reference_type
scores
url https://usn.ubuntu.com/7512-1/
39
reference_url https://usn.ubuntu.com/7521-1/
reference_id USN-7521-1
reference_type
scores
url https://usn.ubuntu.com/7521-1/
40
reference_url https://usn.ubuntu.com/7521-2/
reference_id USN-7521-2
reference_type
scores
url https://usn.ubuntu.com/7521-2/
41
reference_url https://usn.ubuntu.com/7521-3/
reference_id USN-7521-3
reference_type
scores
url https://usn.ubuntu.com/7521-3/
42
reference_url https://usn.ubuntu.com/7593-1/
reference_id USN-7593-1
reference_type
scores
url https://usn.ubuntu.com/7593-1/
43
reference_url https://usn.ubuntu.com/7602-1/
reference_id USN-7602-1
reference_type
scores
url https://usn.ubuntu.com/7602-1/
44
reference_url https://usn.ubuntu.com/7651-1/
reference_id USN-7651-1
reference_type
scores
url https://usn.ubuntu.com/7651-1/
45
reference_url https://usn.ubuntu.com/7651-2/
reference_id USN-7651-2
reference_type
scores
url https://usn.ubuntu.com/7651-2/
46
reference_url https://usn.ubuntu.com/7651-3/
reference_id USN-7651-3
reference_type
scores
url https://usn.ubuntu.com/7651-3/
47
reference_url https://usn.ubuntu.com/7651-4/
reference_id USN-7651-4
reference_type
scores
url https://usn.ubuntu.com/7651-4/
48
reference_url https://usn.ubuntu.com/7651-5/
reference_id USN-7651-5
reference_type
scores
url https://usn.ubuntu.com/7651-5/
49
reference_url https://usn.ubuntu.com/7651-6/
reference_id USN-7651-6
reference_type
scores
url https://usn.ubuntu.com/7651-6/
50
reference_url https://usn.ubuntu.com/7652-1/
reference_id USN-7652-1
reference_type
scores
url https://usn.ubuntu.com/7652-1/
51
reference_url https://usn.ubuntu.com/7653-1/
reference_id USN-7653-1
reference_type
scores
url https://usn.ubuntu.com/7653-1/
52
reference_url https://usn.ubuntu.com/7737-1/
reference_id USN-7737-1
reference_type
scores
url https://usn.ubuntu.com/7737-1/
53
reference_url https://usn.ubuntu.com/7874-1/
reference_id USN-7874-1
reference_type
scores
url https://usn.ubuntu.com/7874-1/
54
reference_url https://usn.ubuntu.com/7874-2/
reference_id USN-7874-2
reference_type
scores
url https://usn.ubuntu.com/7874-2/
55
reference_url https://usn.ubuntu.com/7874-3/
reference_id USN-7874-3
reference_type
scores
url https://usn.ubuntu.com/7874-3/
56
reference_url https://usn.ubuntu.com/7939-1/
reference_id USN-7939-1
reference_type
scores
url https://usn.ubuntu.com/7939-1/
57
reference_url https://usn.ubuntu.com/7939-2/
reference_id USN-7939-2
reference_type
scores
url https://usn.ubuntu.com/7939-2/
fixed_packages
aliases CVE-2025-21727
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8zf2-xe9p-7kb1
14
url VCID-9sy3-h5gv-hkfj
vulnerability_id VCID-9sy3-h5gv-hkfj
summary kernel: null pointer dereference in dlpar_parse_cc_property in arch/powerrc/platforms/pseries/dlpar.c causing denial of service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12614.json
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12614.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-12614
reference_id
reference_type
scores
0
value 0.00084
scoring_system epss
scoring_elements 0.24569
published_at 2026-04-01T12:55:00Z
1
value 0.00084
scoring_system epss
scoring_elements 0.24647
published_at 2026-04-02T12:55:00Z
2
value 0.00084
scoring_system epss
scoring_elements 0.24684
published_at 2026-04-04T12:55:00Z
3
value 0.00084
scoring_system epss
scoring_elements 0.24456
published_at 2026-04-07T12:55:00Z
4
value 0.00084
scoring_system epss
scoring_elements 0.24526
published_at 2026-04-08T12:55:00Z
5
value 0.00084
scoring_system epss
scoring_elements 0.2457
published_at 2026-04-09T12:55:00Z
6
value 0.00084
scoring_system epss
scoring_elements 0.24586
published_at 2026-04-11T12:55:00Z
7
value 0.00084
scoring_system epss
scoring_elements 0.24542
published_at 2026-04-12T12:55:00Z
8
value 0.00084
scoring_system epss
scoring_elements 0.24488
published_at 2026-04-13T12:55:00Z
9
value 0.00084
scoring_system epss
scoring_elements 0.24501
published_at 2026-04-16T12:55:00Z
10
value 0.00084
scoring_system epss
scoring_elements 0.24493
published_at 2026-04-18T12:55:00Z
11
value 0.00084
scoring_system epss
scoring_elements 0.24469
published_at 2026-04-21T12:55:00Z
12
value 0.00084
scoring_system epss
scoring_elements 0.24409
published_at 2026-04-24T12:55:00Z
13
value 0.00084
scoring_system epss
scoring_elements 0.24393
published_at 2026-04-26T12:55:00Z
14
value 0.00084
scoring_system epss
scoring_elements 0.24351
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-12614
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12614
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1718176
reference_id 1718176
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1718176
5
reference_url https://access.redhat.com/errata/RHSA-2020:2104
reference_id RHSA-2020:2104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2104
6
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
7
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
8
reference_url https://usn.ubuntu.com/4093-1/
reference_id USN-4093-1
reference_type
scores
url https://usn.ubuntu.com/4093-1/
9
reference_url https://usn.ubuntu.com/4094-1/
reference_id USN-4094-1
reference_type
scores
url https://usn.ubuntu.com/4094-1/
10
reference_url https://usn.ubuntu.com/4095-1/
reference_id USN-4095-1
reference_type
scores
url https://usn.ubuntu.com/4095-1/
11
reference_url https://usn.ubuntu.com/4095-2/
reference_id USN-4095-2
reference_type
scores
url https://usn.ubuntu.com/4095-2/
fixed_packages
aliases CVE-2019-12614
risk_score 1.9
exploitability 0.5
weighted_severity 3.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9sy3-h5gv-hkfj
15
url VCID-aanx-nd3m-dugx
vulnerability_id VCID-aanx-nd3m-dugx
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8648.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8648.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-8648
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10236
published_at 2026-04-29T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10364
published_at 2026-04-12T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10342
published_at 2026-04-13T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10216
published_at 2026-04-16T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.10188
published_at 2026-04-18T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10321
published_at 2026-04-21T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.103
published_at 2026-04-24T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.10293
published_at 2026-04-26T12:55:00Z
8
value 0.00035
scoring_system epss
scoring_elements 0.10404
published_at 2026-04-11T12:55:00Z
9
value 0.00036
scoring_system epss
scoring_elements 0.10705
published_at 2026-04-07T12:55:00Z
10
value 0.00036
scoring_system epss
scoring_elements 0.10814
published_at 2026-04-02T12:55:00Z
11
value 0.00036
scoring_system epss
scoring_elements 0.10879
published_at 2026-04-04T12:55:00Z
12
value 0.00036
scoring_system epss
scoring_elements 0.10675
published_at 2026-04-01T12:55:00Z
13
value 0.00036
scoring_system epss
scoring_elements 0.10781
published_at 2026-04-08T12:55:00Z
14
value 0.00036
scoring_system epss
scoring_elements 0.10838
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-8648
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
33
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1802559
reference_id 1802559
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1802559
35
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
36
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
37
reference_url https://access.redhat.com/errata/RHSA-2021:2314
reference_id RHSA-2021:2314
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2314
38
reference_url https://access.redhat.com/errata/RHSA-2021:2316
reference_id RHSA-2021:2316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2316
39
reference_url https://access.redhat.com/errata/RHSA-2021:3320
reference_id RHSA-2021:3320
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3320
40
reference_url https://access.redhat.com/errata/RHSA-2021:3522
reference_id RHSA-2021:3522
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3522
41
reference_url https://usn.ubuntu.com/4342-1/
reference_id USN-4342-1
reference_type
scores
url https://usn.ubuntu.com/4342-1/
42
reference_url https://usn.ubuntu.com/4344-1/
reference_id USN-4344-1
reference_type
scores
url https://usn.ubuntu.com/4344-1/
43
reference_url https://usn.ubuntu.com/4345-1/
reference_id USN-4345-1
reference_type
scores
url https://usn.ubuntu.com/4345-1/
44
reference_url https://usn.ubuntu.com/4346-1/
reference_id USN-4346-1
reference_type
scores
url https://usn.ubuntu.com/4346-1/
fixed_packages
aliases CVE-2020-8648
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aanx-nd3m-dugx
16
url VCID-ankt-5jfy-qyc4
vulnerability_id VCID-ankt-5jfy-qyc4
summary kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19072.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19072.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19072
reference_id
reference_type
scores
0
value 0.00099
scoring_system epss
scoring_elements 0.27704
published_at 2026-04-01T12:55:00Z
1
value 0.00099
scoring_system epss
scoring_elements 0.27307
published_at 2026-04-29T12:55:00Z
2
value 0.00099
scoring_system epss
scoring_elements 0.27531
published_at 2026-04-21T12:55:00Z
3
value 0.00099
scoring_system epss
scoring_elements 0.27489
published_at 2026-04-24T12:55:00Z
4
value 0.00099
scoring_system epss
scoring_elements 0.27383
published_at 2026-04-26T12:55:00Z
5
value 0.00099
scoring_system epss
scoring_elements 0.27741
published_at 2026-04-02T12:55:00Z
6
value 0.00099
scoring_system epss
scoring_elements 0.27779
published_at 2026-04-04T12:55:00Z
7
value 0.00099
scoring_system epss
scoring_elements 0.27573
published_at 2026-04-07T12:55:00Z
8
value 0.00099
scoring_system epss
scoring_elements 0.27641
published_at 2026-04-08T12:55:00Z
9
value 0.00099
scoring_system epss
scoring_elements 0.27684
published_at 2026-04-09T12:55:00Z
10
value 0.00099
scoring_system epss
scoring_elements 0.27689
published_at 2026-04-11T12:55:00Z
11
value 0.00099
scoring_system epss
scoring_elements 0.27645
published_at 2026-04-12T12:55:00Z
12
value 0.00099
scoring_system epss
scoring_elements 0.27588
published_at 2026-04-13T12:55:00Z
13
value 0.00099
scoring_system epss
scoring_elements 0.27596
published_at 2026-04-16T12:55:00Z
14
value 0.00099
scoring_system epss
scoring_elements 0.2757
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19072
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19072
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19072
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/torvalds/linux/commit/96c5c6e6a5b6db592acae039fed54b5c8844cd35
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/96c5c6e6a5b6db592acae039fed54b5c8844cd35
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
7
reference_url https://security.netapp.com/advisory/ntap-20191205-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20191205-0001/
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1774946
reference_id 1774946
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1774946
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-19072
reference_id CVE-2019-19072
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-19072
17
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
18
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
19
reference_url https://usn.ubuntu.com/4225-1/
reference_id USN-4225-1
reference_type
scores
url https://usn.ubuntu.com/4225-1/
20
reference_url https://usn.ubuntu.com/4225-2/
reference_id USN-4225-2
reference_type
scores
url https://usn.ubuntu.com/4225-2/
21
reference_url https://usn.ubuntu.com/4226-1/
reference_id USN-4226-1
reference_type
scores
url https://usn.ubuntu.com/4226-1/
fixed_packages
aliases CVE-2019-19072
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ankt-5jfy-qyc4
17
url VCID-bg9r-sesr-k7fh
vulnerability_id VCID-bg9r-sesr-k7fh
summary kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry related to fs/ext4/inode.c and fs/ext4/super.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19767.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19767.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19767
reference_id
reference_type
scores
0
value 0.00382
scoring_system epss
scoring_elements 0.59487
published_at 2026-04-01T12:55:00Z
1
value 0.00382
scoring_system epss
scoring_elements 0.5956
published_at 2026-04-02T12:55:00Z
2
value 0.00382
scoring_system epss
scoring_elements 0.59585
published_at 2026-04-04T12:55:00Z
3
value 0.00382
scoring_system epss
scoring_elements 0.59553
published_at 2026-04-07T12:55:00Z
4
value 0.00382
scoring_system epss
scoring_elements 0.59605
published_at 2026-04-08T12:55:00Z
5
value 0.00382
scoring_system epss
scoring_elements 0.59618
published_at 2026-04-09T12:55:00Z
6
value 0.00382
scoring_system epss
scoring_elements 0.59637
published_at 2026-04-11T12:55:00Z
7
value 0.00382
scoring_system epss
scoring_elements 0.5962
published_at 2026-04-12T12:55:00Z
8
value 0.00382
scoring_system epss
scoring_elements 0.59601
published_at 2026-04-29T12:55:00Z
9
value 0.00382
scoring_system epss
scoring_elements 0.59634
published_at 2026-04-16T12:55:00Z
10
value 0.00382
scoring_system epss
scoring_elements 0.59641
published_at 2026-04-18T12:55:00Z
11
value 0.00382
scoring_system epss
scoring_elements 0.59624
published_at 2026-04-21T12:55:00Z
12
value 0.00382
scoring_system epss
scoring_elements 0.59594
published_at 2026-04-24T12:55:00Z
13
value 0.00382
scoring_system epss
scoring_elements 0.59614
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19767
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19767
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1786160
reference_id 1786160
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1786160
5
reference_url https://access.redhat.com/errata/RHSA-2020:2854
reference_id RHSA-2020:2854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2854
6
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
7
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
8
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
9
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
10
reference_url https://usn.ubuntu.com/4258-1/
reference_id USN-4258-1
reference_type
scores
url https://usn.ubuntu.com/4258-1/
11
reference_url https://usn.ubuntu.com/4284-1/
reference_id USN-4284-1
reference_type
scores
url https://usn.ubuntu.com/4284-1/
12
reference_url https://usn.ubuntu.com/4287-1/
reference_id USN-4287-1
reference_type
scores
url https://usn.ubuntu.com/4287-1/
13
reference_url https://usn.ubuntu.com/4287-2/
reference_id USN-4287-2
reference_type
scores
url https://usn.ubuntu.com/4287-2/
fixed_packages
aliases CVE-2019-19767
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bg9r-sesr-k7fh
18
url VCID-bsx5-tnrg-juch
vulnerability_id VCID-bsx5-tnrg-juch
summary Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19332.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19332.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19332
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06049
published_at 2026-04-01T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06082
published_at 2026-04-02T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06111
published_at 2026-04-04T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06094
published_at 2026-04-07T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06136
published_at 2026-04-08T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06175
published_at 2026-04-09T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06165
published_at 2026-04-11T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06161
published_at 2026-04-12T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.06153
published_at 2026-04-13T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06112
published_at 2026-04-16T12:55:00Z
10
value 0.00023
scoring_system epss
scoring_elements 0.06123
published_at 2026-04-18T12:55:00Z
11
value 0.00023
scoring_system epss
scoring_elements 0.06275
published_at 2026-04-21T12:55:00Z
12
value 0.00023
scoring_system epss
scoring_elements 0.06293
published_at 2026-04-24T12:55:00Z
13
value 0.00023
scoring_system epss
scoring_elements 0.0632
published_at 2026-04-26T12:55:00Z
14
value 0.00023
scoring_system epss
scoring_elements 0.06332
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19332
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19332
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1779594
reference_id 1779594
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1779594
5
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
6
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
7
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
8
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
9
reference_url https://usn.ubuntu.com/4254-1/
reference_id USN-4254-1
reference_type
scores
url https://usn.ubuntu.com/4254-1/
10
reference_url https://usn.ubuntu.com/4254-2/
reference_id USN-4254-2
reference_type
scores
url https://usn.ubuntu.com/4254-2/
11
reference_url https://usn.ubuntu.com/4258-1/
reference_id USN-4258-1
reference_type
scores
url https://usn.ubuntu.com/4258-1/
12
reference_url https://usn.ubuntu.com/4284-1/
reference_id USN-4284-1
reference_type
scores
url https://usn.ubuntu.com/4284-1/
13
reference_url https://usn.ubuntu.com/4287-1/
reference_id USN-4287-1
reference_type
scores
url https://usn.ubuntu.com/4287-1/
14
reference_url https://usn.ubuntu.com/4287-2/
reference_id USN-4287-2
reference_type
scores
url https://usn.ubuntu.com/4287-2/
fixed_packages
aliases CVE-2019-19332
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bsx5-tnrg-juch
19
url VCID-cmq5-eh24-zygx
vulnerability_id VCID-cmq5-eh24-zygx
summary kernel: out-of-bounds write via crafted keycode table
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20636.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20636.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-20636
reference_id
reference_type
scores
0
value 0.00112
scoring_system epss
scoring_elements 0.29713
published_at 2026-04-01T12:55:00Z
1
value 0.00112
scoring_system epss
scoring_elements 0.29759
published_at 2026-04-02T12:55:00Z
2
value 0.00112
scoring_system epss
scoring_elements 0.29806
published_at 2026-04-04T12:55:00Z
3
value 0.00112
scoring_system epss
scoring_elements 0.29624
published_at 2026-04-07T12:55:00Z
4
value 0.00112
scoring_system epss
scoring_elements 0.29686
published_at 2026-04-08T12:55:00Z
5
value 0.00112
scoring_system epss
scoring_elements 0.29723
published_at 2026-04-09T12:55:00Z
6
value 0.00112
scoring_system epss
scoring_elements 0.29726
published_at 2026-04-11T12:55:00Z
7
value 0.00112
scoring_system epss
scoring_elements 0.29682
published_at 2026-04-12T12:55:00Z
8
value 0.00112
scoring_system epss
scoring_elements 0.29631
published_at 2026-04-13T12:55:00Z
9
value 0.00112
scoring_system epss
scoring_elements 0.29649
published_at 2026-04-16T12:55:00Z
10
value 0.00112
scoring_system epss
scoring_elements 0.29626
published_at 2026-04-18T12:55:00Z
11
value 0.00112
scoring_system epss
scoring_elements 0.29582
published_at 2026-04-21T12:55:00Z
12
value 0.00112
scoring_system epss
scoring_elements 0.29502
published_at 2026-04-24T12:55:00Z
13
value 0.00112
scoring_system epss
scoring_elements 0.29388
published_at 2026-04-26T12:55:00Z
14
value 0.00112
scoring_system epss
scoring_elements 0.29324
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-20636
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20636
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1824059
reference_id 1824059
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1824059
5
reference_url https://access.redhat.com/errata/RHSA-2020:2854
reference_id RHSA-2020:2854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2854
6
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
7
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
8
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
9
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
10
reference_url https://access.redhat.com/errata/RHSA-2020:5430
reference_id RHSA-2020:5430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5430
11
reference_url https://access.redhat.com/errata/RHSA-2020:5656
reference_id RHSA-2020:5656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5656
12
reference_url https://access.redhat.com/errata/RHSA-2021:0019
reference_id RHSA-2021:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0019
fixed_packages
aliases CVE-2019-20636
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cmq5-eh24-zygx
20
url VCID-d2sg-4gtu-wff8
vulnerability_id VCID-d2sg-4gtu-wff8
summary kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25641.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25641.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25641
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.05109
published_at 2026-04-01T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.05156
published_at 2026-04-02T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.05185
published_at 2026-04-04T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.05205
published_at 2026-04-07T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.05238
published_at 2026-04-08T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.05257
published_at 2026-04-09T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.05224
published_at 2026-04-11T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.05209
published_at 2026-04-12T12:55:00Z
8
value 0.00019
scoring_system epss
scoring_elements 0.05195
published_at 2026-04-13T12:55:00Z
9
value 0.00019
scoring_system epss
scoring_elements 0.05139
published_at 2026-04-16T12:55:00Z
10
value 0.00019
scoring_system epss
scoring_elements 0.05142
published_at 2026-04-18T12:55:00Z
11
value 0.00019
scoring_system epss
scoring_elements 0.05294
published_at 2026-04-21T12:55:00Z
12
value 0.00019
scoring_system epss
scoring_elements 0.05333
published_at 2026-04-24T12:55:00Z
13
value 0.00019
scoring_system epss
scoring_elements 0.05374
published_at 2026-04-26T12:55:00Z
14
value 0.00019
scoring_system epss
scoring_elements 0.05373
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25641
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25641
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1881424
reference_id 1881424
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1881424
5
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
6
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
7
reference_url https://access.redhat.com/errata/RHSA-2020:5079
reference_id RHSA-2020:5079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5079
8
reference_url https://access.redhat.com/errata/RHSA-2020:5374
reference_id RHSA-2020:5374
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5374
9
reference_url https://access.redhat.com/errata/RHSA-2021:0073
reference_id RHSA-2021:0073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0073
10
reference_url https://access.redhat.com/errata/RHSA-2021:0136
reference_id RHSA-2021:0136
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0136
11
reference_url https://usn.ubuntu.com/4576-1/
reference_id USN-4576-1
reference_type
scores
url https://usn.ubuntu.com/4576-1/
12
reference_url https://usn.ubuntu.com/4660-1/
reference_id USN-4660-1
reference_type
scores
url https://usn.ubuntu.com/4660-1/
13
reference_url https://usn.ubuntu.com/4752-1/
reference_id USN-4752-1
reference_type
scores
url https://usn.ubuntu.com/4752-1/
fixed_packages
aliases CVE-2020-25641
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d2sg-4gtu-wff8
21
url VCID-da1t-1kc9-rqbr
vulnerability_id VCID-da1t-1kc9-rqbr
summary kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16231.json
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16231.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-16231
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05312
published_at 2026-04-01T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.0559
published_at 2026-04-29T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05517
published_at 2026-04-21T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05554
published_at 2026-04-24T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05591
published_at 2026-04-26T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05354
published_at 2026-04-02T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.05384
published_at 2026-04-04T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05391
published_at 2026-04-07T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05425
published_at 2026-04-08T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.05448
published_at 2026-04-09T12:55:00Z
10
value 0.0002
scoring_system epss
scoring_elements 0.05421
published_at 2026-04-11T12:55:00Z
11
value 0.0002
scoring_system epss
scoring_elements 0.05408
published_at 2026-04-12T12:55:00Z
12
value 0.0002
scoring_system epss
scoring_elements 0.054
published_at 2026-04-13T12:55:00Z
13
value 0.0002
scoring_system epss
scoring_elements 0.05353
published_at 2026-04-16T12:55:00Z
14
value 0.0002
scoring_system epss
scoring_elements 0.05356
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-16231
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16231
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://lkml.org/lkml/2019/9/9/487
reference_id
reference_type
scores
url https://lkml.org/lkml/2019/9/9/487
7
reference_url https://security.netapp.com/advisory/ntap-20191004-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20191004-0001/
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1760310
reference_id 1760310
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1760310
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:5.2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:5.2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:5.2.14:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-16231
reference_id CVE-2019-16231
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
1
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-16231
20
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
21
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
22
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
23
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
24
reference_url https://usn.ubuntu.com/4225-1/
reference_id USN-4225-1
reference_type
scores
url https://usn.ubuntu.com/4225-1/
25
reference_url https://usn.ubuntu.com/4225-2/
reference_id USN-4225-2
reference_type
scores
url https://usn.ubuntu.com/4225-2/
26
reference_url https://usn.ubuntu.com/4226-1/
reference_id USN-4226-1
reference_type
scores
url https://usn.ubuntu.com/4226-1/
27
reference_url https://usn.ubuntu.com/4227-1/
reference_id USN-4227-1
reference_type
scores
url https://usn.ubuntu.com/4227-1/
28
reference_url https://usn.ubuntu.com/4227-2/
reference_id USN-4227-2
reference_type
scores
url https://usn.ubuntu.com/4227-2/
29
reference_url https://usn.ubuntu.com/4904-1/
reference_id USN-4904-1
reference_type
scores
url https://usn.ubuntu.com/4904-1/
fixed_packages
aliases CVE-2019-16231
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-da1t-1kc9-rqbr
22
url VCID-du16-3az2-k3ht
vulnerability_id VCID-du16-3az2-k3ht
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19319.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19319.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19319
reference_id
reference_type
scores
0
value 0.00436
scoring_system epss
scoring_elements 0.62833
published_at 2026-04-01T12:55:00Z
1
value 0.00436
scoring_system epss
scoring_elements 0.62891
published_at 2026-04-02T12:55:00Z
2
value 0.00436
scoring_system epss
scoring_elements 0.62921
published_at 2026-04-04T12:55:00Z
3
value 0.00436
scoring_system epss
scoring_elements 0.62884
published_at 2026-04-07T12:55:00Z
4
value 0.00436
scoring_system epss
scoring_elements 0.62935
published_at 2026-04-08T12:55:00Z
5
value 0.00436
scoring_system epss
scoring_elements 0.62951
published_at 2026-04-09T12:55:00Z
6
value 0.00436
scoring_system epss
scoring_elements 0.6297
published_at 2026-04-11T12:55:00Z
7
value 0.00436
scoring_system epss
scoring_elements 0.62958
published_at 2026-04-12T12:55:00Z
8
value 0.00436
scoring_system epss
scoring_elements 0.62936
published_at 2026-04-13T12:55:00Z
9
value 0.00436
scoring_system epss
scoring_elements 0.62977
published_at 2026-04-16T12:55:00Z
10
value 0.00436
scoring_system epss
scoring_elements 0.62984
published_at 2026-04-24T12:55:00Z
11
value 0.00436
scoring_system epss
scoring_elements 0.62963
published_at 2026-04-21T12:55:00Z
12
value 0.00436
scoring_system epss
scoring_elements 0.62998
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19319
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
33
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1784130
reference_id 1784130
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1784130
35
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
36
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
37
reference_url https://usn.ubuntu.com/4391-1/
reference_id USN-4391-1
reference_type
scores
url https://usn.ubuntu.com/4391-1/
fixed_packages
aliases CVE-2019-19319
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-du16-3az2-k3ht
23
url VCID-dy2f-95pu-13ah
vulnerability_id VCID-dy2f-95pu-13ah
summary kernel: buffer overflow in mt76_add_fragment function in drivers/net/wireless/mediatek/mt76/dma.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12465.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12465.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12465
reference_id
reference_type
scores
0
value 0.00169
scoring_system epss
scoring_elements 0.38063
published_at 2026-04-01T12:55:00Z
1
value 0.00169
scoring_system epss
scoring_elements 0.38242
published_at 2026-04-02T12:55:00Z
2
value 0.00169
scoring_system epss
scoring_elements 0.38266
published_at 2026-04-04T12:55:00Z
3
value 0.00169
scoring_system epss
scoring_elements 0.38135
published_at 2026-04-07T12:55:00Z
4
value 0.00169
scoring_system epss
scoring_elements 0.38185
published_at 2026-04-08T12:55:00Z
5
value 0.00169
scoring_system epss
scoring_elements 0.38193
published_at 2026-04-09T12:55:00Z
6
value 0.00169
scoring_system epss
scoring_elements 0.38212
published_at 2026-04-11T12:55:00Z
7
value 0.00169
scoring_system epss
scoring_elements 0.38176
published_at 2026-04-12T12:55:00Z
8
value 0.00169
scoring_system epss
scoring_elements 0.38152
published_at 2026-04-13T12:55:00Z
9
value 0.00169
scoring_system epss
scoring_elements 0.38198
published_at 2026-04-16T12:55:00Z
10
value 0.00169
scoring_system epss
scoring_elements 0.3818
published_at 2026-04-18T12:55:00Z
11
value 0.00169
scoring_system epss
scoring_elements 0.38115
published_at 2026-04-21T12:55:00Z
12
value 0.00169
scoring_system epss
scoring_elements 0.379
published_at 2026-04-24T12:55:00Z
13
value 0.00169
scoring_system epss
scoring_elements 0.37877
published_at 2026-04-26T12:55:00Z
14
value 0.00169
scoring_system epss
scoring_elements 0.37782
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12465
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12465
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12465
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1831699
reference_id 1831699
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1831699
5
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
fixed_packages
aliases CVE-2020-12465
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dy2f-95pu-13ah
24
url VCID-e8sk-9gzn-rufm
vulnerability_id VCID-e8sk-9gzn-rufm
summary kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15925.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15925.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-15925
reference_id
reference_type
scores
0
value 0.00108
scoring_system epss
scoring_elements 0.29097
published_at 2026-04-08T12:55:00Z
1
value 0.00108
scoring_system epss
scoring_elements 0.28704
published_at 2026-04-29T12:55:00Z
2
value 0.00108
scoring_system epss
scoring_elements 0.28888
published_at 2026-04-24T12:55:00Z
3
value 0.00108
scoring_system epss
scoring_elements 0.28775
published_at 2026-04-26T12:55:00Z
4
value 0.00108
scoring_system epss
scoring_elements 0.29171
published_at 2026-04-02T12:55:00Z
5
value 0.00108
scoring_system epss
scoring_elements 0.29222
published_at 2026-04-04T12:55:00Z
6
value 0.00108
scoring_system epss
scoring_elements 0.29033
published_at 2026-04-07T12:55:00Z
7
value 0.00108
scoring_system epss
scoring_elements 0.29138
published_at 2026-04-09T12:55:00Z
8
value 0.00108
scoring_system epss
scoring_elements 0.29144
published_at 2026-04-11T12:55:00Z
9
value 0.00108
scoring_system epss
scoring_elements 0.291
published_at 2026-04-12T12:55:00Z
10
value 0.00108
scoring_system epss
scoring_elements 0.29048
published_at 2026-04-13T12:55:00Z
11
value 0.00108
scoring_system epss
scoring_elements 0.29076
published_at 2026-04-16T12:55:00Z
12
value 0.00108
scoring_system epss
scoring_elements 0.29053
published_at 2026-04-18T12:55:00Z
13
value 0.00108
scoring_system epss
scoring_elements 0.29008
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-15925
2
reference_url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3
reference_id
reference_type
scores
url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15925
4
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04f25edb48c441fc278ecc154c270f16966cbb90
reference_id
reference_type
scores
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04f25edb48c441fc278ecc154c270f16966cbb90
5
reference_url https://security.netapp.com/advisory/ntap-20191004-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20191004-0001/
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1759052
reference_id 1759052
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1759052
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-15925
reference_id CVE-2019-15925
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-15925
11
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
12
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
13
reference_url https://usn.ubuntu.com/4147-1/
reference_id USN-4147-1
reference_type
scores
url https://usn.ubuntu.com/4147-1/
fixed_packages
aliases CVE-2019-15925
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e8sk-9gzn-rufm
25
url VCID-eft3-zkps-6fgc
vulnerability_id VCID-eft3-zkps-6fgc
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8647.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8647.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-8647
reference_id
reference_type
scores
0
value 0.00076
scoring_system epss
scoring_elements 0.22793
published_at 2026-04-01T12:55:00Z
1
value 0.00076
scoring_system epss
scoring_elements 0.22962
published_at 2026-04-02T12:55:00Z
2
value 0.00076
scoring_system epss
scoring_elements 0.23006
published_at 2026-04-04T12:55:00Z
3
value 0.00076
scoring_system epss
scoring_elements 0.22798
published_at 2026-04-07T12:55:00Z
4
value 0.00076
scoring_system epss
scoring_elements 0.22872
published_at 2026-04-08T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.22924
published_at 2026-04-09T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.22943
published_at 2026-04-11T12:55:00Z
7
value 0.00076
scoring_system epss
scoring_elements 0.22906
published_at 2026-04-12T12:55:00Z
8
value 0.00076
scoring_system epss
scoring_elements 0.2285
published_at 2026-04-13T12:55:00Z
9
value 0.00076
scoring_system epss
scoring_elements 0.22864
published_at 2026-04-16T12:55:00Z
10
value 0.00076
scoring_system epss
scoring_elements 0.22858
published_at 2026-04-18T12:55:00Z
11
value 0.00076
scoring_system epss
scoring_elements 0.22818
published_at 2026-04-21T12:55:00Z
12
value 0.00076
scoring_system epss
scoring_elements 0.22655
published_at 2026-04-24T12:55:00Z
13
value 0.00076
scoring_system epss
scoring_elements 0.22648
published_at 2026-04-26T12:55:00Z
14
value 0.00076
scoring_system epss
scoring_elements 0.22643
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-8647
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
33
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1802563
reference_id 1802563
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1802563
35
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
36
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
37
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
38
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
39
reference_url https://access.redhat.com/errata/RHSA-2022:1209
reference_id RHSA-2022:1209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1209
40
reference_url https://access.redhat.com/errata/RHSA-2022:1213
reference_id RHSA-2022:1213
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1213
fixed_packages
aliases CVE-2020-8647
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eft3-zkps-6fgc
26
url VCID-f53f-geq7-efdh
vulnerability_id VCID-f53f-geq7-efdh
summary kernel: sync of excessive duration via an XFS v5 image with crafted metadata
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12655.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12655.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12655
reference_id
reference_type
scores
0
value 0.00079
scoring_system epss
scoring_elements 0.23346
published_at 2026-04-01T12:55:00Z
1
value 0.00079
scoring_system epss
scoring_elements 0.23519
published_at 2026-04-02T12:55:00Z
2
value 0.00079
scoring_system epss
scoring_elements 0.23557
published_at 2026-04-04T12:55:00Z
3
value 0.00079
scoring_system epss
scoring_elements 0.2334
published_at 2026-04-07T12:55:00Z
4
value 0.00079
scoring_system epss
scoring_elements 0.23413
published_at 2026-04-08T12:55:00Z
5
value 0.00079
scoring_system epss
scoring_elements 0.23463
published_at 2026-04-09T12:55:00Z
6
value 0.00079
scoring_system epss
scoring_elements 0.23482
published_at 2026-04-11T12:55:00Z
7
value 0.00079
scoring_system epss
scoring_elements 0.23444
published_at 2026-04-12T12:55:00Z
8
value 0.00079
scoring_system epss
scoring_elements 0.23388
published_at 2026-04-13T12:55:00Z
9
value 0.00079
scoring_system epss
scoring_elements 0.23406
published_at 2026-04-16T12:55:00Z
10
value 0.00079
scoring_system epss
scoring_elements 0.23401
published_at 2026-04-18T12:55:00Z
11
value 0.00079
scoring_system epss
scoring_elements 0.23383
published_at 2026-04-21T12:55:00Z
12
value 0.00079
scoring_system epss
scoring_elements 0.23193
published_at 2026-04-24T12:55:00Z
13
value 0.00079
scoring_system epss
scoring_elements 0.23181
published_at 2026-04-26T12:55:00Z
14
value 0.00079
scoring_system epss
scoring_elements 0.23174
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12655
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12655
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1832543
reference_id 1832543
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1832543
5
reference_url https://access.redhat.com/errata/RHSA-2020:3545
reference_id RHSA-2020:3545
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3545
6
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
7
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
8
reference_url https://usn.ubuntu.com/4465-1/
reference_id USN-4465-1
reference_type
scores
url https://usn.ubuntu.com/4465-1/
9
reference_url https://usn.ubuntu.com/4483-1/
reference_id USN-4483-1
reference_type
scores
url https://usn.ubuntu.com/4483-1/
10
reference_url https://usn.ubuntu.com/4485-1/
reference_id USN-4485-1
reference_type
scores
url https://usn.ubuntu.com/4485-1/
11
reference_url https://usn.ubuntu.com/5343-1/
reference_id USN-5343-1
reference_type
scores
url https://usn.ubuntu.com/5343-1/
fixed_packages
aliases CVE-2020-12655
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f53f-geq7-efdh
27
url VCID-ftb8-bd9g-puap
vulnerability_id VCID-ftb8-bd9g-puap
summary kernel: kernel stack information leak on s390/s390x
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10773.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10773.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-10773
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03561
published_at 2026-04-01T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03605
published_at 2026-04-02T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03621
published_at 2026-04-04T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03629
published_at 2026-04-07T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03631
published_at 2026-04-08T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03653
published_at 2026-04-09T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.0361
published_at 2026-04-11T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03581
published_at 2026-04-12T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03557
published_at 2026-04-13T12:55:00Z
9
value 0.00016
scoring_system epss
scoring_elements 0.03531
published_at 2026-04-16T12:55:00Z
10
value 0.00016
scoring_system epss
scoring_elements 0.03544
published_at 2026-04-18T12:55:00Z
11
value 0.00016
scoring_system epss
scoring_elements 0.0367
published_at 2026-04-21T12:55:00Z
12
value 0.00016
scoring_system epss
scoring_elements 0.03676
published_at 2026-04-24T12:55:00Z
13
value 0.00016
scoring_system epss
scoring_elements 0.0368
published_at 2026-04-26T12:55:00Z
14
value 0.00016
scoring_system epss
scoring_elements 0.03726
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-10773
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10773
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1846380
reference_id 1846380
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1846380
5
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
fixed_packages
aliases CVE-2020-10773
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ftb8-bd9g-puap
28
url VCID-g4pp-jsvd-37ec
vulnerability_id VCID-g4pp-jsvd-37ec
summary kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows to cause DoS
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19056.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19056.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19056
reference_id
reference_type
scores
0
value 0.00087
scoring_system epss
scoring_elements 0.2502
published_at 2026-04-01T12:55:00Z
1
value 0.00087
scoring_system epss
scoring_elements 0.24808
published_at 2026-04-29T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.24922
published_at 2026-04-21T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.24865
published_at 2026-04-24T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.24852
published_at 2026-04-26T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.25097
published_at 2026-04-02T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.25135
published_at 2026-04-04T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.2491
published_at 2026-04-07T12:55:00Z
8
value 0.00087
scoring_system epss
scoring_elements 0.24978
published_at 2026-04-08T12:55:00Z
9
value 0.00087
scoring_system epss
scoring_elements 0.25023
published_at 2026-04-09T12:55:00Z
10
value 0.00087
scoring_system epss
scoring_elements 0.25037
published_at 2026-04-11T12:55:00Z
11
value 0.00087
scoring_system epss
scoring_elements 0.24997
published_at 2026-04-12T12:55:00Z
12
value 0.00087
scoring_system epss
scoring_elements 0.24943
published_at 2026-04-13T12:55:00Z
13
value 0.00087
scoring_system epss
scoring_elements 0.24956
published_at 2026-04-16T12:55:00Z
14
value 0.00087
scoring_system epss
scoring_elements 0.24948
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19056
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19056
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19056
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/torvalds/linux/commit/db8fd2cde93227e566a412cf53173ffa227998bc
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/db8fd2cde93227e566a412cf53173ffa227998bc
6
reference_url https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
7
reference_url https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
10
reference_url https://security.netapp.com/advisory/ntap-20191205-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20191205-0001/
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1775097
reference_id 1775097
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1775097
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-19056
reference_id CVE-2019-19056
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
1
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-19056
22
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
23
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
24
reference_url https://usn.ubuntu.com/4286-1/
reference_id USN-4286-1
reference_type
scores
url https://usn.ubuntu.com/4286-1/
25
reference_url https://usn.ubuntu.com/4286-2/
reference_id USN-4286-2
reference_type
scores
url https://usn.ubuntu.com/4286-2/
26
reference_url https://usn.ubuntu.com/4300-1/
reference_id USN-4300-1
reference_type
scores
url https://usn.ubuntu.com/4300-1/
27
reference_url https://usn.ubuntu.com/4301-1/
reference_id USN-4301-1
reference_type
scores
url https://usn.ubuntu.com/4301-1/
28
reference_url https://usn.ubuntu.com/4302-1/
reference_id USN-4302-1
reference_type
scores
url https://usn.ubuntu.com/4302-1/
fixed_packages
aliases CVE-2019-19056
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g4pp-jsvd-37ec
29
url VCID-g5s1-w67n-ykf1
vulnerability_id VCID-g5s1-w67n-ykf1
summary kernel: af_packet: TPACKET_V3: invalid timer timeout on error
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20812.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20812.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-20812
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16307
published_at 2026-04-29T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16404
published_at 2026-04-16T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16424
published_at 2026-04-18T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16461
published_at 2026-04-21T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16353
published_at 2026-04-24T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.16351
published_at 2026-04-26T12:55:00Z
6
value 0.00069
scoring_system epss
scoring_elements 0.21234
published_at 2026-04-09T12:55:00Z
7
value 0.00069
scoring_system epss
scoring_elements 0.21245
published_at 2026-04-11T12:55:00Z
8
value 0.00069
scoring_system epss
scoring_elements 0.21203
published_at 2026-04-12T12:55:00Z
9
value 0.00069
scoring_system epss
scoring_elements 0.21094
published_at 2026-04-07T12:55:00Z
10
value 0.00069
scoring_system epss
scoring_elements 0.21174
published_at 2026-04-08T12:55:00Z
11
value 0.00069
scoring_system epss
scoring_elements 0.21136
published_at 2026-04-01T12:55:00Z
12
value 0.00069
scoring_system epss
scoring_elements 0.21289
published_at 2026-04-02T12:55:00Z
13
value 0.00069
scoring_system epss
scoring_elements 0.21342
published_at 2026-04-04T12:55:00Z
14
value 0.00083
scoring_system epss
scoring_elements 0.24238
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-20812
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20812
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1846462
reference_id 1846462
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1846462
5
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
fixed_packages
aliases CVE-2019-20812
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g5s1-w67n-ykf1
30
url VCID-gvg5-z18c-n7av
vulnerability_id VCID-gvg5-z18c-n7av
summary kernel: use-after-free in debugfs_remove in fs/debugfs/inode.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19770.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19770.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19770
reference_id
reference_type
scores
0
value 0.01123
scoring_system epss
scoring_elements 0.78207
published_at 2026-04-01T12:55:00Z
1
value 0.01123
scoring_system epss
scoring_elements 0.78215
published_at 2026-04-02T12:55:00Z
2
value 0.01123
scoring_system epss
scoring_elements 0.78245
published_at 2026-04-04T12:55:00Z
3
value 0.01123
scoring_system epss
scoring_elements 0.78227
published_at 2026-04-07T12:55:00Z
4
value 0.01123
scoring_system epss
scoring_elements 0.78254
published_at 2026-04-08T12:55:00Z
5
value 0.01123
scoring_system epss
scoring_elements 0.7826
published_at 2026-04-09T12:55:00Z
6
value 0.01123
scoring_system epss
scoring_elements 0.78285
published_at 2026-04-11T12:55:00Z
7
value 0.01123
scoring_system epss
scoring_elements 0.78267
published_at 2026-04-12T12:55:00Z
8
value 0.01123
scoring_system epss
scoring_elements 0.78263
published_at 2026-04-13T12:55:00Z
9
value 0.01123
scoring_system epss
scoring_elements 0.78294
published_at 2026-04-16T12:55:00Z
10
value 0.01123
scoring_system epss
scoring_elements 0.78291
published_at 2026-04-18T12:55:00Z
11
value 0.01123
scoring_system epss
scoring_elements 0.78287
published_at 2026-04-21T12:55:00Z
12
value 0.01123
scoring_system epss
scoring_elements 0.7832
published_at 2026-04-24T12:55:00Z
13
value 0.01123
scoring_system epss
scoring_elements 0.78326
published_at 2026-04-26T12:55:00Z
14
value 0.01123
scoring_system epss
scoring_elements 0.78342
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19770
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19770
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19770
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1786179
reference_id 1786179
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1786179
5
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
6
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
7
reference_url https://usn.ubuntu.com/4680-1/
reference_id USN-4680-1
reference_type
scores
url https://usn.ubuntu.com/4680-1/
fixed_packages
aliases CVE-2019-19770
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gvg5-z18c-n7av
31
url VCID-hf8f-stgb-gqa4
vulnerability_id VCID-hf8f-stgb-gqa4
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11565.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11565.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-11565
reference_id
reference_type
scores
0
value 0.00083
scoring_system epss
scoring_elements 0.24279
published_at 2026-04-01T12:55:00Z
1
value 0.00083
scoring_system epss
scoring_elements 0.24051
published_at 2026-04-29T12:55:00Z
2
value 0.00083
scoring_system epss
scoring_elements 0.24405
published_at 2026-04-02T12:55:00Z
3
value 0.00083
scoring_system epss
scoring_elements 0.24438
published_at 2026-04-04T12:55:00Z
4
value 0.00083
scoring_system epss
scoring_elements 0.2422
published_at 2026-04-07T12:55:00Z
5
value 0.00083
scoring_system epss
scoring_elements 0.24287
published_at 2026-04-08T12:55:00Z
6
value 0.00083
scoring_system epss
scoring_elements 0.2433
published_at 2026-04-09T12:55:00Z
7
value 0.00083
scoring_system epss
scoring_elements 0.24348
published_at 2026-04-11T12:55:00Z
8
value 0.00083
scoring_system epss
scoring_elements 0.24305
published_at 2026-04-12T12:55:00Z
9
value 0.00083
scoring_system epss
scoring_elements 0.24248
published_at 2026-04-13T12:55:00Z
10
value 0.00083
scoring_system epss
scoring_elements 0.24264
published_at 2026-04-16T12:55:00Z
11
value 0.00083
scoring_system epss
scoring_elements 0.24252
published_at 2026-04-18T12:55:00Z
12
value 0.00083
scoring_system epss
scoring_elements 0.24229
published_at 2026-04-21T12:55:00Z
13
value 0.00083
scoring_system epss
scoring_elements 0.24105
published_at 2026-04-24T12:55:00Z
14
value 0.00083
scoring_system epss
scoring_elements 0.24093
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-11565
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11884
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
34
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
35
reference_url https://github.com/torvalds/linux/commit/aa9f7d5172fac9bf1f09e678c35e287a40a7b7dd
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:42:27Z/
url https://github.com/torvalds/linux/commit/aa9f7d5172fac9bf1f09e678c35e287a40a7b7dd
36
reference_url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=aa9f7d5172fac9bf1f09e678c35e287a40a7b7dd
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:42:27Z/
url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=aa9f7d5172fac9bf1f09e678c35e287a40a7b7dd
37
reference_url https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:42:27Z/
url https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
38
reference_url https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:42:27Z/
url https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
39
reference_url https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:42:27Z/
url https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
40
reference_url https://www.debian.org/security/2020/dsa-4667
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:42:27Z/
url https://www.debian.org/security/2020/dsa-4667
41
reference_url https://www.debian.org/security/2020/dsa-4698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:42:27Z/
url https://www.debian.org/security/2020/dsa-4698
42
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1824918
reference_id 1824918
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1824918
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-11565
reference_id CVE-2020-11565
reference_type
scores
0
value 3.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:P/A:P
1
value 6.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-11565
49
reference_url https://access.redhat.com/errata/RHSA-2020:2854
reference_id RHSA-2020:2854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2854
50
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
51
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
52
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
53
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
54
reference_url https://usn.ubuntu.com/4363-1/
reference_id USN-4363-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:42:27Z/
url https://usn.ubuntu.com/4363-1/
55
reference_url https://usn.ubuntu.com/4364-1/
reference_id USN-4364-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:42:27Z/
url https://usn.ubuntu.com/4364-1/
56
reference_url https://usn.ubuntu.com/4367-1/
reference_id USN-4367-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:42:27Z/
url https://usn.ubuntu.com/4367-1/
57
reference_url https://usn.ubuntu.com/4368-1/
reference_id USN-4368-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:42:27Z/
url https://usn.ubuntu.com/4368-1/
58
reference_url https://usn.ubuntu.com/4369-1/
reference_id USN-4369-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:42:27Z/
url https://usn.ubuntu.com/4369-1/
fixed_packages
aliases CVE-2020-11565
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hf8f-stgb-gqa4
32
url VCID-jb9s-56tm-wba7
vulnerability_id VCID-jb9s-56tm-wba7
summary kernel: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allows for a DoS
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19068.json
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19068.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19068
reference_id
reference_type
scores
0
value 0.00092
scoring_system epss
scoring_elements 0.25951
published_at 2026-04-01T12:55:00Z
1
value 0.00092
scoring_system epss
scoring_elements 0.25706
published_at 2026-04-29T12:55:00Z
2
value 0.00092
scoring_system epss
scoring_elements 0.25824
published_at 2026-04-21T12:55:00Z
3
value 0.00092
scoring_system epss
scoring_elements 0.25761
published_at 2026-04-24T12:55:00Z
4
value 0.00092
scoring_system epss
scoring_elements 0.25753
published_at 2026-04-26T12:55:00Z
5
value 0.00092
scoring_system epss
scoring_elements 0.26034
published_at 2026-04-02T12:55:00Z
6
value 0.00092
scoring_system epss
scoring_elements 0.26076
published_at 2026-04-04T12:55:00Z
7
value 0.00092
scoring_system epss
scoring_elements 0.25842
published_at 2026-04-07T12:55:00Z
8
value 0.00092
scoring_system epss
scoring_elements 0.25911
published_at 2026-04-08T12:55:00Z
9
value 0.00092
scoring_system epss
scoring_elements 0.25963
published_at 2026-04-09T12:55:00Z
10
value 0.00092
scoring_system epss
scoring_elements 0.25973
published_at 2026-04-11T12:55:00Z
11
value 0.00092
scoring_system epss
scoring_elements 0.25929
published_at 2026-04-12T12:55:00Z
12
value 0.00092
scoring_system epss
scoring_elements 0.25869
published_at 2026-04-13T12:55:00Z
13
value 0.00092
scoring_system epss
scoring_elements 0.25873
published_at 2026-04-16T12:55:00Z
14
value 0.00092
scoring_system epss
scoring_elements 0.25854
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19068
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19068
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/torvalds/linux/commit/a2cdd07488e666aa93a49a3fc9c9b1299e27ef3c
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/a2cdd07488e666aa93a49a3fc9c9b1299e27ef3c
6
reference_url https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
9
reference_url https://security.netapp.com/advisory/ntap-20191205-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20191205-0001/
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1774963
reference_id 1774963
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1774963
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-19068
reference_id CVE-2019-19068
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-19068
23
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
24
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
25
reference_url https://usn.ubuntu.com/4286-1/
reference_id USN-4286-1
reference_type
scores
url https://usn.ubuntu.com/4286-1/
26
reference_url https://usn.ubuntu.com/4286-2/
reference_id USN-4286-2
reference_type
scores
url https://usn.ubuntu.com/4286-2/
27
reference_url https://usn.ubuntu.com/4300-1/
reference_id USN-4300-1
reference_type
scores
url https://usn.ubuntu.com/4300-1/
28
reference_url https://usn.ubuntu.com/4301-1/
reference_id USN-4301-1
reference_type
scores
url https://usn.ubuntu.com/4301-1/
29
reference_url https://usn.ubuntu.com/4302-1/
reference_id USN-4302-1
reference_type
scores
url https://usn.ubuntu.com/4302-1/
fixed_packages
aliases CVE-2019-19068
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jb9s-56tm-wba7
33
url VCID-myrw-23j7-vbgu
vulnerability_id VCID-myrw-23j7-vbgu
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11668.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11668.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-11668
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.14449
published_at 2026-04-01T12:55:00Z
1
value 0.00047
scoring_system epss
scoring_elements 0.14293
published_at 2026-04-29T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.14345
published_at 2026-04-21T12:55:00Z
3
value 0.00047
scoring_system epss
scoring_elements 0.14375
published_at 2026-04-24T12:55:00Z
4
value 0.00047
scoring_system epss
scoring_elements 0.14349
published_at 2026-04-26T12:55:00Z
5
value 0.00047
scoring_system epss
scoring_elements 0.14511
published_at 2026-04-02T12:55:00Z
6
value 0.00047
scoring_system epss
scoring_elements 0.14582
published_at 2026-04-04T12:55:00Z
7
value 0.00047
scoring_system epss
scoring_elements 0.14389
published_at 2026-04-07T12:55:00Z
8
value 0.00047
scoring_system epss
scoring_elements 0.14474
published_at 2026-04-08T12:55:00Z
9
value 0.00047
scoring_system epss
scoring_elements 0.14528
published_at 2026-04-09T12:55:00Z
10
value 0.00047
scoring_system epss
scoring_elements 0.14477
published_at 2026-04-11T12:55:00Z
11
value 0.00047
scoring_system epss
scoring_elements 0.1444
published_at 2026-04-12T12:55:00Z
12
value 0.00047
scoring_system epss
scoring_elements 0.14382
published_at 2026-04-13T12:55:00Z
13
value 0.00047
scoring_system epss
scoring_elements 0.14274
published_at 2026-04-16T12:55:00Z
14
value 0.00047
scoring_system epss
scoring_elements 0.14275
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-11668
2
reference_url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.1
reference_id
reference_type
scores
url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.1
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
34
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
35
reference_url https://github.com/torvalds/linux/commit/a246b4d547708f33ff4d4b9a7a5dbac741dc89d8
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/a246b4d547708f33ff4d4b9a7a5dbac741dc89d8
36
reference_url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a246b4d547708f33ff4d4b9a7a5dbac741dc89d8
reference_id
reference_type
scores
url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a246b4d547708f33ff4d4b9a7a5dbac741dc89d8
37
reference_url https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
38
reference_url https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
39
reference_url https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
40
reference_url https://security.netapp.com/advisory/ntap-20200430-0004/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20200430-0004/
41
reference_url https://www.debian.org/security/2020/dsa-4698
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4698
42
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1824792
reference_id 1824792
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1824792
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-11668
reference_id CVE-2020-11668
reference_type
scores
0
value 5.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:P/A:C
1
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-11668
45
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
46
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
47
reference_url https://access.redhat.com/errata/RHSA-2021:2725
reference_id RHSA-2021:2725
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2725
48
reference_url https://access.redhat.com/errata/RHSA-2021:2726
reference_id RHSA-2021:2726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2726
49
reference_url https://usn.ubuntu.com/4345-1/
reference_id USN-4345-1
reference_type
scores
url https://usn.ubuntu.com/4345-1/
50
reference_url https://usn.ubuntu.com/4364-1/
reference_id USN-4364-1
reference_type
scores
url https://usn.ubuntu.com/4364-1/
51
reference_url https://usn.ubuntu.com/4368-1/
reference_id USN-4368-1
reference_type
scores
url https://usn.ubuntu.com/4368-1/
52
reference_url https://usn.ubuntu.com/4369-1/
reference_id USN-4369-1
reference_type
scores
url https://usn.ubuntu.com/4369-1/
fixed_packages
aliases CVE-2020-11668
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-myrw-23j7-vbgu
34
url VCID-nsku-b4nu-53cm
vulnerability_id VCID-nsku-b4nu-53cm
summary kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9455.json
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9455.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9455
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06056
published_at 2026-04-01T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06338
published_at 2026-04-29T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06284
published_at 2026-04-21T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06301
published_at 2026-04-24T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06327
published_at 2026-04-26T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06089
published_at 2026-04-02T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06119
published_at 2026-04-16T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06102
published_at 2026-04-07T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.06144
published_at 2026-04-08T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06181
published_at 2026-04-09T12:55:00Z
10
value 0.00023
scoring_system epss
scoring_elements 0.06172
published_at 2026-04-11T12:55:00Z
11
value 0.00023
scoring_system epss
scoring_elements 0.06168
published_at 2026-04-12T12:55:00Z
12
value 0.00023
scoring_system epss
scoring_elements 0.0616
published_at 2026-04-13T12:55:00Z
13
value 0.00023
scoring_system epss
scoring_elements 0.06131
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9455
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9455
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://source.android.com/security/bulletin/pixel/2019-09-01
reference_id
reference_type
scores
url https://source.android.com/security/bulletin/pixel/2019-09-01
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1819399
reference_id 1819399
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1819399
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-9455
reference_id CVE-2019-9455
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 2.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-9455
10
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
11
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
fixed_packages
aliases CVE-2019-9455
risk_score 1.1
exploitability 0.5
weighted_severity 2.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nsku-b4nu-53cm
35
url VCID-qgcy-w3xt-3qad
vulnerability_id VCID-qgcy-w3xt-3qad
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8649.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8649.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-8649
reference_id
reference_type
scores
0
value 0.00087
scoring_system epss
scoring_elements 0.25097
published_at 2026-04-01T12:55:00Z
1
value 0.00087
scoring_system epss
scoring_elements 0.25178
published_at 2026-04-02T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.25219
published_at 2026-04-04T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.24989
published_at 2026-04-07T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.25057
published_at 2026-04-08T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.25102
published_at 2026-04-09T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.25117
published_at 2026-04-11T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.25076
published_at 2026-04-12T12:55:00Z
8
value 0.00087
scoring_system epss
scoring_elements 0.25021
published_at 2026-04-13T12:55:00Z
9
value 0.00087
scoring_system epss
scoring_elements 0.25031
published_at 2026-04-16T12:55:00Z
10
value 0.00087
scoring_system epss
scoring_elements 0.25023
published_at 2026-04-18T12:55:00Z
11
value 0.00087
scoring_system epss
scoring_elements 0.24993
published_at 2026-04-21T12:55:00Z
12
value 0.00087
scoring_system epss
scoring_elements 0.2493
published_at 2026-04-24T12:55:00Z
13
value 0.00087
scoring_system epss
scoring_elements 0.24919
published_at 2026-04-26T12:55:00Z
14
value 0.00087
scoring_system epss
scoring_elements 0.24873
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-8649
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
33
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1802555
reference_id 1802555
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1802555
35
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
36
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
37
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
38
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
39
reference_url https://access.redhat.com/errata/RHSA-2022:1209
reference_id RHSA-2022:1209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1209
40
reference_url https://access.redhat.com/errata/RHSA-2022:1213
reference_id RHSA-2022:1213
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1213
fixed_packages
aliases CVE-2020-8649
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qgcy-w3xt-3qad
36
url VCID-rnwz-k5v3-1ugd
vulnerability_id VCID-rnwz-k5v3-1ugd
summary kernel: use after free due to race condition in the video driver leads to local privilege escalation
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9458.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9458.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9458
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04347
published_at 2026-04-01T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04641
published_at 2026-04-29T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04545
published_at 2026-04-21T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04576
published_at 2026-04-24T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04596
published_at 2026-04-26T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04385
published_at 2026-04-02T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.0441
published_at 2026-04-18T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.0442
published_at 2026-04-07T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04455
published_at 2026-04-08T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.04473
published_at 2026-04-09T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04465
published_at 2026-04-11T12:55:00Z
11
value 0.00018
scoring_system epss
scoring_elements 0.0445
published_at 2026-04-12T12:55:00Z
12
value 0.00018
scoring_system epss
scoring_elements 0.04433
published_at 2026-04-13T12:55:00Z
13
value 0.00018
scoring_system epss
scoring_elements 0.04402
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9458
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9458
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9458
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://source.android.com/security/bulletin/pixel/2019-09-01
reference_id
reference_type
scores
url https://source.android.com/security/bulletin/pixel/2019-09-01
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1819377
reference_id 1819377
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1819377
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-9458
reference_id CVE-2019-9458
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
1
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-9458
10
reference_url https://access.redhat.com/errata/RHSA-2020:2854
reference_id RHSA-2020:2854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2854
11
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
12
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
13
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
14
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
fixed_packages
aliases CVE-2019-9458
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rnwz-k5v3-1ugd
37
url VCID-rpmj-nmbd-b7gc
vulnerability_id VCID-rpmj-nmbd-b7gc
summary kernel: use-after-free in drivers/bluetooth/hci_ldisc.c
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
2
reference_url http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15917.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15917.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-15917
reference_id
reference_type
scores
0
value 0.00087
scoring_system epss
scoring_elements 0.25005
published_at 2026-04-01T12:55:00Z
1
value 0.00087
scoring_system epss
scoring_elements 0.24793
published_at 2026-04-29T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.24907
published_at 2026-04-21T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.2485
published_at 2026-04-24T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.24838
published_at 2026-04-26T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.25083
published_at 2026-04-02T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.25121
published_at 2026-04-04T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.24896
published_at 2026-04-07T12:55:00Z
8
value 0.00087
scoring_system epss
scoring_elements 0.24964
published_at 2026-04-08T12:55:00Z
9
value 0.00087
scoring_system epss
scoring_elements 0.25009
published_at 2026-04-09T12:55:00Z
10
value 0.00087
scoring_system epss
scoring_elements 0.25023
published_at 2026-04-11T12:55:00Z
11
value 0.00087
scoring_system epss
scoring_elements 0.24983
published_at 2026-04-12T12:55:00Z
12
value 0.00087
scoring_system epss
scoring_elements 0.24929
published_at 2026-04-13T12:55:00Z
13
value 0.00087
scoring_system epss
scoring_elements 0.24942
published_at 2026-04-16T12:55:00Z
14
value 0.00087
scoring_system epss
scoring_elements 0.24934
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-15917
5
reference_url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.5
reference_id
reference_type
scores
url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.5
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15917
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15917
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://github.com/torvalds/linux/commit/56897b217a1d0a91c9920cb418d6b3fe922f590a
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/56897b217a1d0a91c9920cb418d6b3fe922f590a
9
reference_url https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
10
reference_url https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
11
reference_url https://seclists.org/bugtraq/2020/Jan/10
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2020/Jan/10
12
reference_url https://security.netapp.com/advisory/ntap-20191004-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20191004-0001/
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1760100
reference_id 1760100
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1760100
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-15917
reference_id CVE-2019-15917
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
1
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-15917
19
reference_url https://access.redhat.com/errata/RHSA-2020:2854
reference_id RHSA-2020:2854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2854
20
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
21
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
22
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
23
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
24
reference_url https://access.redhat.com/errata/RHSA-2021:0019
reference_id RHSA-2021:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0019
fixed_packages
aliases CVE-2019-15917
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rpmj-nmbd-b7gc
38
url VCID-rsce-drrq-23ey
vulnerability_id VCID-rsce-drrq-23ey
summary kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
1
reference_url http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19062.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19062.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19062
reference_id
reference_type
scores
0
value 0.00098
scoring_system epss
scoring_elements 0.27018
published_at 2026-04-01T12:55:00Z
1
value 0.00098
scoring_system epss
scoring_elements 0.26725
published_at 2026-04-29T12:55:00Z
2
value 0.00098
scoring_system epss
scoring_elements 0.26849
published_at 2026-04-21T12:55:00Z
3
value 0.00098
scoring_system epss
scoring_elements 0.26799
published_at 2026-04-24T12:55:00Z
4
value 0.00098
scoring_system epss
scoring_elements 0.26792
published_at 2026-04-26T12:55:00Z
5
value 0.00098
scoring_system epss
scoring_elements 0.27058
published_at 2026-04-02T12:55:00Z
6
value 0.00098
scoring_system epss
scoring_elements 0.27094
published_at 2026-04-04T12:55:00Z
7
value 0.00098
scoring_system epss
scoring_elements 0.26882
published_at 2026-04-07T12:55:00Z
8
value 0.00098
scoring_system epss
scoring_elements 0.26951
published_at 2026-04-08T12:55:00Z
9
value 0.00098
scoring_system epss
scoring_elements 0.26996
published_at 2026-04-09T12:55:00Z
10
value 0.00098
scoring_system epss
scoring_elements 0.27
published_at 2026-04-11T12:55:00Z
11
value 0.00098
scoring_system epss
scoring_elements 0.26955
published_at 2026-04-12T12:55:00Z
12
value 0.00098
scoring_system epss
scoring_elements 0.26899
published_at 2026-04-13T12:55:00Z
13
value 0.00098
scoring_system epss
scoring_elements 0.26909
published_at 2026-04-16T12:55:00Z
14
value 0.00098
scoring_system epss
scoring_elements 0.26885
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19062
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19062
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19062
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/torvalds/linux/commit/ffdde5932042600c6807d46c1550b28b0db6a3bc
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/ffdde5932042600c6807d46c1550b28b0db6a3bc
7
reference_url https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
8
reference_url https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
11
reference_url https://seclists.org/bugtraq/2020/Jan/10
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2020/Jan/10
12
reference_url https://security.netapp.com/advisory/ntap-20191205-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20191205-0001/
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1775021
reference_id 1775021
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1775021
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-19062
reference_id CVE-2019-19062
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
1
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-19062
26
reference_url https://access.redhat.com/errata/RHSA-2020:2854
reference_id RHSA-2020:2854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2854
27
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
28
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
29
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
30
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
31
reference_url https://usn.ubuntu.com/4254-1/
reference_id USN-4254-1
reference_type
scores
url https://usn.ubuntu.com/4254-1/
32
reference_url https://usn.ubuntu.com/4254-2/
reference_id USN-4254-2
reference_type
scores
url https://usn.ubuntu.com/4254-2/
33
reference_url https://usn.ubuntu.com/4258-1/
reference_id USN-4258-1
reference_type
scores
url https://usn.ubuntu.com/4258-1/
34
reference_url https://usn.ubuntu.com/4284-1/
reference_id USN-4284-1
reference_type
scores
url https://usn.ubuntu.com/4284-1/
35
reference_url https://usn.ubuntu.com/4287-1/
reference_id USN-4287-1
reference_type
scores
url https://usn.ubuntu.com/4287-1/
36
reference_url https://usn.ubuntu.com/4287-2/
reference_id USN-4287-2
reference_type
scores
url https://usn.ubuntu.com/4287-2/
fixed_packages
aliases CVE-2019-19062
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rsce-drrq-23ey
39
url VCID-ruwt-trx9-9fdr
vulnerability_id VCID-ruwt-trx9-9fdr
summary kernel: bad kfree in auditfilter.c may lead to escalation of privilege
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-0444.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-0444.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-0444
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03672
published_at 2026-04-01T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03721
published_at 2026-04-02T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03733
published_at 2026-04-04T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03747
published_at 2026-04-07T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.0375
published_at 2026-04-08T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03775
published_at 2026-04-09T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03734
published_at 2026-04-11T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03712
published_at 2026-04-12T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03685
published_at 2026-04-13T12:55:00Z
9
value 0.00016
scoring_system epss
scoring_elements 0.03662
published_at 2026-04-16T12:55:00Z
10
value 0.00016
scoring_system epss
scoring_elements 0.03673
published_at 2026-04-18T12:55:00Z
11
value 0.00016
scoring_system epss
scoring_elements 0.03795
published_at 2026-04-21T12:55:00Z
12
value 0.00016
scoring_system epss
scoring_elements 0.038
published_at 2026-04-24T12:55:00Z
13
value 0.00016
scoring_system epss
scoring_elements 0.03803
published_at 2026-04-26T12:55:00Z
14
value 0.00016
scoring_system epss
scoring_elements 0.03853
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-0444
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0444
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0444
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1920474
reference_id 1920474
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1920474
5
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
6
reference_url https://access.redhat.com/errata/RHSA-2021:0686
reference_id RHSA-2021:0686
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0686
7
reference_url https://access.redhat.com/errata/RHSA-2021:0689
reference_id RHSA-2021:0689
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0689
8
reference_url https://access.redhat.com/errata/RHSA-2021:0763
reference_id RHSA-2021:0763
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0763
9
reference_url https://access.redhat.com/errata/RHSA-2021:0765
reference_id RHSA-2021:0765
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0765
10
reference_url https://access.redhat.com/errata/RHSA-2021:0774
reference_id RHSA-2021:0774
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0774
fixed_packages
aliases CVE-2020-0444
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ruwt-trx9-9fdr
40
url VCID-rzef-1h83-kfdk
vulnerability_id VCID-rzef-1h83-kfdk
summary kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10774.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10774.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-10774
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11375
published_at 2026-04-01T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11509
published_at 2026-04-02T12:55:00Z
2
value 0.00038
scoring_system epss
scoring_elements 0.11562
published_at 2026-04-04T12:55:00Z
3
value 0.00038
scoring_system epss
scoring_elements 0.1135
published_at 2026-04-07T12:55:00Z
4
value 0.00038
scoring_system epss
scoring_elements 0.11434
published_at 2026-04-08T12:55:00Z
5
value 0.00038
scoring_system epss
scoring_elements 0.11492
published_at 2026-04-09T12:55:00Z
6
value 0.00038
scoring_system epss
scoring_elements 0.11497
published_at 2026-04-11T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.11464
published_at 2026-04-12T12:55:00Z
8
value 0.00038
scoring_system epss
scoring_elements 0.11435
published_at 2026-04-13T12:55:00Z
9
value 0.00038
scoring_system epss
scoring_elements 0.113
published_at 2026-04-18T12:55:00Z
10
value 0.00038
scoring_system epss
scoring_elements 0.11423
published_at 2026-04-21T12:55:00Z
11
value 0.00038
scoring_system epss
scoring_elements 0.11367
published_at 2026-04-24T12:55:00Z
12
value 0.00038
scoring_system epss
scoring_elements 0.11323
published_at 2026-04-26T12:55:00Z
13
value 0.00038
scoring_system epss
scoring_elements 0.11254
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-10774
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1846964
reference_id 1846964
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1846964
3
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
4
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
fixed_packages
aliases CVE-2020-10774
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rzef-1h83-kfdk
41
url VCID-s9gv-a5at-c3h9
vulnerability_id VCID-s9gv-a5at-c3h9
summary kernel: bpf: Fix KASAN use-after-free Read in compute_effective_progs
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50219.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50219.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50219
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06356
published_at 2026-04-02T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06401
published_at 2026-04-04T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.0639
published_at 2026-04-07T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06437
published_at 2026-04-08T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06481
published_at 2026-04-09T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06475
published_at 2026-04-11T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06469
published_at 2026-04-12T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06458
published_at 2026-04-13T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.19683
published_at 2026-04-29T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.19812
published_at 2026-04-16T12:55:00Z
10
value 0.00064
scoring_system epss
scoring_elements 0.19816
published_at 2026-04-18T12:55:00Z
11
value 0.00064
scoring_system epss
scoring_elements 0.19827
published_at 2026-04-21T12:55:00Z
12
value 0.00064
scoring_system epss
scoring_elements 0.19723
published_at 2026-04-24T12:55:00Z
13
value 0.00064
scoring_system epss
scoring_elements 0.19716
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50219
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50219
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373517
reference_id 2373517
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373517
5
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
6
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
fixed_packages
aliases CVE-2022-50219
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s9gv-a5at-c3h9
42
url VCID-spwm-2e97-7ke1
vulnerability_id VCID-spwm-2e97-7ke1
summary kernel: use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19543.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19543.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19543
reference_id
reference_type
scores
0
value 0.00102
scoring_system epss
scoring_elements 0.2806
published_at 2026-04-01T12:55:00Z
1
value 0.00102
scoring_system epss
scoring_elements 0.28132
published_at 2026-04-02T12:55:00Z
2
value 0.00102
scoring_system epss
scoring_elements 0.28175
published_at 2026-04-04T12:55:00Z
3
value 0.00102
scoring_system epss
scoring_elements 0.2797
published_at 2026-04-07T12:55:00Z
4
value 0.00102
scoring_system epss
scoring_elements 0.28038
published_at 2026-04-08T12:55:00Z
5
value 0.00102
scoring_system epss
scoring_elements 0.2808
published_at 2026-04-09T12:55:00Z
6
value 0.00102
scoring_system epss
scoring_elements 0.28087
published_at 2026-04-11T12:55:00Z
7
value 0.00102
scoring_system epss
scoring_elements 0.28044
published_at 2026-04-12T12:55:00Z
8
value 0.00102
scoring_system epss
scoring_elements 0.27987
published_at 2026-04-13T12:55:00Z
9
value 0.00102
scoring_system epss
scoring_elements 0.27995
published_at 2026-04-16T12:55:00Z
10
value 0.00102
scoring_system epss
scoring_elements 0.27978
published_at 2026-04-18T12:55:00Z
11
value 0.00102
scoring_system epss
scoring_elements 0.27928
published_at 2026-04-21T12:55:00Z
12
value 0.00102
scoring_system epss
scoring_elements 0.27844
published_at 2026-04-24T12:55:00Z
13
value 0.00102
scoring_system epss
scoring_elements 0.27733
published_at 2026-04-26T12:55:00Z
14
value 0.00102
scoring_system epss
scoring_elements 0.27659
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19543
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19543
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1781810
reference_id 1781810
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1781810
5
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
6
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
fixed_packages
aliases CVE-2019-19543
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-spwm-2e97-7ke1
43
url VCID-t9t7-3jgk-37b9
vulnerability_id VCID-t9t7-3jgk-37b9
summary kernel: race condition caused by a malicious USB device in the USB character device driver layer
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19537.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19537.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19537
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.20935
published_at 2026-04-01T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.21086
published_at 2026-04-02T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.21139
published_at 2026-04-04T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.20853
published_at 2026-04-07T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.20933
published_at 2026-04-08T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.20994
published_at 2026-04-09T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.2101
published_at 2026-04-11T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.20965
published_at 2026-04-12T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.20912
published_at 2026-04-13T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.20904
published_at 2026-04-16T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.20906
published_at 2026-04-18T12:55:00Z
11
value 0.00068
scoring_system epss
scoring_elements 0.20887
published_at 2026-04-21T12:55:00Z
12
value 0.00068
scoring_system epss
scoring_elements 0.20758
published_at 2026-04-24T12:55:00Z
13
value 0.00068
scoring_system epss
scoring_elements 0.20753
published_at 2026-04-26T12:55:00Z
14
value 0.00068
scoring_system epss
scoring_elements 0.2072
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19537
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19537
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19537
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1783561
reference_id 1783561
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1783561
5
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
6
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
7
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
8
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
fixed_packages
aliases CVE-2019-19537
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t9t7-3jgk-37b9
44
url VCID-tu42-yjfk-5kgp
vulnerability_id VCID-tu42-yjfk-5kgp
summary kernel: memory leak in ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-18808.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-18808.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-18808
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03658
published_at 2026-04-01T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03829
published_at 2026-04-29T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03776
published_at 2026-04-21T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03779
published_at 2026-04-24T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03781
published_at 2026-04-26T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03706
published_at 2026-04-02T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03717
published_at 2026-04-04T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03731
published_at 2026-04-07T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03734
published_at 2026-04-08T12:55:00Z
9
value 0.00016
scoring_system epss
scoring_elements 0.03757
published_at 2026-04-09T12:55:00Z
10
value 0.00016
scoring_system epss
scoring_elements 0.03716
published_at 2026-04-11T12:55:00Z
11
value 0.00016
scoring_system epss
scoring_elements 0.03693
published_at 2026-04-12T12:55:00Z
12
value 0.00016
scoring_system epss
scoring_elements 0.03667
published_at 2026-04-13T12:55:00Z
13
value 0.00016
scoring_system epss
scoring_elements 0.03644
published_at 2026-04-16T12:55:00Z
14
value 0.00016
scoring_system epss
scoring_elements 0.03654
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-18808
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18808
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/torvalds/linux/commit/128c66429247add5128c03dc1e144ca56f05a4e2
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/128c66429247add5128c03dc1e144ca56f05a4e2
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/
8
reference_url https://security.netapp.com/advisory/ntap-20191205-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20191205-0001/
9
reference_url http://www.openwall.com/lists/oss-security/2021/09/14/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2021/09/14/1
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1777418
reference_id 1777418
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1777418
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-18808
reference_id CVE-2019-18808
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-18808
20
reference_url https://access.redhat.com/errata/RHSA-2020:2854
reference_id RHSA-2020:2854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2854
21
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
22
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
23
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
24
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
25
reference_url https://usn.ubuntu.com/4525-1/
reference_id USN-4525-1
reference_type
scores
url https://usn.ubuntu.com/4525-1/
26
reference_url https://usn.ubuntu.com/4526-1/
reference_id USN-4526-1
reference_type
scores
url https://usn.ubuntu.com/4526-1/
fixed_packages
aliases CVE-2019-18808
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tu42-yjfk-5kgp
45
url VCID-unk7-gjpn-ykhu
vulnerability_id VCID-unk7-gjpn-ykhu
summary kernel: information leak bug caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19533.json
reference_id
reference_type
scores
0
value 2.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19533.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19533
reference_id
reference_type
scores
0
value 0.00054
scoring_system epss
scoring_elements 0.16987
published_at 2026-04-01T12:55:00Z
1
value 0.00054
scoring_system epss
scoring_elements 0.17158
published_at 2026-04-02T12:55:00Z
2
value 0.00054
scoring_system epss
scoring_elements 0.17211
published_at 2026-04-04T12:55:00Z
3
value 0.00054
scoring_system epss
scoring_elements 0.16992
published_at 2026-04-07T12:55:00Z
4
value 0.00054
scoring_system epss
scoring_elements 0.17082
published_at 2026-04-08T12:55:00Z
5
value 0.00054
scoring_system epss
scoring_elements 0.17139
published_at 2026-04-09T12:55:00Z
6
value 0.00054
scoring_system epss
scoring_elements 0.17114
published_at 2026-04-11T12:55:00Z
7
value 0.00054
scoring_system epss
scoring_elements 0.17067
published_at 2026-04-12T12:55:00Z
8
value 0.00054
scoring_system epss
scoring_elements 0.17005
published_at 2026-04-13T12:55:00Z
9
value 0.00054
scoring_system epss
scoring_elements 0.16941
published_at 2026-04-18T12:55:00Z
10
value 0.00054
scoring_system epss
scoring_elements 0.16979
published_at 2026-04-21T12:55:00Z
11
value 0.00054
scoring_system epss
scoring_elements 0.16882
published_at 2026-04-24T12:55:00Z
12
value 0.00054
scoring_system epss
scoring_elements 0.16867
published_at 2026-04-26T12:55:00Z
13
value 0.00054
scoring_system epss
scoring_elements 0.16817
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19533
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19533
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1783534
reference_id 1783534
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1783534
5
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
6
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
fixed_packages
aliases CVE-2019-19533
risk_score 1.1
exploitability 0.5
weighted_severity 2.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-unk7-gjpn-ykhu
46
url VCID-uw8x-rzh9-7uh7
vulnerability_id VCID-uw8x-rzh9-7uh7
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10751.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10751.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-10751
reference_id
reference_type
scores
0
value 0.00084
scoring_system epss
scoring_elements 0.24474
published_at 2026-04-08T12:55:00Z
1
value 0.00084
scoring_system epss
scoring_elements 0.24593
published_at 2026-04-02T12:55:00Z
2
value 0.00084
scoring_system epss
scoring_elements 0.24629
published_at 2026-04-04T12:55:00Z
3
value 0.00084
scoring_system epss
scoring_elements 0.24405
published_at 2026-04-07T12:55:00Z
4
value 0.00084
scoring_system epss
scoring_elements 0.24518
published_at 2026-04-09T12:55:00Z
5
value 0.00084
scoring_system epss
scoring_elements 0.24533
published_at 2026-04-11T12:55:00Z
6
value 0.00084
scoring_system epss
scoring_elements 0.24489
published_at 2026-04-12T12:55:00Z
7
value 0.00084
scoring_system epss
scoring_elements 0.24432
published_at 2026-04-13T12:55:00Z
8
value 0.00084
scoring_system epss
scoring_elements 0.24448
published_at 2026-04-16T12:55:00Z
9
value 0.00084
scoring_system epss
scoring_elements 0.24442
published_at 2026-04-18T12:55:00Z
10
value 0.00084
scoring_system epss
scoring_elements 0.24417
published_at 2026-04-21T12:55:00Z
11
value 0.00084
scoring_system epss
scoring_elements 0.24301
published_at 2026-04-24T12:55:00Z
12
value 0.00084
scoring_system epss
scoring_elements 0.24287
published_at 2026-04-26T12:55:00Z
13
value 0.00084
scoring_system epss
scoring_elements 0.24247
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-10751
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3016
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12768
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
35
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1839634
reference_id 1839634
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1839634
37
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
38
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
39
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
40
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
41
reference_url https://usn.ubuntu.com/4389-1/
reference_id USN-4389-1
reference_type
scores
url https://usn.ubuntu.com/4389-1/
42
reference_url https://usn.ubuntu.com/4390-1/
reference_id USN-4390-1
reference_type
scores
url https://usn.ubuntu.com/4390-1/
43
reference_url https://usn.ubuntu.com/4391-1/
reference_id USN-4391-1
reference_type
scores
url https://usn.ubuntu.com/4391-1/
44
reference_url https://usn.ubuntu.com/4412-1/
reference_id USN-4412-1
reference_type
scores
url https://usn.ubuntu.com/4412-1/
45
reference_url https://usn.ubuntu.com/4413-1/
reference_id USN-4413-1
reference_type
scores
url https://usn.ubuntu.com/4413-1/
fixed_packages
aliases CVE-2020-10751
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uw8x-rzh9-7uh7
47
url VCID-vnyw-yc4e-eue9
vulnerability_id VCID-vnyw-yc4e-eue9
summary kernel: use-after-free in route4_change() in net/sched/cls_route.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3715.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3715.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3715
reference_id
reference_type
scores
0
value 0.00041
scoring_system epss
scoring_elements 0.12512
published_at 2026-04-11T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.1241
published_at 2026-04-07T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12491
published_at 2026-04-08T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12542
published_at 2026-04-09T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.1292
published_at 2026-04-04T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.12642
published_at 2026-04-26T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.12528
published_at 2026-04-29T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.12768
published_at 2026-04-01T12:55:00Z
8
value 0.00042
scoring_system epss
scoring_elements 0.12686
published_at 2026-04-12T12:55:00Z
9
value 0.00042
scoring_system epss
scoring_elements 0.12638
published_at 2026-04-13T12:55:00Z
10
value 0.00042
scoring_system epss
scoring_elements 0.12545
published_at 2026-04-16T12:55:00Z
11
value 0.00042
scoring_system epss
scoring_elements 0.12557
published_at 2026-04-18T12:55:00Z
12
value 0.00042
scoring_system epss
scoring_elements 0.12667
published_at 2026-04-21T12:55:00Z
13
value 0.00042
scoring_system epss
scoring_elements 0.12678
published_at 2026-04-24T12:55:00Z
14
value 0.00042
scoring_system epss
scoring_elements 0.12869
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3715
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3715
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1993988
reference_id 1993988
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1993988
5
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
6
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
7
reference_url https://access.redhat.com/errata/RHSA-2021:3438
reference_id RHSA-2021:3438
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3438
8
reference_url https://access.redhat.com/errata/RHSA-2021:3439
reference_id RHSA-2021:3439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3439
9
reference_url https://access.redhat.com/errata/RHSA-2021:3441
reference_id RHSA-2021:3441
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3441
10
reference_url https://access.redhat.com/errata/RHSA-2021:3442
reference_id RHSA-2021:3442
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3442
11
reference_url https://access.redhat.com/errata/RHSA-2021:3443
reference_id RHSA-2021:3443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3443
12
reference_url https://access.redhat.com/errata/RHSA-2021:3444
reference_id RHSA-2021:3444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3444
13
reference_url https://access.redhat.com/errata/RHSA-2021:3445
reference_id RHSA-2021:3445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3445
14
reference_url https://access.redhat.com/errata/RHSA-2021:3446
reference_id RHSA-2021:3446
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3446
15
reference_url https://access.redhat.com/errata/RHSA-2021:3477
reference_id RHSA-2021:3477
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3477
16
reference_url https://access.redhat.com/errata/RHSA-2022:7173
reference_id RHSA-2022:7173
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7173
fixed_packages
aliases CVE-2021-3715
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vnyw-yc4e-eue9
48
url VCID-vw2s-hq95-j7c6
vulnerability_id VCID-vw2s-hq95-j7c6
summary kernel: referencing inode of removed superblock in get_futex_key() causes UAF
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14381.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14381.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14381
reference_id
reference_type
scores
0
value 0.0064
scoring_system epss
scoring_elements 0.7047
published_at 2026-04-01T12:55:00Z
1
value 0.0064
scoring_system epss
scoring_elements 0.70483
published_at 2026-04-02T12:55:00Z
2
value 0.0064
scoring_system epss
scoring_elements 0.70623
published_at 2026-04-29T12:55:00Z
3
value 0.0064
scoring_system epss
scoring_elements 0.70579
published_at 2026-04-16T12:55:00Z
4
value 0.0064
scoring_system epss
scoring_elements 0.70587
published_at 2026-04-18T12:55:00Z
5
value 0.0064
scoring_system epss
scoring_elements 0.70566
published_at 2026-04-21T12:55:00Z
6
value 0.0064
scoring_system epss
scoring_elements 0.70615
published_at 2026-04-24T12:55:00Z
7
value 0.0064
scoring_system epss
scoring_elements 0.70624
published_at 2026-04-26T12:55:00Z
8
value 0.0064
scoring_system epss
scoring_elements 0.70501
published_at 2026-04-04T12:55:00Z
9
value 0.0064
scoring_system epss
scoring_elements 0.70478
published_at 2026-04-07T12:55:00Z
10
value 0.0064
scoring_system epss
scoring_elements 0.70525
published_at 2026-04-08T12:55:00Z
11
value 0.0064
scoring_system epss
scoring_elements 0.7054
published_at 2026-04-09T12:55:00Z
12
value 0.0064
scoring_system epss
scoring_elements 0.70564
published_at 2026-04-11T12:55:00Z
13
value 0.0064
scoring_system epss
scoring_elements 0.70549
published_at 2026-04-12T12:55:00Z
14
value 0.0064
scoring_system epss
scoring_elements 0.70534
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14381
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14381
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14381
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1874311
reference_id 1874311
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-24T03:55:30Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=1874311
5
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8019ad13ef7f64be44d4f892af9c840179009254
reference_id ?id=8019ad13ef7f64be44d4f892af9c840179009254
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-24T03:55:30Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8019ad13ef7f64be44d4f892af9c840179009254
6
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
7
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
fixed_packages
aliases CVE-2020-14381
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vw2s-hq95-j7c6
49
url VCID-wjxm-be93-pbeg
vulnerability_id VCID-wjxm-be93-pbeg
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12770.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12770.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12770
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.12932
published_at 2026-04-01T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.13023
published_at 2026-04-02T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.13074
published_at 2026-04-04T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12875
published_at 2026-04-07T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12953
published_at 2026-04-08T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.13004
published_at 2026-04-09T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.12965
published_at 2026-04-11T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.12929
published_at 2026-04-12T12:55:00Z
8
value 0.00042
scoring_system epss
scoring_elements 0.12885
published_at 2026-04-13T12:55:00Z
9
value 0.00042
scoring_system epss
scoring_elements 0.12787
published_at 2026-04-16T12:55:00Z
10
value 0.00042
scoring_system epss
scoring_elements 0.1279
published_at 2026-04-18T12:55:00Z
11
value 0.00042
scoring_system epss
scoring_elements 0.1289
published_at 2026-04-21T12:55:00Z
12
value 0.00042
scoring_system epss
scoring_elements 0.12913
published_at 2026-04-24T12:55:00Z
13
value 0.00042
scoring_system epss
scoring_elements 0.12878
published_at 2026-04-26T12:55:00Z
14
value 0.00042
scoring_system epss
scoring_elements 0.12772
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12770
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3016
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12768
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
35
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1834845
reference_id 1834845
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1834845
37
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
38
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
39
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
40
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
41
reference_url https://access.redhat.com/errata/RHSA-2020:5206
reference_id RHSA-2020:5206
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5206
42
reference_url https://access.redhat.com/errata/RHSA-2020:5430
reference_id RHSA-2020:5430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5430
43
reference_url https://access.redhat.com/errata/RHSA-2020:5656
reference_id RHSA-2020:5656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5656
44
reference_url https://usn.ubuntu.com/4411-1/
reference_id USN-4411-1
reference_type
scores
url https://usn.ubuntu.com/4411-1/
45
reference_url https://usn.ubuntu.com/4412-1/
reference_id USN-4412-1
reference_type
scores
url https://usn.ubuntu.com/4412-1/
46
reference_url https://usn.ubuntu.com/4413-1/
reference_id USN-4413-1
reference_type
scores
url https://usn.ubuntu.com/4413-1/
47
reference_url https://usn.ubuntu.com/4414-1/
reference_id USN-4414-1
reference_type
scores
url https://usn.ubuntu.com/4414-1/
48
reference_url https://usn.ubuntu.com/4419-1/
reference_id USN-4419-1
reference_type
scores
url https://usn.ubuntu.com/4419-1/
fixed_packages
aliases CVE-2020-12770
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wjxm-be93-pbeg
50
url VCID-yq98-krmu-j3hb
vulnerability_id VCID-yq98-krmu-j3hb
summary kernel: bpf: reject unhashed sockets in bpf_sk_assign
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53585.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53585.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53585
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.02951
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.02965
published_at 2026-04-04T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.02973
published_at 2026-04-07T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.02975
published_at 2026-04-08T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03
published_at 2026-04-09T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.0296
published_at 2026-04-11T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.02937
published_at 2026-04-12T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.02927
published_at 2026-04-13T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.02902
published_at 2026-04-16T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.02912
published_at 2026-04-18T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03029
published_at 2026-04-21T12:55:00Z
11
value 0.00015
scoring_system epss
scoring_elements 0.03027
published_at 2026-04-24T12:55:00Z
12
value 0.00015
scoring_system epss
scoring_elements 0.03016
published_at 2026-04-26T12:55:00Z
13
value 0.00015
scoring_system epss
scoring_elements 0.0306
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53585
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53585
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2401495
reference_id 2401495
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2401495
5
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
6
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
fixed_packages
aliases CVE-2023-53585
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yq98-krmu-j3hb
Fixing_vulnerabilities
Risk_score3.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-240%3Farch=el8