Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/python2.7@2.7.18-2?distro=bullseye
Typedeb
Namespacedebian
Namepython2.7
Version2.7.18-2
Qualifiers
distro bullseye
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.7.18-8+deb11u1
Latest_non_vulnerable_version2.7.18-8+deb11u1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-dkxn-j9dr-sqbp
vulnerability_id VCID-dkxn-j9dr-sqbp
summary
Multiple vulnerabilities have been found in Python, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3177.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3177.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3177
reference_id
reference_type
scores
0
value 0.00072
scoring_system epss
scoring_elements 0.21971
published_at 2026-04-11T12:55:00Z
1
value 0.00072
scoring_system epss
scoring_elements 0.2193
published_at 2026-04-12T12:55:00Z
2
value 0.00072
scoring_system epss
scoring_elements 0.21875
published_at 2026-04-16T12:55:00Z
3
value 0.00072
scoring_system epss
scoring_elements 0.21842
published_at 2026-04-21T12:55:00Z
4
value 0.00072
scoring_system epss
scoring_elements 0.21873
published_at 2026-04-13T12:55:00Z
5
value 0.00072
scoring_system epss
scoring_elements 0.21827
published_at 2026-04-07T12:55:00Z
6
value 0.00072
scoring_system epss
scoring_elements 0.21882
published_at 2026-04-18T12:55:00Z
7
value 0.00072
scoring_system epss
scoring_elements 0.21958
published_at 2026-04-09T12:55:00Z
8
value 0.00072
scoring_system epss
scoring_elements 0.21902
published_at 2026-04-08T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.22631
published_at 2026-04-04T12:55:00Z
10
value 0.00074
scoring_system epss
scoring_elements 0.22421
published_at 2026-04-01T12:55:00Z
11
value 0.00074
scoring_system epss
scoring_elements 0.22589
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3177
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1918168
reference_id 1918168
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1918168
5
reference_url https://github.com/python/cpython/pull/24239
reference_id 24239
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-12-18T15:03:29Z/
url https://github.com/python/cpython/pull/24239
6
reference_url https://security.archlinux.org/ASA-202102-37
reference_id ASA-202102-37
reference_type
scores
url https://security.archlinux.org/ASA-202102-37
7
reference_url https://security.archlinux.org/AVG-1465
reference_id AVG-1465
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1465
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/
reference_id BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-12-18T15:03:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/
reference_id CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-12-18T15:03:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/
10
reference_url https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html
reference_id ctypes-buffer-overflow-pycarg_repr.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-12-18T15:03:29Z/
url https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
reference_id FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-12-18T15:03:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/
reference_id FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-12-18T15:03:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/
13
reference_url https://security.gentoo.org/glsa/202101-18
reference_id GLSA-202101-18
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-12-18T15:03:29Z/
url https://security.gentoo.org/glsa/202101-18
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
reference_id HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-12-18T15:03:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
15
reference_url https://bugs.python.org/issue42938
reference_id issue42938
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-12-18T15:03:29Z/
url https://bugs.python.org/issue42938
16
reference_url https://news.ycombinator.com/item?id=26185005
reference_id item?id=26185005
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-12-18T15:03:29Z/
url https://news.ycombinator.com/item?id=26185005
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/
reference_id MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-12-18T15:03:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
reference_id MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-12-18T15:03:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
19
reference_url https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-12-18T15:03:29Z/
url https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
20
reference_url https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html
reference_id msg00013.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-12-18T15:03:29Z/
url https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html
21
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
reference_id msg00024.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-12-18T15:03:29Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
reference_id NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-12-18T15:03:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/
reference_id NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-12-18T15:03:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/
24
reference_url https://security.netapp.com/advisory/ntap-20210226-0003/
reference_id ntap-20210226-0003
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-12-18T15:03:29Z/
url https://security.netapp.com/advisory/ntap-20210226-0003/
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/
reference_id NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-12-18T15:03:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/
26
reference_url https://access.redhat.com/errata/RHSA-2021:1633
reference_id RHSA-2021:1633
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1633
27
reference_url https://access.redhat.com/errata/RHSA-2021:1761
reference_id RHSA-2021:1761
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1761
28
reference_url https://access.redhat.com/errata/RHSA-2021:1879
reference_id RHSA-2021:1879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1879
29
reference_url https://access.redhat.com/errata/RHSA-2021:3252
reference_id RHSA-2021:3252
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3252
30
reference_url https://access.redhat.com/errata/RHSA-2022:5235
reference_id RHSA-2022:5235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5235
31
reference_url https://usn.ubuntu.com/4754-1/
reference_id USN-4754-1
reference_type
scores
url https://usn.ubuntu.com/4754-1/
32
reference_url https://usn.ubuntu.com/4754-3/
reference_id USN-4754-3
reference_type
scores
url https://usn.ubuntu.com/4754-3/
33
reference_url https://usn.ubuntu.com/4754-4/
reference_id USN-4754-4
reference_type
scores
url https://usn.ubuntu.com/4754-4/
34
reference_url https://usn.ubuntu.com/4754-5/
reference_id USN-4754-5
reference_type
scores
url https://usn.ubuntu.com/4754-5/
35
reference_url https://usn.ubuntu.com/6891-1/
reference_id USN-6891-1
reference_type
scores
url https://usn.ubuntu.com/6891-1/
36
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/
reference_id V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-12-18T15:03:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/
37
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/
reference_id Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-12-18T15:03:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/
38
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/
reference_id YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-12-18T15:03:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/
39
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/
reference_id Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-12-18T15:03:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/
fixed_packages
0
url pkg:deb/debian/python2.7@2.7.18-2?distro=bullseye
purl pkg:deb/debian/python2.7@2.7.18-2?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python2.7@2.7.18-2%3Fdistro=bullseye
1
url pkg:deb/debian/python2.7@2.7.18-8%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/python2.7@2.7.18-8%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python2.7@2.7.18-8%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2021-3177
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dkxn-j9dr-sqbp
1
url VCID-gkfp-ga1r-jkag
vulnerability_id VCID-gkfp-ga1r-jkag
summary
A vulnerability in Python could lead to a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8492.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8492.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-8492
reference_id
reference_type
scores
0
value 0.03512
scoring_system epss
scoring_elements 0.8764
published_at 2026-04-21T12:55:00Z
1
value 0.03512
scoring_system epss
scoring_elements 0.8763
published_at 2026-04-12T12:55:00Z
2
value 0.03512
scoring_system epss
scoring_elements 0.87628
published_at 2026-04-13T12:55:00Z
3
value 0.03512
scoring_system epss
scoring_elements 0.87642
published_at 2026-04-16T12:55:00Z
4
value 0.03512
scoring_system epss
scoring_elements 0.87643
published_at 2026-04-18T12:55:00Z
5
value 0.03512
scoring_system epss
scoring_elements 0.87598
published_at 2026-04-07T12:55:00Z
6
value 0.03512
scoring_system epss
scoring_elements 0.87617
published_at 2026-04-08T12:55:00Z
7
value 0.03512
scoring_system epss
scoring_elements 0.87624
published_at 2026-04-09T12:55:00Z
8
value 0.03512
scoring_system epss
scoring_elements 0.87635
published_at 2026-04-11T12:55:00Z
9
value 0.0363
scoring_system epss
scoring_elements 0.87785
published_at 2026-04-02T12:55:00Z
10
value 0.0363
scoring_system epss
scoring_elements 0.87796
published_at 2026-04-04T12:55:00Z
11
value 0.0363
scoring_system epss
scoring_elements 0.87774
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-8492
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8492
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1809065
reference_id 1809065
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1809065
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970099
reference_id 970099
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970099
6
reference_url https://security.gentoo.org/glsa/202005-09
reference_id GLSA-202005-09
reference_type
scores
url https://security.gentoo.org/glsa/202005-09
7
reference_url https://access.redhat.com/errata/RHSA-2020:3888
reference_id RHSA-2020:3888
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3888
8
reference_url https://access.redhat.com/errata/RHSA-2020:4285
reference_id RHSA-2020:4285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4285
9
reference_url https://access.redhat.com/errata/RHSA-2020:4433
reference_id RHSA-2020:4433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4433
10
reference_url https://access.redhat.com/errata/RHSA-2020:4641
reference_id RHSA-2020:4641
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4641
11
reference_url https://usn.ubuntu.com/4333-1/
reference_id USN-4333-1
reference_type
scores
url https://usn.ubuntu.com/4333-1/
12
reference_url https://usn.ubuntu.com/4333-2/
reference_id USN-4333-2
reference_type
scores
url https://usn.ubuntu.com/4333-2/
13
reference_url https://usn.ubuntu.com/4754-3/
reference_id USN-4754-3
reference_type
scores
url https://usn.ubuntu.com/4754-3/
14
reference_url https://usn.ubuntu.com/5200-1/
reference_id USN-5200-1
reference_type
scores
url https://usn.ubuntu.com/5200-1/
15
reference_url https://usn.ubuntu.com/6891-1/
reference_id USN-6891-1
reference_type
scores
url https://usn.ubuntu.com/6891-1/
fixed_packages
0
url pkg:deb/debian/python2.7@2.7.18-2?distro=bullseye
purl pkg:deb/debian/python2.7@2.7.18-2?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python2.7@2.7.18-2%3Fdistro=bullseye
1
url pkg:deb/debian/python2.7@2.7.18-8%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/python2.7@2.7.18-8%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python2.7@2.7.18-8%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2020-8492
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gkfp-ga1r-jkag
2
url VCID-tyk4-kazt-kydj
vulnerability_id VCID-tyk4-kazt-kydj
summary
Multiple vulnerabilities have been found in Python, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20907.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20907.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-20907
reference_id
reference_type
scores
0
value 0.00323
scoring_system epss
scoring_elements 0.55257
published_at 2026-04-01T12:55:00Z
1
value 0.00323
scoring_system epss
scoring_elements 0.55355
published_at 2026-04-02T12:55:00Z
2
value 0.00323
scoring_system epss
scoring_elements 0.5538
published_at 2026-04-04T12:55:00Z
3
value 0.00323
scoring_system epss
scoring_elements 0.55358
published_at 2026-04-07T12:55:00Z
4
value 0.00323
scoring_system epss
scoring_elements 0.55408
published_at 2026-04-09T12:55:00Z
5
value 0.00323
scoring_system epss
scoring_elements 0.55419
published_at 2026-04-11T12:55:00Z
6
value 0.00323
scoring_system epss
scoring_elements 0.55397
published_at 2026-04-21T12:55:00Z
7
value 0.00323
scoring_system epss
scoring_elements 0.55379
published_at 2026-04-13T12:55:00Z
8
value 0.00323
scoring_system epss
scoring_elements 0.55414
published_at 2026-04-16T12:55:00Z
9
value 0.00323
scoring_system epss
scoring_elements 0.55418
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-20907
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20907
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20907
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1856481
reference_id 1856481
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1856481
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970099
reference_id 970099
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970099
6
reference_url https://security.gentoo.org/glsa/202008-01
reference_id GLSA-202008-01
reference_type
scores
url https://security.gentoo.org/glsa/202008-01
7
reference_url https://access.redhat.com/errata/RHSA-2020:4273
reference_id RHSA-2020:4273
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4273
8
reference_url https://access.redhat.com/errata/RHSA-2020:4285
reference_id RHSA-2020:4285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4285
9
reference_url https://access.redhat.com/errata/RHSA-2020:4299
reference_id RHSA-2020:4299
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4299
10
reference_url https://access.redhat.com/errata/RHSA-2020:4433
reference_id RHSA-2020:4433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4433
11
reference_url https://access.redhat.com/errata/RHSA-2020:4641
reference_id RHSA-2020:4641
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4641
12
reference_url https://access.redhat.com/errata/RHSA-2020:4654
reference_id RHSA-2020:4654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4654
13
reference_url https://access.redhat.com/errata/RHSA-2020:5009
reference_id RHSA-2020:5009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5009
14
reference_url https://access.redhat.com/errata/RHSA-2020:5010
reference_id RHSA-2020:5010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5010
15
reference_url https://access.redhat.com/errata/RHSA-2021:0528
reference_id RHSA-2021:0528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0528
16
reference_url https://access.redhat.com/errata/RHSA-2021:0761
reference_id RHSA-2021:0761
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0761
17
reference_url https://access.redhat.com/errata/RHSA-2021:0881
reference_id RHSA-2021:0881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0881
18
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
19
reference_url https://usn.ubuntu.com/4428-1/
reference_id USN-4428-1
reference_type
scores
url https://usn.ubuntu.com/4428-1/
20
reference_url https://usn.ubuntu.com/4754-3/
reference_id USN-4754-3
reference_type
scores
url https://usn.ubuntu.com/4754-3/
21
reference_url https://usn.ubuntu.com/6891-1/
reference_id USN-6891-1
reference_type
scores
url https://usn.ubuntu.com/6891-1/
fixed_packages
0
url pkg:deb/debian/python2.7@2.7.18-2?distro=bullseye
purl pkg:deb/debian/python2.7@2.7.18-2?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python2.7@2.7.18-2%3Fdistro=bullseye
1
url pkg:deb/debian/python2.7@2.7.18-8%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/python2.7@2.7.18-8%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python2.7@2.7.18-8%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2019-20907
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tyk4-kazt-kydj
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/python2.7@2.7.18-2%3Fdistro=bullseye