Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/82517?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82517?format=api", "vulnerability_id": "VCID-9jgx-kua4-q3bk", "summary": "kernel: unchecked kstrdup of fwstr in drm_load_edid_firmware leads to denial of service", "aliases": [ { "alias": "CVE-2019-12382" } ], "fixed_packages": [], "affected_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/103144?format=api", "purl": "pkg:rpm/redhat/kernel@3.10.0-1062.26.1?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-11nf-xxx4-4yfw" }, { "vulnerability": "VCID-1uta-n239-s7e1" }, { "vulnerability": "VCID-9jgx-kua4-q3bk" }, { "vulnerability": "VCID-baxd-14v9-jqc9" }, { "vulnerability": "VCID-cjcd-saft-fqds" }, { "vulnerability": "VCID-et66-rjvp-3uhf" }, { "vulnerability": "VCID-fb43-v8p6-wqbb" }, { "vulnerability": "VCID-fb84-2es5-q3hc" }, { "vulnerability": "VCID-hmp6-1pt2-3udk" }, { "vulnerability": "VCID-jybz-x1kz-hyh7" }, { "vulnerability": "VCID-s6bg-vx1j-f3av" }, { "vulnerability": "VCID-uss1-mjb5-fqb4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@3.10.0-1062.26.1%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/104639?format=api", "purl": "pkg:rpm/redhat/kernel@3.10.0-1127?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-11nf-xxx4-4yfw" }, { "vulnerability": "VCID-1uta-n239-s7e1" }, { "vulnerability": "VCID-23y9-s6wr-c7dn" }, { "vulnerability": "VCID-24gg-rxjx-quhx" }, { "vulnerability": "VCID-2z4g-vpch-c7hj" }, { "vulnerability": "VCID-8r2p-9p14-d3a8" }, { "vulnerability": "VCID-9jgx-kua4-q3bk" }, { "vulnerability": "VCID-bmfm-rdxx-j3aq" }, { "vulnerability": "VCID-cjcd-saft-fqds" }, { "vulnerability": "VCID-e1ex-mxhn-eqb6" }, { "vulnerability": "VCID-et66-rjvp-3uhf" }, { "vulnerability": "VCID-f28k-7vg3-jffy" }, { "vulnerability": "VCID-fb43-v8p6-wqbb" }, { "vulnerability": "VCID-fhgw-tncv-syep" }, { "vulnerability": "VCID-hmp6-1pt2-3udk" }, { "vulnerability": "VCID-jqvb-tqv1-dfe5" }, { "vulnerability": "VCID-k49u-e4rp-9ucn" }, { "vulnerability": "VCID-psxw-h3z8-ubas" }, { "vulnerability": "VCID-qbax-4n63-jqbk" }, { "vulnerability": "VCID-r7p3-vgra-17d2" }, { "vulnerability": "VCID-s6bg-vx1j-f3av" }, { "vulnerability": "VCID-uss1-mjb5-fqb4" }, { "vulnerability": "VCID-v12z-2jwq-yqaz" }, { "vulnerability": "VCID-xf8u-tez7-rug4" }, { "vulnerability": "VCID-y997-swqd-ebdc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@3.10.0-1127%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/94062?format=api", "purl": "pkg:rpm/redhat/kernel@4.18.0-147?arch=el8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-23y9-s6wr-c7dn" }, { "vulnerability": "VCID-2z4g-vpch-c7hj" }, { "vulnerability": "VCID-38kt-fvjx-p3f2" }, { "vulnerability": "VCID-3b12-3r7h-e7eb" }, { "vulnerability": "VCID-3fb7-pd8k-63e5" }, { "vulnerability": "VCID-3nht-abdm-sbex" }, { "vulnerability": "VCID-3trr-t25v-3fd8" }, { "vulnerability": "VCID-3wb4-g3ex-xfdr" }, { "vulnerability": "VCID-4ax3-5d9h-mqeu" }, { "vulnerability": "VCID-585a-eedx-yucb" }, { "vulnerability": "VCID-813c-xj2p-3kgq" }, { "vulnerability": "VCID-95qt-y3b3-pbg7" }, { "vulnerability": "VCID-9jgx-kua4-q3bk" }, { "vulnerability": "VCID-axdd-vkgz-cye9" }, { "vulnerability": "VCID-cjcd-saft-fqds" }, { "vulnerability": "VCID-drgs-3u3a-v3h1" }, { "vulnerability": "VCID-efar-vyrf-8fau" }, { "vulnerability": "VCID-ffu4-v4aq-1bdz" }, { "vulnerability": "VCID-fk54-8rrc-ekc2" }, { "vulnerability": "VCID-h2h4-ypwg-rbh8" }, { "vulnerability": "VCID-h9yg-sv8b-mkhf" }, { "vulnerability": "VCID-hmp6-1pt2-3udk" }, { "vulnerability": "VCID-jqvb-tqv1-dfe5" }, { "vulnerability": "VCID-jv35-tmzb-tuag" }, { "vulnerability": "VCID-kecy-99uv-fqdy" }, { "vulnerability": "VCID-nqb6-zp72-1bdz" }, { "vulnerability": "VCID-ns4n-ng6b-ufaf" }, { "vulnerability": "VCID-p64t-t6cs-rud3" }, { "vulnerability": "VCID-qbax-4n63-jqbk" }, { "vulnerability": "VCID-r7p3-vgra-17d2" }, { "vulnerability": "VCID-t37c-fdcm-fudm" }, { "vulnerability": "VCID-tgzq-uucd-uqgt" }, { "vulnerability": "VCID-uss1-mjb5-fqb4" }, { "vulnerability": "VCID-v5rq-g6e5-jbap" }, { "vulnerability": "VCID-xf8u-tez7-rug4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-147%3Farch=el8" }, { "url": "http://public2.vulnerablecode.io/api/packages/105445?format=api", "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1127.rt56.1093?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-11nf-xxx4-4yfw" }, { "vulnerability": "VCID-1uta-n239-s7e1" }, { "vulnerability": "VCID-23y9-s6wr-c7dn" }, { "vulnerability": "VCID-24gg-rxjx-quhx" }, { "vulnerability": "VCID-2z4g-vpch-c7hj" }, { "vulnerability": "VCID-9jgx-kua4-q3bk" }, { "vulnerability": "VCID-bmfm-rdxx-j3aq" }, { "vulnerability": "VCID-cjcd-saft-fqds" }, { "vulnerability": "VCID-e1ex-mxhn-eqb6" }, { "vulnerability": "VCID-et66-rjvp-3uhf" }, { "vulnerability": "VCID-fb43-v8p6-wqbb" }, { "vulnerability": "VCID-fhgw-tncv-syep" }, { "vulnerability": "VCID-hmp6-1pt2-3udk" }, { "vulnerability": "VCID-jqvb-tqv1-dfe5" }, { "vulnerability": "VCID-k49u-e4rp-9ucn" }, { "vulnerability": "VCID-r7p3-vgra-17d2" }, { "vulnerability": "VCID-s6bg-vx1j-f3av" }, { "vulnerability": "VCID-uss1-mjb5-fqb4" }, { "vulnerability": "VCID-y997-swqd-ebdc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@3.10.0-1127.rt56.1093%3Farch=el7" } ], "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12382.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12382.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-12382", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2957", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30646", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30782", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.3083", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30648", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30706", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30737", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30741", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30696", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30652", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30677", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.3066", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30626", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30446", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30332", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-12382" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12382", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12382" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1715554", "reference_id": "1715554", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1715554" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3517", "reference_id": "RHSA-2019:3517", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3517" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1016", "reference_id": "RHSA-2020:1016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1016" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1070", "reference_id": "RHSA-2020:1070", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1070" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2522", "reference_id": "RHSA-2020:2522", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2522" } ], "weaknesses": [ { "cwe_id": 253, "name": "Incorrect Check of Function Return Value", "description": "The product incorrectly checks a return value from a function, which prevents it from detecting errors or exceptional conditions." }, { "cwe_id": 476, "name": "NULL Pointer Dereference", "description": "A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit." } ], "exploits": [], "severity_range_score": "2.5 - 5.5", "exploitability": "0.5", "weighted_severity": "5.0", "risk_score": 2.5, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9jgx-kua4-q3bk" }