Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/100578?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/100578?format=api", "purl": "pkg:rpm/redhat/kubevirt@4.9.0-287?arch=el8", "type": "rpm", "namespace": "redhat", "name": "kubevirt", "version": "4.9.0-287", "qualifiers": { "arch": "el8" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36618?format=api", "vulnerability_id": "VCID-7ahs-f1qh-g7an", "summary": "Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3114.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3114.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3114", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11299", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.114", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11439", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11498", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11286", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11368", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11426", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11432", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30525", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30598", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30456", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30978", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31008", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30991", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30957", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30798", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.3068", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3114" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7919", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7919" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3114", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3114" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918750", "reference_id": "1918750", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918750" }, { "reference_url": "https://security.archlinux.org/ASA-202101-27", "reference_id": "ASA-202101-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202101-27" }, { "reference_url": "https://security.archlinux.org/AVG-1481", "reference_id": "AVG-1481", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1481" }, { "reference_url": "https://security.gentoo.org/glsa/202208-02", "reference_id": "GLSA-202208-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0957", "reference_id": "RHSA-2021:0957", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0957" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0958", "reference_id": "RHSA-2021:0958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1006", "reference_id": "RHSA-2021:1006", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1006" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1338", "reference_id": "RHSA-2021:1338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1338" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1339", "reference_id": "RHSA-2021:1339", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1339" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1366", "reference_id": "RHSA-2021:1366", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1366" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1551", "reference_id": "RHSA-2021:1551", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1551" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1746", "reference_id": "RHSA-2021:1746", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1746" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2021", "reference_id": "RHSA-2021:2021", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2021" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2041", "reference_id": "RHSA-2021:2041", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2041" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2093", "reference_id": "RHSA-2021:2093", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2093" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2095", "reference_id": "RHSA-2021:2095", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2095" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2437", "reference_id": "RHSA-2021:2437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2438", "reference_id": "RHSA-2021:2438", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2438" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2532", "reference_id": "RHSA-2021:2532", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2532" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2543", "reference_id": "RHSA-2021:2543", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2543" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2920", "reference_id": "RHSA-2021:2920", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2920" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3119", "reference_id": "RHSA-2021:3119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3119" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3748", "reference_id": "RHSA-2021:3748", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3748" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4103", "reference_id": "RHSA-2021:4103", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4103" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4226", "reference_id": "RHSA-2021:4226", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4226" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0308", "reference_id": "RHSA-2022:0308", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0308" } ], "fixed_packages": [], "aliases": [ "CVE-2021-3114" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7ahs-f1qh-g7an" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36621?format=api", "vulnerability_id": "VCID-cr7c-xuh8-guhy", "summary": "Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-31525.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-31525.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-31525", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.06096", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05695", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.0573", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.0577", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05766", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05804", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05829", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05808", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05799", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05793", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05758", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05765", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.0591", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05941", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05976", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05984", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.06001", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-31525" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31525", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31525" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/golang/go", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/golang/go" }, { "reference_url": "https://github.com/golang/go/issues/45710", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/golang/go/issues/45710" }, { "reference_url": "https://go.dev/cl/313069", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://go.dev/cl/313069" }, { "reference_url": "https://go.dev/issue/45710", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://go.dev/issue/45710" }, { "reference_url": "https://go.googlesource.com/net/+/89ef3d95e781148a0951956029c92a211477f7f9", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://go.googlesource.com/net/+/89ef3d95e781148a0951956029c92a211477f7f9" }, { "reference_url": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ISRZZ6NY5R2TBYE72KZFOCO25TEUQTBF", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ISRZZ6NY5R2TBYE72KZFOCO25TEUQTBF" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525" }, { "reference_url": "https://pkg.go.dev/vuln/GO-2022-0236", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://pkg.go.dev/vuln/GO-2022-0236" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341", "reference_id": "1958341", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341" }, { "reference_url": "https://security.archlinux.org/AVG-1927", "reference_id": "AVG-1927", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1927" }, { "reference_url": "https://security.gentoo.org/glsa/202208-02", "reference_id": "GLSA-202208-02", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.gentoo.org/glsa/202208-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2543", "reference_id": "RHSA-2021:2543", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2543" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2704", "reference_id": "RHSA-2021:2704", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2704" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2705", "reference_id": "RHSA-2021:2705", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2705" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2983", "reference_id": "RHSA-2021:2983", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2983" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2984", "reference_id": "RHSA-2021:2984", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2984" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3076", "reference_id": "RHSA-2021:3076", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3076" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3248", "reference_id": "RHSA-2021:3248", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3248" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3487", "reference_id": "RHSA-2021:3487", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3487" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3555", "reference_id": "RHSA-2021:3555", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3555" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3556", "reference_id": "RHSA-2021:3556", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3556" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3733", "reference_id": "RHSA-2021:3733", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3733" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3748", "reference_id": "RHSA-2021:3748", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3748" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3759", "reference_id": "RHSA-2021:3759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4103", "reference_id": "RHSA-2021:4103", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4103" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4104", "reference_id": "RHSA-2021:4104", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4104" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5072", "reference_id": "RHSA-2021:5072", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5072" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0191", "reference_id": "RHSA-2022:0191", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0191" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0308", "reference_id": "RHSA-2022:0308", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0308" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0577", "reference_id": "RHSA-2022:0577", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0577" } ], "fixed_packages": [], "aliases": [ "CVE-2021-31525", "GHSA-h86h-8ppg-mxmh" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cr7c-xuh8-guhy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36458?format=api", "vulnerability_id": "VCID-dwge-3up7-yyaq", "summary": "Withdrawn Advisory: Infinite loop in xz\n### Withdrawn Advisory\nThis advisory has been withdrawn because alerts cannot be issued for the Go standard library at this time.\n\n### Original Description\nGo before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16845.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16845.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-16845", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.34771", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35253", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35249", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35224", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35179", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35298", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.3527", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.3507", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.34826", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.34698", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.34916", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.34935", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.3517", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35232", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35194", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35218", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-16845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7919", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7919" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3114", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3114" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b" }, { "reference_url": "https://github.com/ulikunitz/xz/issues/35", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/ulikunitz/xz/issues/35" }, { "reference_url": "https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo" }, { "reference_url": "https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20200924-0002", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20200924-0002" }, { "reference_url": "https://www.debian.org/security/2021/dsa-4848", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.debian.org/security/2021/dsa-4848" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuApr2021.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099", "reference_id": "1867099", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3665", "reference_id": "RHSA-2020:3665", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3665" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4201", "reference_id": "RHSA-2020:4201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4201" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4214", "reference_id": "RHSA-2020:4214", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4214" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4297", "reference_id": "RHSA-2020:4297", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4297" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5118", "reference_id": "RHSA-2020:5118", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5118" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5119", "reference_id": "RHSA-2020:5119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5119" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5159", "reference_id": "RHSA-2020:5159", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5159" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5605", "reference_id": "RHSA-2020:5605", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5605" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5606", "reference_id": "RHSA-2020:5606", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5606" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5649", "reference_id": "RHSA-2020:5649", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5649" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0072", "reference_id": "RHSA-2021:0072", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0072" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0172", "reference_id": "RHSA-2021:0172", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0172" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0713", "reference_id": "RHSA-2021:0713", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0713" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0956", "reference_id": "RHSA-2021:0956", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0956" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1016", "reference_id": "RHSA-2021:1016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1016" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1366", "reference_id": "RHSA-2021:1366", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1366" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1515", "reference_id": "RHSA-2021:1515", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2122", "reference_id": "RHSA-2021:2122", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2122" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4103", "reference_id": "RHSA-2021:4103", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4103" }, { "reference_url": "https://usn.ubuntu.com/5725-1/", "reference_id": "USN-5725-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5725-1/" }, { "reference_url": "https://usn.ubuntu.com/5725-2/", "reference_id": "USN-5725-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5725-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-16845", "GHSA-q6gq-997w-f55g" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dwge-3up7-yyaq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81088?format=api", "vulnerability_id": "VCID-w9qm-pwnh-4ydj", "summary": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15586.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15586.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15586", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69813", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69826", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69841", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69817", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69866", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69882", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69904", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69889", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69874", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69916", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69925", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69906", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69958", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69967", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69969", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69945", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69987", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7919", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7919" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3114", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3114" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953", "reference_id": "1856953", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3665", "reference_id": "RHSA-2020:3665", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3665" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4201", "reference_id": "RHSA-2020:4201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4201" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4214", "reference_id": "RHSA-2020:4214", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4214" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4297", "reference_id": "RHSA-2020:4297", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4297" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5118", "reference_id": "RHSA-2020:5118", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5118" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5119", "reference_id": "RHSA-2020:5119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5119" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5605", "reference_id": "RHSA-2020:5605", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5605" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5606", "reference_id": "RHSA-2020:5606", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5606" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5649", "reference_id": "RHSA-2020:5649", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5649" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0072", "reference_id": "RHSA-2021:0072", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0072" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0172", "reference_id": "RHSA-2021:0172", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0172" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0713", "reference_id": "RHSA-2021:0713", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0713" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0956", "reference_id": "RHSA-2021:0956", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0956" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1016", "reference_id": "RHSA-2021:1016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1016" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1366", "reference_id": "RHSA-2021:1366", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1366" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1515", "reference_id": "RHSA-2021:1515", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2122", "reference_id": "RHSA-2021:2122", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2122" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4103", "reference_id": "RHSA-2021:4103", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4103" } ], "fixed_packages": [], "aliases": [ "CVE-2020-15586" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w9qm-pwnh-4ydj" } ], "fixing_vulnerabilities": [], "risk_score": "4.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kubevirt@4.9.0-287%3Farch=el8" }