{"url":"http://public2.vulnerablecode.io/api/packages/100754?format=json","purl":"pkg:rpm/redhat/pki-core@10.5.9-15?arch=el7_6","type":"rpm","namespace":"redhat","name":"pki-core","version":"10.5.9-15","qualifiers":{"arch":"el7_6"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81619?format=json","vulnerability_id":"VCID-7v3m-meaa-sudu","summary":"pki-core/pki-kra: Reflected XSS in recoveryID search field at KRA's DRM agent page in authorize recovery tab","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10179.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10179.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10179","reference_id":"","reference_type":"","scores":[{"value":"0.00451","scoring_system":"epss","scoring_elements":"0.63614","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00451","scoring_system":"epss","scoring_elements":"0.63754","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00451","scoring_system":"epss","scoring_elements":"0.63725","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00451","scoring_system":"epss","scoring_elements":"0.63743","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00451","scoring_system":"epss","scoring_elements":"0.63756","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00451","scoring_system":"epss","scoring_elements":"0.63673","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00451","scoring_system":"epss","scoring_elements":"0.637","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00451","scoring_system":"epss","scoring_elements":"0.6366","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00451","scoring_system":"epss","scoring_elements":"0.63711","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00451","scoring_system":"epss","scoring_elements":"0.63728","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00451","scoring_system":"epss","scoring_elements":"0.63742","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00451","scoring_system":"epss","scoring_elements":"0.63694","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00451","scoring_system":"epss","scoring_elements":"0.63729","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00451","scoring_system":"epss","scoring_elements":"0.63739","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10179"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10179","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10179"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1695901","reference_id":"1695901","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1695901"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:dogtagpki:dogtagpki:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:dogtagpki:dogtagpki:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:dogtagpki:dogtagpki:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10179","reference_id":"CVE-2019-10179","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10179"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4847","reference_id":"RHSA-2020:4847","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4847"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0819","reference_id":"RHSA-2021:0819","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0819"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0851","reference_id":"RHSA-2021:0851","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0851"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0975","reference_id":"RHSA-2021:0975","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0975"}],"fixed_packages":[],"aliases":["CVE-2019-10179"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7v3m-meaa-sudu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81624?format=json","vulnerability_id":"VCID-97tw-ymj8-6bbj","summary":"pki-core: Reflected XSS in getcookies?url= endpoint in CA","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10221.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10221.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10221","reference_id":"","reference_type":"","scores":[{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71847","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71957","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71962","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71968","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71964","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71856","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71875","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71848","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71887","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71898","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71922","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71904","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71929","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71934","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71917","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10221"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10221","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10221"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10221","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10221"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1732565","reference_id":"1732565","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1732565"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:dogtagpki:dogtagpki:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:dogtagpki:dogtagpki:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:dogtagpki:dogtagpki:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10221","reference_id":"CVE-2019-10221","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10221"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4847","reference_id":"RHSA-2020:4847","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4847"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0819","reference_id":"RHSA-2021:0819","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0819"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0851","reference_id":"RHSA-2021:0851","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0851"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0975","reference_id":"RHSA-2021:0975","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0975"}],"fixed_packages":[],"aliases":["CVE-2019-10221"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-97tw-ymj8-6bbj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80548?format=json","vulnerability_id":"VCID-h3y6-zuub-2kdj","summary":"pki-core: XSS in the certificate search results","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25715.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25715.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25715","reference_id":"","reference_type":"","scores":[{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58428","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58515","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58519","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58498","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58464","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58477","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58463","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64911","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64884","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64799","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64849","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64876","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64839","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64889","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64904","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64921","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25715"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25715","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25715"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1891016","reference_id":"1891016","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1891016"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988153","reference_id":"988153","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988153"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4847","reference_id":"RHSA-2020:4847","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4847"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0819","reference_id":"RHSA-2021:0819","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0819"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0851","reference_id":"RHSA-2021:0851","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0851"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0975","reference_id":"RHSA-2021:0975","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0975"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1263","reference_id":"RHSA-2021:1263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1263"},{"reference_url":"https://usn.ubuntu.com/7146-1/","reference_id":"USN-7146-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7146-1/"}],"fixed_packages":[],"aliases":["CVE-2020-25715"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h3y6-zuub-2kdj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81625?format=json","vulnerability_id":"VCID-pf14-dtsb-ebd2","summary":"pki-core: KRA vulnerable to reflected XSS via the getPk12 page","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1721.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1721.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-1721","reference_id":"","reference_type":"","scores":[{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.7301","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73019","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.7304","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73015","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73052","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74526","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74485","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.7452","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74527","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74449","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74486","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74494","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01211","scoring_system":"epss","scoring_elements":"0.79019","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01211","scoring_system":"epss","scoring_elements":"0.79004","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01211","scoring_system":"epss","scoring_elements":"0.78994","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-1721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1721"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1777579","reference_id":"1777579","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1777579"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4847","reference_id":"RHSA-2020:4847","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4847"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0819","reference_id":"RHSA-2021:0819","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0819"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0851","reference_id":"RHSA-2021:0851","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0851"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0975","reference_id":"RHSA-2021:0975","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0975"}],"fixed_packages":[],"aliases":["CVE-2020-1721"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pf14-dtsb-ebd2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81620?format=json","vulnerability_id":"VCID-qwg3-thj2-tkav","summary":"pki-core: Reflected XSS in 'path length' constraint field in CA's Agent page","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10146.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10146.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10146","reference_id":"","reference_type":"","scores":[{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40901","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40562","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40805","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40792","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40708","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40982","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41014","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.4094","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40989","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40997","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41015","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.4098","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40964","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41006","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40977","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40898","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10146"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10146","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10146"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10146","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10146"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1710171","reference_id":"1710171","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1710171"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:dogtagpki:dogtagpki:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:dogtagpki:dogtagpki:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:dogtagpki:dogtagpki:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10146","reference_id":"CVE-2019-10146","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:P/A:N"},{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10146"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4847","reference_id":"RHSA-2020:4847","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4847"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0819","reference_id":"RHSA-2021:0819","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0819"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0851","reference_id":"RHSA-2021:0851","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0851"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0975","reference_id":"RHSA-2021:0975","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0975"}],"fixed_packages":[],"aliases":["CVE-2019-10146"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qwg3-thj2-tkav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80522?format=json","vulnerability_id":"VCID-z6js-5t5m-fka9","summary":"pki-core: Unprivileged users can renew any certificate","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20179.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20179.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-20179","reference_id":"","reference_type":"","scores":[{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52402","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52448","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52476","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52442","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52494","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52489","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.5254","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52523","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52507","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52546","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52551","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52535","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52483","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52492","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52454","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52397","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-20179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20179"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1914379","reference_id":"1914379","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1914379"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0819","reference_id":"RHSA-2021:0819","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0819"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0851","reference_id":"RHSA-2021:0851","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0851"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0966","reference_id":"RHSA-2021:0966","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0966"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0975","reference_id":"RHSA-2021:0975","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0975"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1263","reference_id":"RHSA-2021:1263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1263"},{"reference_url":"https://usn.ubuntu.com/8158-1/","reference_id":"USN-8158-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8158-1/"}],"fixed_packages":[],"aliases":["CVE-2021-20179"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z6js-5t5m-fka9"}],"fixing_vulnerabilities":[],"risk_score":"3.6","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/pki-core@10.5.9-15%3Farch=el7_6"}