{"url":"http://public2.vulnerablecode.io/api/packages/102880?format=json","purl":"pkg:rpm/redhat/rh-python36-python@3.6.12-1?arch=el6","type":"rpm","namespace":"redhat","name":"rh-python36-python","version":"3.6.12-1","qualifiers":{"arch":"el6"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82434?format=json","vulnerability_id":"VCID-57c6-hx7f-efc6","summary":"python: CRLF injection via the host part of the url passed to urlopen()","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-18348.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-18348.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-18348","reference_id":"","reference_type":"","scores":[{"value":"0.02672","scoring_system":"epss","scoring_elements":"0.85746","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02672","scoring_system":"epss","scoring_elements":"0.85888","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02672","scoring_system":"epss","scoring_elements":"0.8586","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02672","scoring_system":"epss","scoring_elements":"0.85869","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02672","scoring_system":"epss","scoring_elements":"0.8587","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02672","scoring_system":"epss","scoring_elements":"0.85758","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02672","scoring_system":"epss","scoring_elements":"0.85777","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02672","scoring_system":"epss","scoring_elements":"0.85783","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02672","scoring_system":"epss","scoring_elements":"0.85802","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02672","scoring_system":"epss","scoring_elements":"0.85813","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02672","scoring_system":"epss","scoring_elements":"0.85827","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02672","scoring_system":"epss","scoring_elements":"0.85824","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02672","scoring_system":"epss","scoring_elements":"0.8582","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02672","scoring_system":"epss","scoring_elements":"0.85839","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02672","scoring_system":"epss","scoring_elements":"0.85844","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02672","scoring_system":"epss","scoring_elements":"0.85838","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-18348"},{"reference_url":"https://bugs.python.org/issue30458#msg347282","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.python.org/issue30458#msg347282"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18348","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18348"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20191107-0004/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20191107-0004/"},{"reference_url":"https://www.oracle.com/security-alerts/cpuoct2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1727276","reference_id":"1727276","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1727276"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-18348","reference_id":"CVE-2019-18348","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-18348"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4273","reference_id":"RHSA-2020:4273","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4273"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4285","reference_id":"RHSA-2020:4285","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4285"},{"reference_url":"https://usn.ubuntu.com/4333-1/","reference_id":"USN-4333-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4333-1/"},{"reference_url":"https://usn.ubuntu.com/4333-2/","reference_id":"USN-4333-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4333-2/"},{"reference_url":"https://usn.ubuntu.com/6891-1/","reference_id":"USN-6891-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6891-1/"}],"fixed_packages":[],"aliases":["CVE-2019-18348"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-57c6-hx7f-efc6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50773?format=json","vulnerability_id":"VCID-efdj-sb7s-p3fk","summary":"Multiple vulnerabilities have been found in Python, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14422.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14422.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14422","reference_id":"","reference_type":"","scores":[{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71994","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01172","scoring_system":"epss","scoring_elements":"0.78633","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01172","scoring_system":"epss","scoring_elements":"0.7864","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01172","scoring_system":"epss","scoring_elements":"0.78671","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01172","scoring_system":"epss","scoring_elements":"0.78651","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01172","scoring_system":"epss","scoring_elements":"0.78677","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01172","scoring_system":"epss","scoring_elements":"0.78683","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01172","scoring_system":"epss","scoring_elements":"0.78708","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01172","scoring_system":"epss","scoring_elements":"0.7869","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01172","scoring_system":"epss","scoring_elements":"0.78682","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01172","scoring_system":"epss","scoring_elements":"0.78711","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01172","scoring_system":"epss","scoring_elements":"0.78709","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01172","scoring_system":"epss","scoring_elements":"0.78705","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01172","scoring_system":"epss","scoring_elements":"0.78733","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01172","scoring_system":"epss","scoring_elements":"0.78741","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01172","scoring_system":"epss","scoring_elements":"0.78758","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14422"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14422","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14422"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1854926","reference_id":"1854926","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1854926"},{"reference_url":"https://security.gentoo.org/glsa/202008-01","reference_id":"GLSA-202008-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4285","reference_id":"RHSA-2020:4285","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4285"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4299","reference_id":"RHSA-2020:4299","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4299"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4433","reference_id":"RHSA-2020:4433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4641","reference_id":"RHSA-2020:4641","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4641"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5010","reference_id":"RHSA-2020:5010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5010"},{"reference_url":"https://usn.ubuntu.com/4428-1/","reference_id":"USN-4428-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4428-1/"},{"reference_url":"https://usn.ubuntu.com/6891-1/","reference_id":"USN-6891-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6891-1/"}],"fixed_packages":[],"aliases":["CVE-2020-14422"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-efdj-sb7s-p3fk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62534?format=json","vulnerability_id":"VCID-gkfp-ga1r-jkag","summary":"A vulnerability in Python could lead to a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8492.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8492.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-8492","reference_id":"","reference_type":"","scores":[{"value":"0.03512","scoring_system":"epss","scoring_elements":"0.87679","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03512","scoring_system":"epss","scoring_elements":"0.8764","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03512","scoring_system":"epss","scoring_elements":"0.87658","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03512","scoring_system":"epss","scoring_elements":"0.87664","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03512","scoring_system":"epss","scoring_elements":"0.87663","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03512","scoring_system":"epss","scoring_elements":"0.87598","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03512","scoring_system":"epss","scoring_elements":"0.87617","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03512","scoring_system":"epss","scoring_elements":"0.87624","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03512","scoring_system":"epss","scoring_elements":"0.87635","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03512","scoring_system":"epss","scoring_elements":"0.8763","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03512","scoring_system":"epss","scoring_elements":"0.87628","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03512","scoring_system":"epss","scoring_elements":"0.87642","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03512","scoring_system":"epss","scoring_elements":"0.87643","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0363","scoring_system":"epss","scoring_elements":"0.87785","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0363","scoring_system":"epss","scoring_elements":"0.87796","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0363","scoring_system":"epss","scoring_elements":"0.87774","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-8492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8492"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1809065","reference_id":"1809065","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1809065"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970099","reference_id":"970099","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970099"},{"reference_url":"https://security.gentoo.org/glsa/202005-09","reference_id":"GLSA-202005-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202005-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3888","reference_id":"RHSA-2020:3888","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3888"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4285","reference_id":"RHSA-2020:4285","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4285"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4433","reference_id":"RHSA-2020:4433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4641","reference_id":"RHSA-2020:4641","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4641"},{"reference_url":"https://usn.ubuntu.com/4333-1/","reference_id":"USN-4333-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4333-1/"},{"reference_url":"https://usn.ubuntu.com/4333-2/","reference_id":"USN-4333-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4333-2/"},{"reference_url":"https://usn.ubuntu.com/4754-3/","reference_id":"USN-4754-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4754-3/"},{"reference_url":"https://usn.ubuntu.com/5200-1/","reference_id":"USN-5200-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5200-1/"},{"reference_url":"https://usn.ubuntu.com/6891-1/","reference_id":"USN-6891-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6891-1/"}],"fixed_packages":[],"aliases":["CVE-2020-8492"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gkfp-ga1r-jkag"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50259?format=json","vulnerability_id":"VCID-gvgx-eq9r-d3d2","summary":"Multiple vulnerabilities have been found in Python, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26116.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26116.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-26116","reference_id":"","reference_type":"","scores":[{"value":"0.00903","scoring_system":"epss","scoring_elements":"0.75643","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00903","scoring_system":"epss","scoring_elements":"0.75645","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00903","scoring_system":"epss","scoring_elements":"0.75676","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00903","scoring_system":"epss","scoring_elements":"0.75655","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00903","scoring_system":"epss","scoring_elements":"0.7569","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00903","scoring_system":"epss","scoring_elements":"0.757","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00903","scoring_system":"epss","scoring_elements":"0.75725","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00903","scoring_system":"epss","scoring_elements":"0.75706","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00903","scoring_system":"epss","scoring_elements":"0.75699","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00903","scoring_system":"epss","scoring_elements":"0.75792","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01017","scoring_system":"epss","scoring_elements":"0.7722","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01017","scoring_system":"epss","scoring_elements":"0.77222","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01017","scoring_system":"epss","scoring_elements":"0.77213","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01017","scoring_system":"epss","scoring_elements":"0.77248","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01017","scoring_system":"epss","scoring_elements":"0.77254","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01017","scoring_system":"epss","scoring_elements":"0.77269","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-26116"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26116","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26116"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1883014","reference_id":"1883014","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1883014"},{"reference_url":"https://security.gentoo.org/glsa/202101-18","reference_id":"GLSA-202101-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202101-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4273","reference_id":"RHSA-2020:4273","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4273"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4285","reference_id":"RHSA-2020:4285","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4285"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4299","reference_id":"RHSA-2020:4299","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4299"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1633","reference_id":"RHSA-2021:1633","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1633"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1761","reference_id":"RHSA-2021:1761","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1761"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1879","reference_id":"RHSA-2021:1879","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1879"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3366","reference_id":"RHSA-2021:3366","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3366"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5235","reference_id":"RHSA-2022:5235","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5235"},{"reference_url":"https://usn.ubuntu.com/4581-1/","reference_id":"USN-4581-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4581-1/"},{"reference_url":"https://usn.ubuntu.com/4754-3/","reference_id":"USN-4754-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4754-3/"},{"reference_url":"https://usn.ubuntu.com/6891-1/","reference_id":"USN-6891-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6891-1/"}],"fixed_packages":[],"aliases":["CVE-2020-26116"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gvgx-eq9r-d3d2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50772?format=json","vulnerability_id":"VCID-tyk4-kazt-kydj","summary":"Multiple vulnerabilities have been found in Python, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20907.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20907.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-20907","reference_id":"","reference_type":"","scores":[{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55257","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55355","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.5538","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55358","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55408","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55419","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55397","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55379","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55414","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55418","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55336","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55357","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55329","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55279","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-20907"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20907","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20907"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1856481","reference_id":"1856481","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1856481"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970099","reference_id":"970099","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970099"},{"reference_url":"https://security.gentoo.org/glsa/202008-01","reference_id":"GLSA-202008-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4273","reference_id":"RHSA-2020:4273","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4273"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4285","reference_id":"RHSA-2020:4285","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4285"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4299","reference_id":"RHSA-2020:4299","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4299"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4433","reference_id":"RHSA-2020:4433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4641","reference_id":"RHSA-2020:4641","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4641"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4654","reference_id":"RHSA-2020:4654","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4654"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5009","reference_id":"RHSA-2020:5009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5010","reference_id":"RHSA-2020:5010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0528","reference_id":"RHSA-2021:0528","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0528"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0761","reference_id":"RHSA-2021:0761","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0761"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0881","reference_id":"RHSA-2021:0881","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0881"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0949","reference_id":"RHSA-2021:0949","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0949"},{"reference_url":"https://usn.ubuntu.com/4428-1/","reference_id":"USN-4428-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4428-1/"},{"reference_url":"https://usn.ubuntu.com/4754-3/","reference_id":"USN-4754-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4754-3/"},{"reference_url":"https://usn.ubuntu.com/6891-1/","reference_id":"USN-6891-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6891-1/"}],"fixed_packages":[],"aliases":["CVE-2019-20907"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tyk4-kazt-kydj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82060?format=json","vulnerability_id":"VCID-v84j-ugn9-w3c8","summary":"python: XSS vulnerability in the documentation XML-RPC server in server_title field","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16935.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16935.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-16935","reference_id":"","reference_type":"","scores":[{"value":"0.02256","scoring_system":"epss","scoring_elements":"0.84528","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02256","scoring_system":"epss","scoring_elements":"0.84595","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02256","scoring_system":"epss","scoring_elements":"0.84627","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02256","scoring_system":"epss","scoring_elements":"0.84654","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02256","scoring_system":"epss","scoring_elements":"0.84663","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02256","scoring_system":"epss","scoring_elements":"0.84666","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02256","scoring_system":"epss","scoring_elements":"0.84542","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02256","scoring_system":"epss","scoring_elements":"0.84564","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02256","scoring_system":"epss","scoring_elements":"0.84567","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02256","scoring_system":"epss","scoring_elements":"0.84589","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02256","scoring_system":"epss","scoring_elements":"0.84614","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02256","scoring_system":"epss","scoring_elements":"0.84609","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02256","scoring_system":"epss","scoring_elements":"0.84605","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02256","scoring_system":"epss","scoring_elements":"0.84625","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02924","scoring_system":"epss","scoring_elements":"0.86467","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-16935"},{"reference_url":"https://bugs.python.org/issue38243","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.python.org/issue38243"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16935","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16935"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/python/cpython/blob/35c0809158be7feae4c4f877a08b93baea2d8291/Lib/xmlrpc/server.py#L897","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/python/cpython/blob/35c0809158be7feae4c4f877a08b93baea2d8291/Lib/xmlrpc/server.py#L897"},{"reference_url":"https://github.com/python/cpython/blob/e007860b8b3609ce0bc62b1780efaa06241520bd/Lib/DocXMLRPCServer.py#L213","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/python/cpython/blob/e007860b8b3609ce0bc62b1780efaa06241520bd/Lib/DocXMLRPCServer.py#L213"},{"reference_url":"https://github.com/python/cpython/pull/16373","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/python/cpython/pull/16373"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEARDOTXCYPYELKBD2KWZ27GSPXDI3GQ/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEARDOTXCYPYELKBD2KWZ27GSPXDI3GQ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OYGESQSGIHDCIGOBVF7VXCMIE6YDWRYB/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OYGESQSGIHDCIGOBVF7VXCMIE6YDWRYB/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20191017-0004/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20191017-0004/"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027149","reference_id":"1027149","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027149"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1763229","reference_id":"1763229","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1763229"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16935","reference_id":"CVE-2019-16935","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16935"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1605","reference_id":"RHSA-2020:1605","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1605"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3888","reference_id":"RHSA-2020:3888","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3888"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3911","reference_id":"RHSA-2020:3911","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3911"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4285","reference_id":"RHSA-2020:4285","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4285"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4433","reference_id":"RHSA-2020:4433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0949","reference_id":"RHSA-2021:0949","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0949"},{"reference_url":"https://usn.ubuntu.com/4151-1/","reference_id":"USN-4151-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4151-1/"},{"reference_url":"https://usn.ubuntu.com/4151-2/","reference_id":"USN-4151-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4151-2/"},{"reference_url":"https://usn.ubuntu.com/6891-1/","reference_id":"USN-6891-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6891-1/"}],"fixed_packages":[],"aliases":["CVE-2019-16935"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v84j-ugn9-w3c8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/6138?format=json","vulnerability_id":"VCID-vrnn-n6vw-gygb","summary":"The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00005.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00010.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00010.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20916.json","reference_id":"","reference_type":"","scores":[{"value":"8.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20916.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-20916","reference_id":"","reference_type":"","scores":[{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70095","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70108","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70122","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70099","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70148","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70138","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70083","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70035","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70058","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70043","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70031","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70127","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70178","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70184","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70159","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-20916"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20916","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20916"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/advisories/GHSA-gpvv-69j7-gwj8","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-gpvv-69j7-gwj8"},{"reference_url":"https://github.com/gzpan123/pip/commit/a4c735b14a62f9cb864533808ac63936704f2ace","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/gzpan123/pip/commit/a4c735b14a62f9cb864533808ac63936704f2ace"},{"reference_url":"https://github.com/pypa/advisory-database/tree/main/vulns/pip/PYSEC-2020-173.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/pypa/advisory-database/tree/main/vulns/pip/PYSEC-2020-173.yaml"},{"reference_url":"https://github.com/pypa/pip","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/pypa/pip"},{"reference_url":"https://github.com/pypa/pip/compare/19.1.1...19.2","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/pypa/pip/compare/19.1.1...19.2"},{"reference_url":"https://github.com/pypa/pip/issues/6413","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/pypa/pip/issues/6413"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/09/msg00010.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.debian.org/debian-lts-announce/2020/09/msg00010.html"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20916","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20916"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2022.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2022.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1868135","reference_id":"1868135","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1868135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4273","reference_id":"RHSA-2020:4273","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4273"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4285","reference_id":"RHSA-2020:4285","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4285"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4432","reference_id":"RHSA-2020:4432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4654","reference_id":"RHSA-2020:4654","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4654"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5234","reference_id":"RHSA-2022:5234","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5234"},{"reference_url":"https://usn.ubuntu.com/4601-1/","reference_id":"USN-4601-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4601-1/"}],"fixed_packages":[],"aliases":["CVE-2019-20916","GHSA-gpvv-69j7-gwj8","PYSEC-2020-173"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vrnn-n6vw-gygb"}],"fixing_vulnerabilities":[],"risk_score":"4.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-python36-python@3.6.12-1%3Farch=el6"}