Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@3.10.0-1160?arch=el7
Typerpm
Namespaceredhat
Namekernel
Version3.10.0-1160
Qualifiers
arch el7
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-17r6-64k2-53bp
vulnerability_id VCID-17r6-64k2-53bp
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20836.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20836.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20836
reference_id
reference_type
scores
0
value 0.0383
scoring_system epss
scoring_elements 0.88191
published_at 2026-04-29T12:55:00Z
1
value 0.0383
scoring_system epss
scoring_elements 0.88171
published_at 2026-04-16T12:55:00Z
2
value 0.0383
scoring_system epss
scoring_elements 0.88169
published_at 2026-04-21T12:55:00Z
3
value 0.0383
scoring_system epss
scoring_elements 0.88187
published_at 2026-04-24T12:55:00Z
4
value 0.0383
scoring_system epss
scoring_elements 0.88192
published_at 2026-04-26T12:55:00Z
5
value 0.0383
scoring_system epss
scoring_elements 0.88128
published_at 2026-04-07T12:55:00Z
6
value 0.0383
scoring_system epss
scoring_elements 0.88147
published_at 2026-04-08T12:55:00Z
7
value 0.0383
scoring_system epss
scoring_elements 0.88153
published_at 2026-04-09T12:55:00Z
8
value 0.0383
scoring_system epss
scoring_elements 0.88163
published_at 2026-04-11T12:55:00Z
9
value 0.0383
scoring_system epss
scoring_elements 0.88156
published_at 2026-04-12T12:55:00Z
10
value 0.0383
scoring_system epss
scoring_elements 0.88157
published_at 2026-04-13T12:55:00Z
11
value 0.0389
scoring_system epss
scoring_elements 0.88211
published_at 2026-04-02T12:55:00Z
12
value 0.0389
scoring_system epss
scoring_elements 0.88226
published_at 2026-04-04T12:55:00Z
13
value 0.0389
scoring_system epss
scoring_elements 0.88202
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20836
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8553
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18509
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20856
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5995
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10639
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10639
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12817
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12984
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13233
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13233
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15239
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15239
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1999
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3882
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3900
22
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1707796
reference_id 1707796
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1707796
24
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
25
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
26
reference_url https://access.redhat.com/errata/RHSA-2020:5656
reference_id RHSA-2020:5656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5656
27
reference_url https://access.redhat.com/errata/RHSA-2021:0019
reference_id RHSA-2021:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0019
28
reference_url https://usn.ubuntu.com/4076-1/
reference_id USN-4076-1
reference_type
scores
url https://usn.ubuntu.com/4076-1/
fixed_packages
aliases CVE-2018-20836
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-17r6-64k2-53bp
1
url VCID-1fx4-dd5f-jfaa
vulnerability_id VCID-1fx4-dd5f-jfaa
summary kernel: null pointer dereference in drivers/media/usb/zr364xx/zr364xx.c driver
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15217.json
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15217.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-15217
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19766
published_at 2026-04-01T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19912
published_at 2026-04-02T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19967
published_at 2026-04-04T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19694
published_at 2026-04-07T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19774
published_at 2026-04-08T12:55:00Z
5
value 0.00063
scoring_system epss
scoring_elements 0.19825
published_at 2026-04-09T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.19828
published_at 2026-04-11T12:55:00Z
7
value 0.00063
scoring_system epss
scoring_elements 0.19783
published_at 2026-04-12T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.19725
published_at 2026-04-13T12:55:00Z
9
value 0.00063
scoring_system epss
scoring_elements 0.19701
published_at 2026-04-16T12:55:00Z
10
value 0.00063
scoring_system epss
scoring_elements 0.19702
published_at 2026-04-18T12:55:00Z
11
value 0.00063
scoring_system epss
scoring_elements 0.19716
published_at 2026-04-21T12:55:00Z
12
value 0.00063
scoring_system epss
scoring_elements 0.1961
published_at 2026-04-24T12:55:00Z
13
value 0.00063
scoring_system epss
scoring_elements 0.19596
published_at 2026-04-26T12:55:00Z
14
value 0.00063
scoring_system epss
scoring_elements 0.1956
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-15217
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15217
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1745528
reference_id 1745528
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1745528
5
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
6
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
7
reference_url https://usn.ubuntu.com/4147-1/
reference_id USN-4147-1
reference_type
scores
url https://usn.ubuntu.com/4147-1/
8
reference_url https://usn.ubuntu.com/4286-1/
reference_id USN-4286-1
reference_type
scores
url https://usn.ubuntu.com/4286-1/
9
reference_url https://usn.ubuntu.com/4286-2/
reference_id USN-4286-2
reference_type
scores
url https://usn.ubuntu.com/4286-2/
10
reference_url https://usn.ubuntu.com/4302-1/
reference_id USN-4302-1
reference_type
scores
url https://usn.ubuntu.com/4302-1/
fixed_packages
aliases CVE-2019-15217
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1fx4-dd5f-jfaa
2
url VCID-1x5s-sp31-63f8
vulnerability_id VCID-1x5s-sp31-63f8
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9383.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9383.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9383
reference_id
reference_type
scores
0
value 0.00095
scoring_system epss
scoring_elements 0.26476
published_at 2026-04-09T12:55:00Z
1
value 0.00095
scoring_system epss
scoring_elements 0.2619
published_at 2026-04-29T12:55:00Z
2
value 0.00095
scoring_system epss
scoring_elements 0.26248
published_at 2026-04-24T12:55:00Z
3
value 0.00095
scoring_system epss
scoring_elements 0.26241
published_at 2026-04-26T12:55:00Z
4
value 0.00095
scoring_system epss
scoring_elements 0.26528
published_at 2026-04-02T12:55:00Z
5
value 0.00095
scoring_system epss
scoring_elements 0.26573
published_at 2026-04-04T12:55:00Z
6
value 0.00095
scoring_system epss
scoring_elements 0.26357
published_at 2026-04-07T12:55:00Z
7
value 0.00095
scoring_system epss
scoring_elements 0.26426
published_at 2026-04-08T12:55:00Z
8
value 0.00095
scoring_system epss
scoring_elements 0.26483
published_at 2026-04-11T12:55:00Z
9
value 0.00095
scoring_system epss
scoring_elements 0.26437
published_at 2026-04-12T12:55:00Z
10
value 0.00095
scoring_system epss
scoring_elements 0.26378
published_at 2026-04-13T12:55:00Z
11
value 0.00095
scoring_system epss
scoring_elements 0.26385
published_at 2026-04-16T12:55:00Z
12
value 0.00095
scoring_system epss
scoring_elements 0.26356
published_at 2026-04-18T12:55:00Z
13
value 0.00095
scoring_system epss
scoring_elements 0.26318
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9383
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
33
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1810685
reference_id 1810685
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1810685
35
reference_url https://security.archlinux.org/ASA-202003-6
reference_id ASA-202003-6
reference_type
scores
url https://security.archlinux.org/ASA-202003-6
36
reference_url https://security.archlinux.org/AVG-1108
reference_id AVG-1108
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1108
37
reference_url https://access.redhat.com/errata/RHSA-2020:2104
reference_id RHSA-2020:2104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2104
38
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
39
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
40
reference_url https://usn.ubuntu.com/4342-1/
reference_id USN-4342-1
reference_type
scores
url https://usn.ubuntu.com/4342-1/
41
reference_url https://usn.ubuntu.com/4344-1/
reference_id USN-4344-1
reference_type
scores
url https://usn.ubuntu.com/4344-1/
42
reference_url https://usn.ubuntu.com/4345-1/
reference_id USN-4345-1
reference_type
scores
url https://usn.ubuntu.com/4345-1/
43
reference_url https://usn.ubuntu.com/4346-1/
reference_id USN-4346-1
reference_type
scores
url https://usn.ubuntu.com/4346-1/
fixed_packages
aliases CVE-2020-9383
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1x5s-sp31-63f8
3
url VCID-2cup-r3jw-77fy
vulnerability_id VCID-2cup-r3jw-77fy
summary kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20054.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20054.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-20054
reference_id
reference_type
scores
0
value 0.00113
scoring_system epss
scoring_elements 0.29909
published_at 2026-04-01T12:55:00Z
1
value 0.00113
scoring_system epss
scoring_elements 0.29953
published_at 2026-04-02T12:55:00Z
2
value 0.00113
scoring_system epss
scoring_elements 0.30001
published_at 2026-04-04T12:55:00Z
3
value 0.00113
scoring_system epss
scoring_elements 0.29814
published_at 2026-04-07T12:55:00Z
4
value 0.00113
scoring_system epss
scoring_elements 0.29877
published_at 2026-04-08T12:55:00Z
5
value 0.00113
scoring_system epss
scoring_elements 0.29912
published_at 2026-04-09T12:55:00Z
6
value 0.00113
scoring_system epss
scoring_elements 0.29918
published_at 2026-04-11T12:55:00Z
7
value 0.00113
scoring_system epss
scoring_elements 0.29872
published_at 2026-04-12T12:55:00Z
8
value 0.00113
scoring_system epss
scoring_elements 0.29823
published_at 2026-04-13T12:55:00Z
9
value 0.00113
scoring_system epss
scoring_elements 0.29841
published_at 2026-04-16T12:55:00Z
10
value 0.00113
scoring_system epss
scoring_elements 0.29821
published_at 2026-04-18T12:55:00Z
11
value 0.00113
scoring_system epss
scoring_elements 0.29774
published_at 2026-04-21T12:55:00Z
12
value 0.00113
scoring_system epss
scoring_elements 0.29697
published_at 2026-04-24T12:55:00Z
13
value 0.00113
scoring_system epss
scoring_elements 0.29583
published_at 2026-04-26T12:55:00Z
14
value 0.00113
scoring_system epss
scoring_elements 0.29521
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-20054
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20054
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20054
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1790063
reference_id 1790063
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1790063
5
reference_url https://access.redhat.com/errata/RHSA-2020:1493
reference_id RHSA-2020:1493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1493
6
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
7
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
8
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
9
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
fixed_packages
aliases CVE-2019-20054
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2cup-r3jw-77fy
4
url VCID-2ed6-g4ep-yfh1
vulnerability_id VCID-2ed6-g4ep-yfh1
summary kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19447.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19447.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19447
reference_id
reference_type
scores
0
value 0.01689
scoring_system epss
scoring_elements 0.82153
published_at 2026-04-01T12:55:00Z
1
value 0.01689
scoring_system epss
scoring_elements 0.82166
published_at 2026-04-02T12:55:00Z
2
value 0.01689
scoring_system epss
scoring_elements 0.82187
published_at 2026-04-04T12:55:00Z
3
value 0.01689
scoring_system epss
scoring_elements 0.82183
published_at 2026-04-07T12:55:00Z
4
value 0.01689
scoring_system epss
scoring_elements 0.82209
published_at 2026-04-08T12:55:00Z
5
value 0.01689
scoring_system epss
scoring_elements 0.82217
published_at 2026-04-09T12:55:00Z
6
value 0.01689
scoring_system epss
scoring_elements 0.82236
published_at 2026-04-11T12:55:00Z
7
value 0.01689
scoring_system epss
scoring_elements 0.82228
published_at 2026-04-12T12:55:00Z
8
value 0.01689
scoring_system epss
scoring_elements 0.82223
published_at 2026-04-13T12:55:00Z
9
value 0.01689
scoring_system epss
scoring_elements 0.82259
published_at 2026-04-16T12:55:00Z
10
value 0.01689
scoring_system epss
scoring_elements 0.8226
published_at 2026-04-21T12:55:00Z
11
value 0.01689
scoring_system epss
scoring_elements 0.82282
published_at 2026-04-24T12:55:00Z
12
value 0.01689
scoring_system epss
scoring_elements 0.82293
published_at 2026-04-26T12:55:00Z
13
value 0.01689
scoring_system epss
scoring_elements 0.82298
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19447
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19447
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19447
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1781679
reference_id 1781679
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1781679
5
reference_url https://access.redhat.com/errata/RHSA-2020:2104
reference_id RHSA-2020:2104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2104
6
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
7
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
8
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
9
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
10
reference_url https://access.redhat.com/errata/RHSA-2020:5206
reference_id RHSA-2020:5206
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5206
11
reference_url https://access.redhat.com/errata/RHSA-2020:5430
reference_id RHSA-2020:5430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5430
12
reference_url https://access.redhat.com/errata/RHSA-2020:5656
reference_id RHSA-2020:5656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5656
fixed_packages
aliases CVE-2019-19447
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2ed6-g4ep-yfh1
5
url VCID-2w4w-t45z-v3bf
vulnerability_id VCID-2w4w-t45z-v3bf
summary kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19524.json
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19524.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19524
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.12713
published_at 2026-04-01T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12819
published_at 2026-04-02T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.12868
published_at 2026-04-04T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12671
published_at 2026-04-07T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12751
published_at 2026-04-08T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.12803
published_at 2026-04-09T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.12771
published_at 2026-04-11T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.12734
published_at 2026-04-12T12:55:00Z
8
value 0.00042
scoring_system epss
scoring_elements 0.12687
published_at 2026-04-13T12:55:00Z
9
value 0.00042
scoring_system epss
scoring_elements 0.12592
published_at 2026-04-16T12:55:00Z
10
value 0.00042
scoring_system epss
scoring_elements 0.12603
published_at 2026-04-18T12:55:00Z
11
value 0.00042
scoring_system epss
scoring_elements 0.12715
published_at 2026-04-21T12:55:00Z
12
value 0.00042
scoring_system epss
scoring_elements 0.12727
published_at 2026-04-24T12:55:00Z
13
value 0.00042
scoring_system epss
scoring_elements 0.1269
published_at 2026-04-26T12:55:00Z
14
value 0.00042
scoring_system epss
scoring_elements 0.12576
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19524
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19524
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1783459
reference_id 1783459
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1783459
5
reference_url https://access.redhat.com/errata/RHSA-2020:2104
reference_id RHSA-2020:2104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2104
6
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
7
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
8
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
9
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
10
reference_url https://usn.ubuntu.com/4225-1/
reference_id USN-4225-1
reference_type
scores
url https://usn.ubuntu.com/4225-1/
11
reference_url https://usn.ubuntu.com/4225-2/
reference_id USN-4225-2
reference_type
scores
url https://usn.ubuntu.com/4225-2/
12
reference_url https://usn.ubuntu.com/4226-1/
reference_id USN-4226-1
reference_type
scores
url https://usn.ubuntu.com/4226-1/
13
reference_url https://usn.ubuntu.com/4227-1/
reference_id USN-4227-1
reference_type
scores
url https://usn.ubuntu.com/4227-1/
14
reference_url https://usn.ubuntu.com/4227-2/
reference_id USN-4227-2
reference_type
scores
url https://usn.ubuntu.com/4227-2/
15
reference_url https://usn.ubuntu.com/4228-1/
reference_id USN-4228-1
reference_type
scores
url https://usn.ubuntu.com/4228-1/
16
reference_url https://usn.ubuntu.com/4228-2/
reference_id USN-4228-2
reference_type
scores
url https://usn.ubuntu.com/4228-2/
fixed_packages
aliases CVE-2019-19524
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2w4w-t45z-v3bf
6
url VCID-32gn-bznj-xfbe
vulnerability_id VCID-32gn-bznj-xfbe
summary kernel: Memory leak in drivers/scsi/libsas/sas_expander.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15807.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15807.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-15807
reference_id
reference_type
scores
0
value 0.00088
scoring_system epss
scoring_elements 0.25236
published_at 2026-04-01T12:55:00Z
1
value 0.00088
scoring_system epss
scoring_elements 0.25021
published_at 2026-04-29T12:55:00Z
2
value 0.00088
scoring_system epss
scoring_elements 0.25136
published_at 2026-04-21T12:55:00Z
3
value 0.00088
scoring_system epss
scoring_elements 0.25078
published_at 2026-04-24T12:55:00Z
4
value 0.00088
scoring_system epss
scoring_elements 0.25065
published_at 2026-04-26T12:55:00Z
5
value 0.00088
scoring_system epss
scoring_elements 0.25317
published_at 2026-04-02T12:55:00Z
6
value 0.00088
scoring_system epss
scoring_elements 0.25358
published_at 2026-04-04T12:55:00Z
7
value 0.00088
scoring_system epss
scoring_elements 0.25135
published_at 2026-04-07T12:55:00Z
8
value 0.00088
scoring_system epss
scoring_elements 0.25204
published_at 2026-04-08T12:55:00Z
9
value 0.00088
scoring_system epss
scoring_elements 0.25249
published_at 2026-04-09T12:55:00Z
10
value 0.00088
scoring_system epss
scoring_elements 0.25264
published_at 2026-04-11T12:55:00Z
11
value 0.00088
scoring_system epss
scoring_elements 0.25222
published_at 2026-04-12T12:55:00Z
12
value 0.00088
scoring_system epss
scoring_elements 0.25169
published_at 2026-04-13T12:55:00Z
13
value 0.00088
scoring_system epss
scoring_elements 0.25178
published_at 2026-04-16T12:55:00Z
14
value 0.00088
scoring_system epss
scoring_elements 0.25168
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-15807
2
reference_url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.13
reference_id
reference_type
scores
url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.13
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15807
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3b0541791453fbe7f42867e310e0c9eb6295364d
reference_id
reference_type
scores
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3b0541791453fbe7f42867e310e0c9eb6295364d
6
reference_url https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html
7
reference_url https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html
8
reference_url https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
9
reference_url https://security.netapp.com/advisory/ntap-20191004-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20191004-0001/
10
reference_url https://support.f5.com/csp/article/K52136304?utm_source=f5support&amp%3Butm_medium=RSS
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K52136304?utm_source=f5support&amp%3Butm_medium=RSS
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1747216
reference_id 1747216
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1747216
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-15807
reference_id CVE-2019-15807
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
1
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-15807
17
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
18
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
fixed_packages
aliases CVE-2019-15807
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-32gn-bznj-xfbe
7
url VCID-4ax3-5d9h-mqeu
vulnerability_id VCID-4ax3-5d9h-mqeu
summary kernel: Memory leak in sit_init_net() in net/ipv6/sit.c
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16994.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16994.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-16994
reference_id
reference_type
scores
0
value 0.00076
scoring_system epss
scoring_elements 0.2273
published_at 2026-04-01T12:55:00Z
1
value 0.00076
scoring_system epss
scoring_elements 0.22588
published_at 2026-04-29T12:55:00Z
2
value 0.00076
scoring_system epss
scoring_elements 0.22762
published_at 2026-04-21T12:55:00Z
3
value 0.00076
scoring_system epss
scoring_elements 0.226
published_at 2026-04-24T12:55:00Z
4
value 0.00076
scoring_system epss
scoring_elements 0.22592
published_at 2026-04-26T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.22903
published_at 2026-04-02T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.22947
published_at 2026-04-04T12:55:00Z
7
value 0.00076
scoring_system epss
scoring_elements 0.2274
published_at 2026-04-07T12:55:00Z
8
value 0.00076
scoring_system epss
scoring_elements 0.22815
published_at 2026-04-08T12:55:00Z
9
value 0.00076
scoring_system epss
scoring_elements 0.22867
published_at 2026-04-09T12:55:00Z
10
value 0.00076
scoring_system epss
scoring_elements 0.22888
published_at 2026-04-11T12:55:00Z
11
value 0.00076
scoring_system epss
scoring_elements 0.22851
published_at 2026-04-12T12:55:00Z
12
value 0.00076
scoring_system epss
scoring_elements 0.22795
published_at 2026-04-13T12:55:00Z
13
value 0.00076
scoring_system epss
scoring_elements 0.22809
published_at 2026-04-16T12:55:00Z
14
value 0.00076
scoring_system epss
scoring_elements 0.22803
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-16994
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16994
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/torvalds/linux/commit/07f12b26e21ab359261bf75cfcb424fdc7daeb6d
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/07f12b26e21ab359261bf75cfcb424fdc7daeb6d
6
reference_url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=07f12b26e21ab359261bf75cfcb424fdc7daeb6d
reference_id
reference_type
scores
url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=07f12b26e21ab359261bf75cfcb424fdc7daeb6d
7
reference_url https://security.netapp.com/advisory/ntap-20191031-0005/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20191031-0005/
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1759681
reference_id 1759681
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1759681
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-16994
reference_id CVE-2019-16994
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
1
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-16994
13
reference_url https://access.redhat.com/errata/RHSA-2019:3309
reference_id RHSA-2019:3309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3309
14
reference_url https://access.redhat.com/errata/RHSA-2019:3517
reference_id RHSA-2019:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3517
15
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
16
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
fixed_packages
aliases CVE-2019-16994
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4ax3-5d9h-mqeu
8
url VCID-58rf-uzww-3fg4
vulnerability_id VCID-58rf-uzww-3fg4
summary kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19046.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19046.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19046
reference_id
reference_type
scores
0
value 0.00833
scoring_system epss
scoring_elements 0.74661
published_at 2026-04-29T12:55:00Z
1
value 0.00833
scoring_system epss
scoring_elements 0.74618
published_at 2026-04-21T12:55:00Z
2
value 0.00833
scoring_system epss
scoring_elements 0.74653
published_at 2026-04-24T12:55:00Z
3
value 0.00833
scoring_system epss
scoring_elements 0.74659
published_at 2026-04-26T12:55:00Z
4
value 0.01256
scoring_system epss
scoring_elements 0.7934
published_at 2026-04-02T12:55:00Z
5
value 0.01256
scoring_system epss
scoring_elements 0.79364
published_at 2026-04-04T12:55:00Z
6
value 0.01256
scoring_system epss
scoring_elements 0.7935
published_at 2026-04-07T12:55:00Z
7
value 0.01256
scoring_system epss
scoring_elements 0.79377
published_at 2026-04-08T12:55:00Z
8
value 0.01256
scoring_system epss
scoring_elements 0.79386
published_at 2026-04-09T12:55:00Z
9
value 0.01256
scoring_system epss
scoring_elements 0.79409
published_at 2026-04-11T12:55:00Z
10
value 0.01256
scoring_system epss
scoring_elements 0.79393
published_at 2026-04-12T12:55:00Z
11
value 0.01256
scoring_system epss
scoring_elements 0.79382
published_at 2026-04-13T12:55:00Z
12
value 0.01256
scoring_system epss
scoring_elements 0.79414
published_at 2026-04-16T12:55:00Z
13
value 0.01256
scoring_system epss
scoring_elements 0.79412
published_at 2026-04-18T12:55:00Z
14
value 0.01256
scoring_system epss
scoring_elements 0.79334
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19046
3
reference_url https://bugzilla.suse.com/show_bug.cgi?id=1157304
reference_id
reference_type
scores
url https://bugzilla.suse.com/show_bug.cgi?id=1157304
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19046
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/torvalds/linux/commit/4aa7afb0ee20a97fbf0c5bab3df028d5fb85fdab
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/4aa7afb0ee20a97fbf0c5bab3df028d5fb85fdab
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1774988
reference_id 1774988
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1774988
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-19046
reference_id CVE-2019-19046
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-19046
15
reference_url https://access.redhat.com/errata/RHSA-2020:3545
reference_id RHSA-2020:3545
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3545
16
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
17
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
18
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
19
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
20
reference_url https://access.redhat.com/errata/RHSA-2020:5206
reference_id RHSA-2020:5206
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5206
21
reference_url https://access.redhat.com/errata/RHSA-2020:5656
reference_id RHSA-2020:5656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5656
22
reference_url https://usn.ubuntu.com/4302-1/
reference_id USN-4302-1
reference_type
scores
url https://usn.ubuntu.com/4302-1/
23
reference_url https://usn.ubuntu.com/4319-1/
reference_id USN-4319-1
reference_type
scores
url https://usn.ubuntu.com/4319-1/
24
reference_url https://usn.ubuntu.com/4325-1/
reference_id USN-4325-1
reference_type
scores
url https://usn.ubuntu.com/4325-1/
fixed_packages
aliases CVE-2019-19046
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-58rf-uzww-3fg4
9
url VCID-5nyh-n8he-z7ev
vulnerability_id VCID-5nyh-n8he-z7ev
summary kernel: possible to send arbitrary signals to a privileged (suidroot) parent process
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12826.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12826.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12826
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.20926
published_at 2026-04-01T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.21077
published_at 2026-04-02T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.2113
published_at 2026-04-04T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.20844
published_at 2026-04-07T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.20924
published_at 2026-04-08T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.20985
published_at 2026-04-09T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.21002
published_at 2026-04-11T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.20958
published_at 2026-04-12T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.20904
published_at 2026-04-13T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.20895
published_at 2026-04-16T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.20896
published_at 2026-04-18T12:55:00Z
11
value 0.00068
scoring_system epss
scoring_elements 0.20877
published_at 2026-04-21T12:55:00Z
12
value 0.00068
scoring_system epss
scoring_elements 0.20748
published_at 2026-04-24T12:55:00Z
13
value 0.00068
scoring_system epss
scoring_elements 0.20744
published_at 2026-04-26T12:55:00Z
14
value 0.00068
scoring_system epss
scoring_elements 0.2071
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12826
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12826
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1822077
reference_id 1822077
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1822077
5
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
6
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
7
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
8
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
9
reference_url https://usn.ubuntu.com/4367-1/
reference_id USN-4367-1
reference_type
scores
url https://usn.ubuntu.com/4367-1/
10
reference_url https://usn.ubuntu.com/4369-1/
reference_id USN-4369-1
reference_type
scores
url https://usn.ubuntu.com/4369-1/
11
reference_url https://usn.ubuntu.com/4391-1/
reference_id USN-4391-1
reference_type
scores
url https://usn.ubuntu.com/4391-1/
fixed_packages
aliases CVE-2020-12826
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5nyh-n8he-z7ev
10
url VCID-5zsw-fkhr-3ffj
vulnerability_id VCID-5zsw-fkhr-3ffj
summary kernel: out of bounds write in function i2c_smbus_xfer_emulated in drivers/i2c/i2c-core-smbus.c
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18551.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18551.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-18551
reference_id
reference_type
scores
0
value 0.00132
scoring_system epss
scoring_elements 0.32749
published_at 2026-04-01T12:55:00Z
1
value 0.00132
scoring_system epss
scoring_elements 0.32385
published_at 2026-04-29T12:55:00Z
2
value 0.00132
scoring_system epss
scoring_elements 0.32734
published_at 2026-04-21T12:55:00Z
3
value 0.00132
scoring_system epss
scoring_elements 0.32583
published_at 2026-04-24T12:55:00Z
4
value 0.00132
scoring_system epss
scoring_elements 0.32467
published_at 2026-04-26T12:55:00Z
5
value 0.00132
scoring_system epss
scoring_elements 0.3288
published_at 2026-04-02T12:55:00Z
6
value 0.00132
scoring_system epss
scoring_elements 0.32915
published_at 2026-04-04T12:55:00Z
7
value 0.00132
scoring_system epss
scoring_elements 0.32737
published_at 2026-04-07T12:55:00Z
8
value 0.00132
scoring_system epss
scoring_elements 0.32784
published_at 2026-04-08T12:55:00Z
9
value 0.00132
scoring_system epss
scoring_elements 0.32811
published_at 2026-04-09T12:55:00Z
10
value 0.00132
scoring_system epss
scoring_elements 0.32812
published_at 2026-04-11T12:55:00Z
11
value 0.00132
scoring_system epss
scoring_elements 0.32775
published_at 2026-04-12T12:55:00Z
12
value 0.00132
scoring_system epss
scoring_elements 0.32748
published_at 2026-04-13T12:55:00Z
13
value 0.00132
scoring_system epss
scoring_elements 0.32789
published_at 2026-04-16T12:55:00Z
14
value 0.00132
scoring_system epss
scoring_elements 0.32765
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-18551
4
reference_url https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.15
reference_id
reference_type
scores
url https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.15
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18551
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18551
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89c6efa61f5709327ecfa24bff18e57a4e80c7fa
reference_id
reference_type
scores
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89c6efa61f5709327ecfa24bff18e57a4e80c7fa
8
reference_url https://support.f5.com/csp/article/K48073202?utm_source=f5support&amp%3Butm_medium=RSS
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K48073202?utm_source=f5support&amp%3Butm_medium=RSS
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1757368
reference_id 1757368
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1757368
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-18551
reference_id CVE-2017-18551
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-18551
14
reference_url https://access.redhat.com/errata/RHSA-2020:2104
reference_id RHSA-2020:2104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2104
15
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
16
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
17
reference_url https://access.redhat.com/errata/RHSA-2020:5206
reference_id RHSA-2020:5206
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5206
18
reference_url https://access.redhat.com/errata/RHSA-2020:5430
reference_id RHSA-2020:5430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5430
19
reference_url https://access.redhat.com/errata/RHSA-2020:5656
reference_id RHSA-2020:5656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5656
fixed_packages
aliases CVE-2017-18551
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5zsw-fkhr-3ffj
11
url VCID-6gex-x71e-53ec
vulnerability_id VCID-6gex-x71e-53ec
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10732.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10732.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-10732
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.11675
published_at 2026-04-01T12:55:00Z
1
value 0.00039
scoring_system epss
scoring_elements 0.11798
published_at 2026-04-02T12:55:00Z
2
value 0.00039
scoring_system epss
scoring_elements 0.11842
published_at 2026-04-04T12:55:00Z
3
value 0.00039
scoring_system epss
scoring_elements 0.11631
published_at 2026-04-07T12:55:00Z
4
value 0.00039
scoring_system epss
scoring_elements 0.11715
published_at 2026-04-08T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.1177
published_at 2026-04-09T12:55:00Z
6
value 0.00039
scoring_system epss
scoring_elements 0.11781
published_at 2026-04-11T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.11742
published_at 2026-04-12T12:55:00Z
8
value 0.00039
scoring_system epss
scoring_elements 0.11717
published_at 2026-04-13T12:55:00Z
9
value 0.00039
scoring_system epss
scoring_elements 0.11579
published_at 2026-04-16T12:55:00Z
10
value 0.00039
scoring_system epss
scoring_elements 0.11581
published_at 2026-04-18T12:55:00Z
11
value 0.00039
scoring_system epss
scoring_elements 0.11704
published_at 2026-04-21T12:55:00Z
12
value 0.00039
scoring_system epss
scoring_elements 0.11662
published_at 2026-04-24T12:55:00Z
13
value 0.00039
scoring_system epss
scoring_elements 0.11623
published_at 2026-04-26T12:55:00Z
14
value 0.00039
scoring_system epss
scoring_elements 0.11549
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-10732
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3016
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12768
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
35
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1831399
reference_id 1831399
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1831399
37
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
38
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
39
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
40
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
41
reference_url https://usn.ubuntu.com/4411-1/
reference_id USN-4411-1
reference_type
scores
url https://usn.ubuntu.com/4411-1/
42
reference_url https://usn.ubuntu.com/4427-1/
reference_id USN-4427-1
reference_type
scores
url https://usn.ubuntu.com/4427-1/
43
reference_url https://usn.ubuntu.com/4439-1/
reference_id USN-4439-1
reference_type
scores
url https://usn.ubuntu.com/4439-1/
44
reference_url https://usn.ubuntu.com/4440-1/
reference_id USN-4440-1
reference_type
scores
url https://usn.ubuntu.com/4440-1/
45
reference_url https://usn.ubuntu.com/4485-1/
reference_id USN-4485-1
reference_type
scores
url https://usn.ubuntu.com/4485-1/
fixed_packages
aliases CVE-2020-10732
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6gex-x71e-53ec
12
url VCID-6uxt-t18n-wyad
vulnerability_id VCID-6uxt-t18n-wyad
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10942.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10942.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-10942
reference_id
reference_type
scores
0
value 0.00073
scoring_system epss
scoring_elements 0.22207
published_at 2026-04-01T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.22035
published_at 2026-04-29T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.22213
published_at 2026-04-21T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.22062
published_at 2026-04-24T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.22049
published_at 2026-04-26T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22374
published_at 2026-04-02T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.22419
published_at 2026-04-04T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.22204
published_at 2026-04-07T12:55:00Z
8
value 0.00073
scoring_system epss
scoring_elements 0.22287
published_at 2026-04-08T12:55:00Z
9
value 0.00073
scoring_system epss
scoring_elements 0.22342
published_at 2026-04-09T12:55:00Z
10
value 0.00073
scoring_system epss
scoring_elements 0.22362
published_at 2026-04-11T12:55:00Z
11
value 0.00073
scoring_system epss
scoring_elements 0.22321
published_at 2026-04-12T12:55:00Z
12
value 0.00073
scoring_system epss
scoring_elements 0.22262
published_at 2026-04-13T12:55:00Z
13
value 0.00073
scoring_system epss
scoring_elements 0.22266
published_at 2026-04-16T12:55:00Z
14
value 0.00073
scoring_system epss
scoring_elements 0.2226
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-10942
3
reference_url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.5.8
reference_id
reference_type
scores
url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.5.8
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11884
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
36
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
37
reference_url https://git.kernel.org/linus/42d84c8490f9f0931786f1623191fcab397c3d64
reference_id
reference_type
scores
url https://git.kernel.org/linus/42d84c8490f9f0931786f1623191fcab397c3d64
38
reference_url https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
39
reference_url https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
40
reference_url https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
41
reference_url https://lkml.org/lkml/2020/2/15/125
reference_id
reference_type
scores
url https://lkml.org/lkml/2020/2/15/125
42
reference_url https://security.netapp.com/advisory/ntap-20200403-0003/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20200403-0003/
43
reference_url https://www.debian.org/security/2020/dsa-4667
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4667
44
reference_url https://www.debian.org/security/2020/dsa-4698
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4698
45
reference_url http://www.openwall.com/lists/oss-security/2020/04/15/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2020/04/15/4
46
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1817718
reference_id 1817718
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1817718
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-10942
reference_id CVE-2020-10942
reference_type
scores
0
value 5.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:P/A:C
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-10942
57
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
58
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
59
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
60
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
61
reference_url https://usn.ubuntu.com/4342-1/
reference_id USN-4342-1
reference_type
scores
url https://usn.ubuntu.com/4342-1/
62
reference_url https://usn.ubuntu.com/4344-1/
reference_id USN-4344-1
reference_type
scores
url https://usn.ubuntu.com/4344-1/
63
reference_url https://usn.ubuntu.com/4345-1/
reference_id USN-4345-1
reference_type
scores
url https://usn.ubuntu.com/4345-1/
64
reference_url https://usn.ubuntu.com/4364-1/
reference_id USN-4364-1
reference_type
scores
url https://usn.ubuntu.com/4364-1/
fixed_packages
aliases CVE-2020-10942
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6uxt-t18n-wyad
13
url VCID-7v1s-4cxs-zyeg
vulnerability_id VCID-7v1s-4cxs-zyeg
summary kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16233.json
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16233.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-16233
reference_id
reference_type
scores
0
value 0.00091
scoring_system epss
scoring_elements 0.2579
published_at 2026-04-01T12:55:00Z
1
value 0.00091
scoring_system epss
scoring_elements 0.25539
published_at 2026-04-29T12:55:00Z
2
value 0.00091
scoring_system epss
scoring_elements 0.25654
published_at 2026-04-21T12:55:00Z
3
value 0.00091
scoring_system epss
scoring_elements 0.25598
published_at 2026-04-24T12:55:00Z
4
value 0.00091
scoring_system epss
scoring_elements 0.25589
published_at 2026-04-26T12:55:00Z
5
value 0.00091
scoring_system epss
scoring_elements 0.2585
published_at 2026-04-02T12:55:00Z
6
value 0.00091
scoring_system epss
scoring_elements 0.25893
published_at 2026-04-04T12:55:00Z
7
value 0.00091
scoring_system epss
scoring_elements 0.25663
published_at 2026-04-07T12:55:00Z
8
value 0.00091
scoring_system epss
scoring_elements 0.25734
published_at 2026-04-08T12:55:00Z
9
value 0.00091
scoring_system epss
scoring_elements 0.25782
published_at 2026-04-09T12:55:00Z
10
value 0.00091
scoring_system epss
scoring_elements 0.25793
published_at 2026-04-11T12:55:00Z
11
value 0.00091
scoring_system epss
scoring_elements 0.25751
published_at 2026-04-12T12:55:00Z
12
value 0.00091
scoring_system epss
scoring_elements 0.25693
published_at 2026-04-13T12:55:00Z
13
value 0.00091
scoring_system epss
scoring_elements 0.25695
published_at 2026-04-16T12:55:00Z
14
value 0.00091
scoring_system epss
scoring_elements 0.25677
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-16233
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16233
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16233
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://lkml.org/lkml/2019/9/9/487
reference_id
reference_type
scores
url https://lkml.org/lkml/2019/9/9/487
7
reference_url https://security.netapp.com/advisory/ntap-20191004-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20191004-0001/
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1760420
reference_id 1760420
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1760420
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:5.2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:5.2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:5.2.14:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-16233
reference_id CVE-2019-16233
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
1
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-16233
19
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
20
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
21
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
22
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
23
reference_url https://usn.ubuntu.com/4226-1/
reference_id USN-4226-1
reference_type
scores
url https://usn.ubuntu.com/4226-1/
24
reference_url https://usn.ubuntu.com/4227-1/
reference_id USN-4227-1
reference_type
scores
url https://usn.ubuntu.com/4227-1/
25
reference_url https://usn.ubuntu.com/4227-2/
reference_id USN-4227-2
reference_type
scores
url https://usn.ubuntu.com/4227-2/
26
reference_url https://usn.ubuntu.com/4346-1/
reference_id USN-4346-1
reference_type
scores
url https://usn.ubuntu.com/4346-1/
fixed_packages
aliases CVE-2019-16233
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7v1s-4cxs-zyeg
14
url VCID-8d8k-r7yj-vkak
vulnerability_id VCID-8d8k-r7yj-vkak
summary kernel: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c allow for a DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19063.json
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19063.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19063
reference_id
reference_type
scores
0
value 0.00074
scoring_system epss
scoring_elements 0.22279
published_at 2026-04-07T12:55:00Z
1
value 0.00074
scoring_system epss
scoring_elements 0.22445
published_at 2026-04-02T12:55:00Z
2
value 0.00074
scoring_system epss
scoring_elements 0.22491
published_at 2026-04-04T12:55:00Z
3
value 0.00074
scoring_system epss
scoring_elements 0.22362
published_at 2026-04-08T12:55:00Z
4
value 0.00074
scoring_system epss
scoring_elements 0.22417
published_at 2026-04-09T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.22439
published_at 2026-04-11T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22397
published_at 2026-04-12T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.2234
published_at 2026-04-13T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22356
published_at 2026-04-16T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.2235
published_at 2026-04-18T12:55:00Z
10
value 0.00074
scoring_system epss
scoring_elements 0.223
published_at 2026-04-21T12:55:00Z
11
value 0.00074
scoring_system epss
scoring_elements 0.2215
published_at 2026-04-24T12:55:00Z
12
value 0.00074
scoring_system epss
scoring_elements 0.22137
published_at 2026-04-26T12:55:00Z
13
value 0.00074
scoring_system epss
scoring_elements 0.22131
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19063
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19063
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1775015
reference_id 1775015
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1775015
5
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
6
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
7
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
8
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
9
reference_url https://usn.ubuntu.com/4254-1/
reference_id USN-4254-1
reference_type
scores
url https://usn.ubuntu.com/4254-1/
10
reference_url https://usn.ubuntu.com/4254-2/
reference_id USN-4254-2
reference_type
scores
url https://usn.ubuntu.com/4254-2/
11
reference_url https://usn.ubuntu.com/4284-1/
reference_id USN-4284-1
reference_type
scores
url https://usn.ubuntu.com/4284-1/
12
reference_url https://usn.ubuntu.com/4285-1/
reference_id USN-4285-1
reference_type
scores
url https://usn.ubuntu.com/4285-1/
13
reference_url https://usn.ubuntu.com/4287-1/
reference_id USN-4287-1
reference_type
scores
url https://usn.ubuntu.com/4287-1/
14
reference_url https://usn.ubuntu.com/4287-2/
reference_id USN-4287-2
reference_type
scores
url https://usn.ubuntu.com/4287-2/
fixed_packages
aliases CVE-2019-19063
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8d8k-r7yj-vkak
15
url VCID-9sy3-h5gv-hkfj
vulnerability_id VCID-9sy3-h5gv-hkfj
summary kernel: null pointer dereference in dlpar_parse_cc_property in arch/powerrc/platforms/pseries/dlpar.c causing denial of service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12614.json
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12614.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-12614
reference_id
reference_type
scores
0
value 0.00084
scoring_system epss
scoring_elements 0.24569
published_at 2026-04-01T12:55:00Z
1
value 0.00084
scoring_system epss
scoring_elements 0.24647
published_at 2026-04-02T12:55:00Z
2
value 0.00084
scoring_system epss
scoring_elements 0.24684
published_at 2026-04-04T12:55:00Z
3
value 0.00084
scoring_system epss
scoring_elements 0.24456
published_at 2026-04-07T12:55:00Z
4
value 0.00084
scoring_system epss
scoring_elements 0.24526
published_at 2026-04-08T12:55:00Z
5
value 0.00084
scoring_system epss
scoring_elements 0.2457
published_at 2026-04-09T12:55:00Z
6
value 0.00084
scoring_system epss
scoring_elements 0.24586
published_at 2026-04-11T12:55:00Z
7
value 0.00084
scoring_system epss
scoring_elements 0.24542
published_at 2026-04-12T12:55:00Z
8
value 0.00084
scoring_system epss
scoring_elements 0.24488
published_at 2026-04-13T12:55:00Z
9
value 0.00084
scoring_system epss
scoring_elements 0.24501
published_at 2026-04-16T12:55:00Z
10
value 0.00084
scoring_system epss
scoring_elements 0.24493
published_at 2026-04-18T12:55:00Z
11
value 0.00084
scoring_system epss
scoring_elements 0.24469
published_at 2026-04-21T12:55:00Z
12
value 0.00084
scoring_system epss
scoring_elements 0.24409
published_at 2026-04-24T12:55:00Z
13
value 0.00084
scoring_system epss
scoring_elements 0.24393
published_at 2026-04-26T12:55:00Z
14
value 0.00084
scoring_system epss
scoring_elements 0.24351
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-12614
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12614
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1718176
reference_id 1718176
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1718176
5
reference_url https://access.redhat.com/errata/RHSA-2020:2104
reference_id RHSA-2020:2104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2104
6
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
7
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
8
reference_url https://usn.ubuntu.com/4093-1/
reference_id USN-4093-1
reference_type
scores
url https://usn.ubuntu.com/4093-1/
9
reference_url https://usn.ubuntu.com/4094-1/
reference_id USN-4094-1
reference_type
scores
url https://usn.ubuntu.com/4094-1/
10
reference_url https://usn.ubuntu.com/4095-1/
reference_id USN-4095-1
reference_type
scores
url https://usn.ubuntu.com/4095-1/
11
reference_url https://usn.ubuntu.com/4095-2/
reference_id USN-4095-2
reference_type
scores
url https://usn.ubuntu.com/4095-2/
fixed_packages
aliases CVE-2019-12614
risk_score 1.9
exploitability 0.5
weighted_severity 3.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9sy3-h5gv-hkfj
16
url VCID-ab13-qdru-8qhx
vulnerability_id VCID-ab13-qdru-8qhx
summary kernel: memory corruption in Voice over IP nf_conntrack_h323 module
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14305.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14305.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14305
reference_id
reference_type
scores
0
value 0.01048
scoring_system epss
scoring_elements 0.77467
published_at 2026-04-01T12:55:00Z
1
value 0.01048
scoring_system epss
scoring_elements 0.77474
published_at 2026-04-02T12:55:00Z
2
value 0.01048
scoring_system epss
scoring_elements 0.77499
published_at 2026-04-04T12:55:00Z
3
value 0.01048
scoring_system epss
scoring_elements 0.7748
published_at 2026-04-07T12:55:00Z
4
value 0.01048
scoring_system epss
scoring_elements 0.77509
published_at 2026-04-08T12:55:00Z
5
value 0.01048
scoring_system epss
scoring_elements 0.77519
published_at 2026-04-09T12:55:00Z
6
value 0.01048
scoring_system epss
scoring_elements 0.77544
published_at 2026-04-11T12:55:00Z
7
value 0.01048
scoring_system epss
scoring_elements 0.77529
published_at 2026-04-12T12:55:00Z
8
value 0.01048
scoring_system epss
scoring_elements 0.77525
published_at 2026-04-13T12:55:00Z
9
value 0.01048
scoring_system epss
scoring_elements 0.77564
published_at 2026-04-16T12:55:00Z
10
value 0.01048
scoring_system epss
scoring_elements 0.77562
published_at 2026-04-18T12:55:00Z
11
value 0.01048
scoring_system epss
scoring_elements 0.77554
published_at 2026-04-21T12:55:00Z
12
value 0.01048
scoring_system epss
scoring_elements 0.77589
published_at 2026-04-24T12:55:00Z
13
value 0.01048
scoring_system epss
scoring_elements 0.77595
published_at 2026-04-26T12:55:00Z
14
value 0.01048
scoring_system epss
scoring_elements 0.7761
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14305
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14305
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1850716
reference_id 1850716
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1850716
5
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
6
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
fixed_packages
aliases CVE-2020-14305
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ab13-qdru-8qhx
17
url VCID-bg9r-sesr-k7fh
vulnerability_id VCID-bg9r-sesr-k7fh
summary kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry related to fs/ext4/inode.c and fs/ext4/super.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19767.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19767.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19767
reference_id
reference_type
scores
0
value 0.00382
scoring_system epss
scoring_elements 0.59487
published_at 2026-04-01T12:55:00Z
1
value 0.00382
scoring_system epss
scoring_elements 0.5956
published_at 2026-04-02T12:55:00Z
2
value 0.00382
scoring_system epss
scoring_elements 0.59585
published_at 2026-04-04T12:55:00Z
3
value 0.00382
scoring_system epss
scoring_elements 0.59553
published_at 2026-04-07T12:55:00Z
4
value 0.00382
scoring_system epss
scoring_elements 0.59605
published_at 2026-04-08T12:55:00Z
5
value 0.00382
scoring_system epss
scoring_elements 0.59618
published_at 2026-04-09T12:55:00Z
6
value 0.00382
scoring_system epss
scoring_elements 0.59637
published_at 2026-04-11T12:55:00Z
7
value 0.00382
scoring_system epss
scoring_elements 0.5962
published_at 2026-04-12T12:55:00Z
8
value 0.00382
scoring_system epss
scoring_elements 0.59601
published_at 2026-04-29T12:55:00Z
9
value 0.00382
scoring_system epss
scoring_elements 0.59634
published_at 2026-04-16T12:55:00Z
10
value 0.00382
scoring_system epss
scoring_elements 0.59641
published_at 2026-04-18T12:55:00Z
11
value 0.00382
scoring_system epss
scoring_elements 0.59624
published_at 2026-04-21T12:55:00Z
12
value 0.00382
scoring_system epss
scoring_elements 0.59594
published_at 2026-04-24T12:55:00Z
13
value 0.00382
scoring_system epss
scoring_elements 0.59614
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19767
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19767
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1786160
reference_id 1786160
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1786160
5
reference_url https://access.redhat.com/errata/RHSA-2020:2854
reference_id RHSA-2020:2854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2854
6
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
7
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
8
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
9
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
10
reference_url https://usn.ubuntu.com/4258-1/
reference_id USN-4258-1
reference_type
scores
url https://usn.ubuntu.com/4258-1/
11
reference_url https://usn.ubuntu.com/4284-1/
reference_id USN-4284-1
reference_type
scores
url https://usn.ubuntu.com/4284-1/
12
reference_url https://usn.ubuntu.com/4287-1/
reference_id USN-4287-1
reference_type
scores
url https://usn.ubuntu.com/4287-1/
13
reference_url https://usn.ubuntu.com/4287-2/
reference_id USN-4287-2
reference_type
scores
url https://usn.ubuntu.com/4287-2/
fixed_packages
aliases CVE-2019-19767
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bg9r-sesr-k7fh
18
url VCID-bsx5-tnrg-juch
vulnerability_id VCID-bsx5-tnrg-juch
summary Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19332.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19332.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19332
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06049
published_at 2026-04-01T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06082
published_at 2026-04-02T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06111
published_at 2026-04-04T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06094
published_at 2026-04-07T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06136
published_at 2026-04-08T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06175
published_at 2026-04-09T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06165
published_at 2026-04-11T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06161
published_at 2026-04-12T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.06153
published_at 2026-04-13T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06112
published_at 2026-04-16T12:55:00Z
10
value 0.00023
scoring_system epss
scoring_elements 0.06123
published_at 2026-04-18T12:55:00Z
11
value 0.00023
scoring_system epss
scoring_elements 0.06275
published_at 2026-04-21T12:55:00Z
12
value 0.00023
scoring_system epss
scoring_elements 0.06293
published_at 2026-04-24T12:55:00Z
13
value 0.00023
scoring_system epss
scoring_elements 0.0632
published_at 2026-04-26T12:55:00Z
14
value 0.00023
scoring_system epss
scoring_elements 0.06332
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19332
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19332
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1779594
reference_id 1779594
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1779594
5
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
6
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
7
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
8
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
9
reference_url https://usn.ubuntu.com/4254-1/
reference_id USN-4254-1
reference_type
scores
url https://usn.ubuntu.com/4254-1/
10
reference_url https://usn.ubuntu.com/4254-2/
reference_id USN-4254-2
reference_type
scores
url https://usn.ubuntu.com/4254-2/
11
reference_url https://usn.ubuntu.com/4258-1/
reference_id USN-4258-1
reference_type
scores
url https://usn.ubuntu.com/4258-1/
12
reference_url https://usn.ubuntu.com/4284-1/
reference_id USN-4284-1
reference_type
scores
url https://usn.ubuntu.com/4284-1/
13
reference_url https://usn.ubuntu.com/4287-1/
reference_id USN-4287-1
reference_type
scores
url https://usn.ubuntu.com/4287-1/
14
reference_url https://usn.ubuntu.com/4287-2/
reference_id USN-4287-2
reference_type
scores
url https://usn.ubuntu.com/4287-2/
fixed_packages
aliases CVE-2019-19332
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bsx5-tnrg-juch
19
url VCID-cmq5-eh24-zygx
vulnerability_id VCID-cmq5-eh24-zygx
summary kernel: out-of-bounds write via crafted keycode table
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20636.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20636.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-20636
reference_id
reference_type
scores
0
value 0.00112
scoring_system epss
scoring_elements 0.29713
published_at 2026-04-01T12:55:00Z
1
value 0.00112
scoring_system epss
scoring_elements 0.29759
published_at 2026-04-02T12:55:00Z
2
value 0.00112
scoring_system epss
scoring_elements 0.29806
published_at 2026-04-04T12:55:00Z
3
value 0.00112
scoring_system epss
scoring_elements 0.29624
published_at 2026-04-07T12:55:00Z
4
value 0.00112
scoring_system epss
scoring_elements 0.29686
published_at 2026-04-08T12:55:00Z
5
value 0.00112
scoring_system epss
scoring_elements 0.29723
published_at 2026-04-09T12:55:00Z
6
value 0.00112
scoring_system epss
scoring_elements 0.29726
published_at 2026-04-11T12:55:00Z
7
value 0.00112
scoring_system epss
scoring_elements 0.29682
published_at 2026-04-12T12:55:00Z
8
value 0.00112
scoring_system epss
scoring_elements 0.29631
published_at 2026-04-13T12:55:00Z
9
value 0.00112
scoring_system epss
scoring_elements 0.29649
published_at 2026-04-16T12:55:00Z
10
value 0.00112
scoring_system epss
scoring_elements 0.29626
published_at 2026-04-18T12:55:00Z
11
value 0.00112
scoring_system epss
scoring_elements 0.29582
published_at 2026-04-21T12:55:00Z
12
value 0.00112
scoring_system epss
scoring_elements 0.29502
published_at 2026-04-24T12:55:00Z
13
value 0.00112
scoring_system epss
scoring_elements 0.29388
published_at 2026-04-26T12:55:00Z
14
value 0.00112
scoring_system epss
scoring_elements 0.29324
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-20636
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20636
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1824059
reference_id 1824059
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1824059
5
reference_url https://access.redhat.com/errata/RHSA-2020:2854
reference_id RHSA-2020:2854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2854
6
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
7
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
8
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
9
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
10
reference_url https://access.redhat.com/errata/RHSA-2020:5430
reference_id RHSA-2020:5430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5430
11
reference_url https://access.redhat.com/errata/RHSA-2020:5656
reference_id RHSA-2020:5656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5656
12
reference_url https://access.redhat.com/errata/RHSA-2021:0019
reference_id RHSA-2021:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0019
fixed_packages
aliases CVE-2019-20636
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cmq5-eh24-zygx
20
url VCID-ctfh-kpf3-4fdh
vulnerability_id VCID-ctfh-kpf3-4fdh
summary kernel: some ipv6 protocols not encrypted over ipsec tunnel
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1749.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1749.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-1749
reference_id
reference_type
scores
0
value 0.00155
scoring_system epss
scoring_elements 0.36197
published_at 2026-04-01T12:55:00Z
1
value 0.00155
scoring_system epss
scoring_elements 0.36391
published_at 2026-04-02T12:55:00Z
2
value 0.00155
scoring_system epss
scoring_elements 0.36424
published_at 2026-04-04T12:55:00Z
3
value 0.00155
scoring_system epss
scoring_elements 0.36259
published_at 2026-04-07T12:55:00Z
4
value 0.00155
scoring_system epss
scoring_elements 0.36308
published_at 2026-04-08T12:55:00Z
5
value 0.00155
scoring_system epss
scoring_elements 0.3633
published_at 2026-04-09T12:55:00Z
6
value 0.00155
scoring_system epss
scoring_elements 0.36337
published_at 2026-04-11T12:55:00Z
7
value 0.00155
scoring_system epss
scoring_elements 0.36301
published_at 2026-04-12T12:55:00Z
8
value 0.00155
scoring_system epss
scoring_elements 0.3628
published_at 2026-04-13T12:55:00Z
9
value 0.00155
scoring_system epss
scoring_elements 0.36322
published_at 2026-04-16T12:55:00Z
10
value 0.00155
scoring_system epss
scoring_elements 0.36306
published_at 2026-04-18T12:55:00Z
11
value 0.00155
scoring_system epss
scoring_elements 0.36252
published_at 2026-04-21T12:55:00Z
12
value 0.00155
scoring_system epss
scoring_elements 0.3602
published_at 2026-04-24T12:55:00Z
13
value 0.00155
scoring_system epss
scoring_elements 0.35989
published_at 2026-04-26T12:55:00Z
14
value 0.00155
scoring_system epss
scoring_elements 0.35902
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-1749
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1749
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1809833
reference_id 1809833
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1809833
5
reference_url https://access.redhat.com/errata/RHSA-2020:1567
reference_id RHSA-2020:1567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1567
6
reference_url https://access.redhat.com/errata/RHSA-2020:1769
reference_id RHSA-2020:1769
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1769
7
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
8
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
9
reference_url https://access.redhat.com/errata/RHSA-2021:0354
reference_id RHSA-2021:0354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0354
10
reference_url https://usn.ubuntu.com/4388-1/
reference_id USN-4388-1
reference_type
scores
url https://usn.ubuntu.com/4388-1/
11
reference_url https://usn.ubuntu.com/4390-1/
reference_id USN-4390-1
reference_type
scores
url https://usn.ubuntu.com/4390-1/
12
reference_url https://usn.ubuntu.com/4391-1/
reference_id USN-4391-1
reference_type
scores
url https://usn.ubuntu.com/4391-1/
fixed_packages
aliases CVE-2020-1749
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ctfh-kpf3-4fdh
21
url VCID-da1t-1kc9-rqbr
vulnerability_id VCID-da1t-1kc9-rqbr
summary kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16231.json
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16231.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-16231
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05312
published_at 2026-04-01T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.0559
published_at 2026-04-29T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05517
published_at 2026-04-21T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05554
published_at 2026-04-24T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05591
published_at 2026-04-26T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05354
published_at 2026-04-02T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.05384
published_at 2026-04-04T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05391
published_at 2026-04-07T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05425
published_at 2026-04-08T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.05448
published_at 2026-04-09T12:55:00Z
10
value 0.0002
scoring_system epss
scoring_elements 0.05421
published_at 2026-04-11T12:55:00Z
11
value 0.0002
scoring_system epss
scoring_elements 0.05408
published_at 2026-04-12T12:55:00Z
12
value 0.0002
scoring_system epss
scoring_elements 0.054
published_at 2026-04-13T12:55:00Z
13
value 0.0002
scoring_system epss
scoring_elements 0.05353
published_at 2026-04-16T12:55:00Z
14
value 0.0002
scoring_system epss
scoring_elements 0.05356
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-16231
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16231
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://lkml.org/lkml/2019/9/9/487
reference_id
reference_type
scores
url https://lkml.org/lkml/2019/9/9/487
7
reference_url https://security.netapp.com/advisory/ntap-20191004-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20191004-0001/
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1760310
reference_id 1760310
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1760310
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:5.2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:5.2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:5.2.14:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-16231
reference_id CVE-2019-16231
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
1
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-16231
20
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
21
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
22
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
23
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
24
reference_url https://usn.ubuntu.com/4225-1/
reference_id USN-4225-1
reference_type
scores
url https://usn.ubuntu.com/4225-1/
25
reference_url https://usn.ubuntu.com/4225-2/
reference_id USN-4225-2
reference_type
scores
url https://usn.ubuntu.com/4225-2/
26
reference_url https://usn.ubuntu.com/4226-1/
reference_id USN-4226-1
reference_type
scores
url https://usn.ubuntu.com/4226-1/
27
reference_url https://usn.ubuntu.com/4227-1/
reference_id USN-4227-1
reference_type
scores
url https://usn.ubuntu.com/4227-1/
28
reference_url https://usn.ubuntu.com/4227-2/
reference_id USN-4227-2
reference_type
scores
url https://usn.ubuntu.com/4227-2/
29
reference_url https://usn.ubuntu.com/4904-1/
reference_id USN-4904-1
reference_type
scores
url https://usn.ubuntu.com/4904-1/
fixed_packages
aliases CVE-2019-16231
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-da1t-1kc9-rqbr
22
url VCID-eft3-zkps-6fgc
vulnerability_id VCID-eft3-zkps-6fgc
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8647.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8647.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-8647
reference_id
reference_type
scores
0
value 0.00076
scoring_system epss
scoring_elements 0.22793
published_at 2026-04-01T12:55:00Z
1
value 0.00076
scoring_system epss
scoring_elements 0.22962
published_at 2026-04-02T12:55:00Z
2
value 0.00076
scoring_system epss
scoring_elements 0.23006
published_at 2026-04-04T12:55:00Z
3
value 0.00076
scoring_system epss
scoring_elements 0.22798
published_at 2026-04-07T12:55:00Z
4
value 0.00076
scoring_system epss
scoring_elements 0.22872
published_at 2026-04-08T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.22924
published_at 2026-04-09T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.22943
published_at 2026-04-11T12:55:00Z
7
value 0.00076
scoring_system epss
scoring_elements 0.22906
published_at 2026-04-12T12:55:00Z
8
value 0.00076
scoring_system epss
scoring_elements 0.2285
published_at 2026-04-13T12:55:00Z
9
value 0.00076
scoring_system epss
scoring_elements 0.22864
published_at 2026-04-16T12:55:00Z
10
value 0.00076
scoring_system epss
scoring_elements 0.22858
published_at 2026-04-18T12:55:00Z
11
value 0.00076
scoring_system epss
scoring_elements 0.22818
published_at 2026-04-21T12:55:00Z
12
value 0.00076
scoring_system epss
scoring_elements 0.22655
published_at 2026-04-24T12:55:00Z
13
value 0.00076
scoring_system epss
scoring_elements 0.22648
published_at 2026-04-26T12:55:00Z
14
value 0.00076
scoring_system epss
scoring_elements 0.22643
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-8647
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
33
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1802563
reference_id 1802563
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1802563
35
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
36
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
37
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
38
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
39
reference_url https://access.redhat.com/errata/RHSA-2022:1209
reference_id RHSA-2022:1209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1209
40
reference_url https://access.redhat.com/errata/RHSA-2022:1213
reference_id RHSA-2022:1213
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1213
fixed_packages
aliases CVE-2020-8647
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eft3-zkps-6fgc
23
url VCID-exk5-yt4g-eqga
vulnerability_id VCID-exk5-yt4g-eqga
summary kernel: A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c allows for a DoS
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19058.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19058.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19058
reference_id
reference_type
scores
0
value 0.00092
scoring_system epss
scoring_elements 0.25884
published_at 2026-04-01T12:55:00Z
1
value 0.00092
scoring_system epss
scoring_elements 0.25641
published_at 2026-04-29T12:55:00Z
2
value 0.00092
scoring_system epss
scoring_elements 0.25752
published_at 2026-04-21T12:55:00Z
3
value 0.00092
scoring_system epss
scoring_elements 0.25696
published_at 2026-04-24T12:55:00Z
4
value 0.00092
scoring_system epss
scoring_elements 0.25689
published_at 2026-04-26T12:55:00Z
5
value 0.00092
scoring_system epss
scoring_elements 0.25948
published_at 2026-04-02T12:55:00Z
6
value 0.00092
scoring_system epss
scoring_elements 0.2599
published_at 2026-04-04T12:55:00Z
7
value 0.00092
scoring_system epss
scoring_elements 0.2576
published_at 2026-04-07T12:55:00Z
8
value 0.00092
scoring_system epss
scoring_elements 0.2583
published_at 2026-04-08T12:55:00Z
9
value 0.00092
scoring_system epss
scoring_elements 0.25882
published_at 2026-04-09T12:55:00Z
10
value 0.00092
scoring_system epss
scoring_elements 0.25893
published_at 2026-04-11T12:55:00Z
11
value 0.00092
scoring_system epss
scoring_elements 0.25851
published_at 2026-04-12T12:55:00Z
12
value 0.00092
scoring_system epss
scoring_elements 0.25794
published_at 2026-04-13T12:55:00Z
13
value 0.00092
scoring_system epss
scoring_elements 0.25797
published_at 2026-04-16T12:55:00Z
14
value 0.00092
scoring_system epss
scoring_elements 0.25779
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19058
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19058
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/torvalds/linux/commit/b4b814fec1a5a849383f7b3886b654a13abbda7d
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/b4b814fec1a5a849383f7b3886b654a13abbda7d
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
8
reference_url https://security.netapp.com/advisory/ntap-20191205-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20191205-0001/
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1775047
reference_id 1775047
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1775047
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-19058
reference_id CVE-2019-19058
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
1
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-19058
19
reference_url https://access.redhat.com/errata/RHSA-2020:1567
reference_id RHSA-2020:1567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1567
20
reference_url https://access.redhat.com/errata/RHSA-2020:1769
reference_id RHSA-2020:1769
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1769
21
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
22
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
23
reference_url https://usn.ubuntu.com/4300-1/
reference_id USN-4300-1
reference_type
scores
url https://usn.ubuntu.com/4300-1/
24
reference_url https://usn.ubuntu.com/4301-1/
reference_id USN-4301-1
reference_type
scores
url https://usn.ubuntu.com/4301-1/
25
reference_url https://usn.ubuntu.com/4302-1/
reference_id USN-4302-1
reference_type
scores
url https://usn.ubuntu.com/4302-1/
fixed_packages
aliases CVE-2019-19058
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-exk5-yt4g-eqga
24
url VCID-febt-wghv-m7gv
vulnerability_id VCID-febt-wghv-m7gv
summary kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html
2
reference_url http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17055.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17055.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17055
reference_id
reference_type
scores
0
value 0.00088
scoring_system epss
scoring_elements 0.25178
published_at 2026-04-01T12:55:00Z
1
value 0.00088
scoring_system epss
scoring_elements 0.24959
published_at 2026-04-29T12:55:00Z
2
value 0.00088
scoring_system epss
scoring_elements 0.25076
published_at 2026-04-21T12:55:00Z
3
value 0.00088
scoring_system epss
scoring_elements 0.25016
published_at 2026-04-24T12:55:00Z
4
value 0.00088
scoring_system epss
scoring_elements 0.25004
published_at 2026-04-26T12:55:00Z
5
value 0.00088
scoring_system epss
scoring_elements 0.25258
published_at 2026-04-02T12:55:00Z
6
value 0.00088
scoring_system epss
scoring_elements 0.25296
published_at 2026-04-04T12:55:00Z
7
value 0.00088
scoring_system epss
scoring_elements 0.25069
published_at 2026-04-07T12:55:00Z
8
value 0.00088
scoring_system epss
scoring_elements 0.25139
published_at 2026-04-08T12:55:00Z
9
value 0.00088
scoring_system epss
scoring_elements 0.25185
published_at 2026-04-09T12:55:00Z
10
value 0.00088
scoring_system epss
scoring_elements 0.25199
published_at 2026-04-11T12:55:00Z
11
value 0.00088
scoring_system epss
scoring_elements 0.25157
published_at 2026-04-12T12:55:00Z
12
value 0.00088
scoring_system epss
scoring_elements 0.25104
published_at 2026-04-13T12:55:00Z
13
value 0.00088
scoring_system epss
scoring_elements 0.25114
published_at 2026-04-16T12:55:00Z
14
value 0.00088
scoring_system epss
scoring_elements 0.25105
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17055
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17055
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17055
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0edc3f703f7bcaf550774b5d43ab727bcd0fe06b
reference_id
reference_type
scores
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0edc3f703f7bcaf550774b5d43ab727bcd0fe06b
8
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b91ee4aa2a2199ba4d4650706c272985a5a32d80
reference_id
reference_type
scores
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b91ee4aa2a2199ba4d4650706c272985a5a32d80
9
reference_url https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
10
reference_url https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6JNEWGIK7QA24OIUUL67QZNJN52NB7T/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6JNEWGIK7QA24OIUUL67QZNJN52NB7T/
12
reference_url https://seclists.org/bugtraq/2019/Nov/11
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Nov/11
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1758248
reference_id 1758248
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1758248
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-17055
reference_id CVE-2019-17055
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:P/A:N
1
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-17055
27
reference_url https://access.redhat.com/errata/RHSA-2020:0790
reference_id RHSA-2020:0790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0790
28
reference_url https://access.redhat.com/errata/RHSA-2020:1567
reference_id RHSA-2020:1567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1567
29
reference_url https://access.redhat.com/errata/RHSA-2020:1769
reference_id RHSA-2020:1769
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1769
30
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
31
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
32
reference_url https://usn.ubuntu.com/4184-1/
reference_id USN-4184-1
reference_type
scores
url https://usn.ubuntu.com/4184-1/
33
reference_url https://usn.ubuntu.com/4185-1/
reference_id USN-4185-1
reference_type
scores
url https://usn.ubuntu.com/4185-1/
34
reference_url https://usn.ubuntu.com/4185-2/
reference_id USN-4185-2
reference_type
scores
url https://usn.ubuntu.com/4185-2/
35
reference_url https://usn.ubuntu.com/4186-1/
reference_id USN-4186-1
reference_type
scores
url https://usn.ubuntu.com/4186-1/
36
reference_url https://usn.ubuntu.com/4186-2/
reference_id USN-4186-2
reference_type
scores
url https://usn.ubuntu.com/4186-2/
fixed_packages
aliases CVE-2019-17055
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-febt-wghv-m7gv
25
url VCID-feqr-yruq-pfhh
vulnerability_id VCID-feqr-yruq-pfhh
summary kernel: out of bounds write in i2c driver leads to local escalation of privilege
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9454.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9454.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9454
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05644
published_at 2026-04-01T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05935
published_at 2026-04-29T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.0589
published_at 2026-04-24T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05926
published_at 2026-04-26T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05678
published_at 2026-04-02T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05719
published_at 2026-04-04T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05712
published_at 2026-04-07T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05752
published_at 2026-04-08T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05778
published_at 2026-04-09T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05756
published_at 2026-04-11T12:55:00Z
10
value 0.00021
scoring_system epss
scoring_elements 0.05748
published_at 2026-04-12T12:55:00Z
11
value 0.00021
scoring_system epss
scoring_elements 0.05743
published_at 2026-04-13T12:55:00Z
12
value 0.00021
scoring_system epss
scoring_elements 0.05698
published_at 2026-04-16T12:55:00Z
13
value 0.00021
scoring_system epss
scoring_elements 0.05708
published_at 2026-04-18T12:55:00Z
14
value 0.00021
scoring_system epss
scoring_elements 0.05859
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9454
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9454
3
reference_url https://source.android.com/security/bulletin/pixel/2019-09-01
reference_id
reference_type
scores
url https://source.android.com/security/bulletin/pixel/2019-09-01
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1818818
reference_id 1818818
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1818818
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-9454
reference_id CVE-2019-9454
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-9454
7
reference_url https://access.redhat.com/errata/RHSA-2020:2104
reference_id RHSA-2020:2104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2104
8
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
9
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
10
reference_url https://access.redhat.com/errata/RHSA-2020:5206
reference_id RHSA-2020:5206
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5206
11
reference_url https://access.redhat.com/errata/RHSA-2020:5430
reference_id RHSA-2020:5430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5430
12
reference_url https://access.redhat.com/errata/RHSA-2020:5656
reference_id RHSA-2020:5656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5656
fixed_packages
aliases CVE-2019-9454
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-feqr-yruq-pfhh
26
url VCID-gfsy-qgk6-1ugj
vulnerability_id VCID-gfsy-qgk6-1ugj
summary kernel: use-after-free in cdev_put() when a PTP device is removed while it's chardev is open
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10690.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10690.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-10690
reference_id
reference_type
scores
0
value 0.00126
scoring_system epss
scoring_elements 0.31895
published_at 2026-04-01T12:55:00Z
1
value 0.00126
scoring_system epss
scoring_elements 0.32023
published_at 2026-04-02T12:55:00Z
2
value 0.00126
scoring_system epss
scoring_elements 0.32064
published_at 2026-04-04T12:55:00Z
3
value 0.00126
scoring_system epss
scoring_elements 0.31887
published_at 2026-04-07T12:55:00Z
4
value 0.00126
scoring_system epss
scoring_elements 0.31939
published_at 2026-04-08T12:55:00Z
5
value 0.00126
scoring_system epss
scoring_elements 0.31968
published_at 2026-04-09T12:55:00Z
6
value 0.00126
scoring_system epss
scoring_elements 0.31972
published_at 2026-04-11T12:55:00Z
7
value 0.00126
scoring_system epss
scoring_elements 0.31932
published_at 2026-04-16T12:55:00Z
8
value 0.00126
scoring_system epss
scoring_elements 0.31898
published_at 2026-04-13T12:55:00Z
9
value 0.00126
scoring_system epss
scoring_elements 0.31911
published_at 2026-04-18T12:55:00Z
10
value 0.00126
scoring_system epss
scoring_elements 0.31883
published_at 2026-04-21T12:55:00Z
11
value 0.00126
scoring_system epss
scoring_elements 0.31716
published_at 2026-04-24T12:55:00Z
12
value 0.00126
scoring_system epss
scoring_elements 0.3159
published_at 2026-04-26T12:55:00Z
13
value 0.00126
scoring_system epss
scoring_elements 0.31505
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-10690
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10690
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10690
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1817141
reference_id 1817141
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1817141
5
reference_url https://access.redhat.com/errata/RHSA-2020:1567
reference_id RHSA-2020:1567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1567
6
reference_url https://access.redhat.com/errata/RHSA-2020:1769
reference_id RHSA-2020:1769
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1769
7
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
8
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
9
reference_url https://usn.ubuntu.com/4419-1/
reference_id USN-4419-1
reference_type
scores
url https://usn.ubuntu.com/4419-1/
fixed_packages
aliases CVE-2020-10690
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gfsy-qgk6-1ugj
27
url VCID-hf8f-stgb-gqa4
vulnerability_id VCID-hf8f-stgb-gqa4
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11565.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11565.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-11565
reference_id
reference_type
scores
0
value 0.00083
scoring_system epss
scoring_elements 0.24279
published_at 2026-04-01T12:55:00Z
1
value 0.00083
scoring_system epss
scoring_elements 0.24051
published_at 2026-04-29T12:55:00Z
2
value 0.00083
scoring_system epss
scoring_elements 0.24405
published_at 2026-04-02T12:55:00Z
3
value 0.00083
scoring_system epss
scoring_elements 0.24438
published_at 2026-04-04T12:55:00Z
4
value 0.00083
scoring_system epss
scoring_elements 0.2422
published_at 2026-04-07T12:55:00Z
5
value 0.00083
scoring_system epss
scoring_elements 0.24287
published_at 2026-04-08T12:55:00Z
6
value 0.00083
scoring_system epss
scoring_elements 0.2433
published_at 2026-04-09T12:55:00Z
7
value 0.00083
scoring_system epss
scoring_elements 0.24348
published_at 2026-04-11T12:55:00Z
8
value 0.00083
scoring_system epss
scoring_elements 0.24305
published_at 2026-04-12T12:55:00Z
9
value 0.00083
scoring_system epss
scoring_elements 0.24248
published_at 2026-04-13T12:55:00Z
10
value 0.00083
scoring_system epss
scoring_elements 0.24264
published_at 2026-04-16T12:55:00Z
11
value 0.00083
scoring_system epss
scoring_elements 0.24252
published_at 2026-04-18T12:55:00Z
12
value 0.00083
scoring_system epss
scoring_elements 0.24229
published_at 2026-04-21T12:55:00Z
13
value 0.00083
scoring_system epss
scoring_elements 0.24105
published_at 2026-04-24T12:55:00Z
14
value 0.00083
scoring_system epss
scoring_elements 0.24093
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-11565
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11884
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
34
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
35
reference_url https://github.com/torvalds/linux/commit/aa9f7d5172fac9bf1f09e678c35e287a40a7b7dd
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:42:27Z/
url https://github.com/torvalds/linux/commit/aa9f7d5172fac9bf1f09e678c35e287a40a7b7dd
36
reference_url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=aa9f7d5172fac9bf1f09e678c35e287a40a7b7dd
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:42:27Z/
url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=aa9f7d5172fac9bf1f09e678c35e287a40a7b7dd
37
reference_url https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:42:27Z/
url https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
38
reference_url https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:42:27Z/
url https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
39
reference_url https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:42:27Z/
url https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
40
reference_url https://www.debian.org/security/2020/dsa-4667
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:42:27Z/
url https://www.debian.org/security/2020/dsa-4667
41
reference_url https://www.debian.org/security/2020/dsa-4698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:42:27Z/
url https://www.debian.org/security/2020/dsa-4698
42
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1824918
reference_id 1824918
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1824918
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-11565
reference_id CVE-2020-11565
reference_type
scores
0
value 3.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:P/A:P
1
value 6.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-11565
49
reference_url https://access.redhat.com/errata/RHSA-2020:2854
reference_id RHSA-2020:2854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2854
50
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
51
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
52
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
53
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
54
reference_url https://usn.ubuntu.com/4363-1/
reference_id USN-4363-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:42:27Z/
url https://usn.ubuntu.com/4363-1/
55
reference_url https://usn.ubuntu.com/4364-1/
reference_id USN-4364-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:42:27Z/
url https://usn.ubuntu.com/4364-1/
56
reference_url https://usn.ubuntu.com/4367-1/
reference_id USN-4367-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:42:27Z/
url https://usn.ubuntu.com/4367-1/
57
reference_url https://usn.ubuntu.com/4368-1/
reference_id USN-4368-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:42:27Z/
url https://usn.ubuntu.com/4368-1/
58
reference_url https://usn.ubuntu.com/4369-1/
reference_id USN-4369-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:42:27Z/
url https://usn.ubuntu.com/4369-1/
fixed_packages
aliases CVE-2020-11565
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hf8f-stgb-gqa4
28
url VCID-mht4-9trg-e3h6
vulnerability_id VCID-mht4-9trg-e3h6
summary kernel: information leak bug caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19534.json
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19534.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19534
reference_id
reference_type
scores
0
value 0.00119
scoring_system epss
scoring_elements 0.30793
published_at 2026-04-01T12:55:00Z
1
value 0.00119
scoring_system epss
scoring_elements 0.30922
published_at 2026-04-02T12:55:00Z
2
value 0.00119
scoring_system epss
scoring_elements 0.3097
published_at 2026-04-04T12:55:00Z
3
value 0.00119
scoring_system epss
scoring_elements 0.30786
published_at 2026-04-07T12:55:00Z
4
value 0.00119
scoring_system epss
scoring_elements 0.30845
published_at 2026-04-08T12:55:00Z
5
value 0.00119
scoring_system epss
scoring_elements 0.30876
published_at 2026-04-09T12:55:00Z
6
value 0.00119
scoring_system epss
scoring_elements 0.30877
published_at 2026-04-11T12:55:00Z
7
value 0.00119
scoring_system epss
scoring_elements 0.30834
published_at 2026-04-12T12:55:00Z
8
value 0.00119
scoring_system epss
scoring_elements 0.30789
published_at 2026-04-13T12:55:00Z
9
value 0.00119
scoring_system epss
scoring_elements 0.30817
published_at 2026-04-16T12:55:00Z
10
value 0.00119
scoring_system epss
scoring_elements 0.30797
published_at 2026-04-18T12:55:00Z
11
value 0.00119
scoring_system epss
scoring_elements 0.30764
published_at 2026-04-21T12:55:00Z
12
value 0.00119
scoring_system epss
scoring_elements 0.30596
published_at 2026-04-24T12:55:00Z
13
value 0.00119
scoring_system epss
scoring_elements 0.30481
published_at 2026-04-26T12:55:00Z
14
value 0.00119
scoring_system epss
scoring_elements 0.30398
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19534
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19534
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19534
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1783540
reference_id 1783540
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1783540
5
reference_url https://access.redhat.com/errata/RHSA-2020:1567
reference_id RHSA-2020:1567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1567
6
reference_url https://access.redhat.com/errata/RHSA-2020:1769
reference_id RHSA-2020:1769
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1769
7
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
8
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
9
reference_url https://usn.ubuntu.com/4225-1/
reference_id USN-4225-1
reference_type
scores
url https://usn.ubuntu.com/4225-1/
10
reference_url https://usn.ubuntu.com/4225-2/
reference_id USN-4225-2
reference_type
scores
url https://usn.ubuntu.com/4225-2/
11
reference_url https://usn.ubuntu.com/4226-1/
reference_id USN-4226-1
reference_type
scores
url https://usn.ubuntu.com/4226-1/
12
reference_url https://usn.ubuntu.com/4227-1/
reference_id USN-4227-1
reference_type
scores
url https://usn.ubuntu.com/4227-1/
13
reference_url https://usn.ubuntu.com/4227-2/
reference_id USN-4227-2
reference_type
scores
url https://usn.ubuntu.com/4227-2/
14
reference_url https://usn.ubuntu.com/4228-1/
reference_id USN-4228-1
reference_type
scores
url https://usn.ubuntu.com/4228-1/
15
reference_url https://usn.ubuntu.com/4228-2/
reference_id USN-4228-2
reference_type
scores
url https://usn.ubuntu.com/4228-2/
fixed_packages
aliases CVE-2019-19534
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mht4-9trg-e3h6
29
url VCID-pkhx-v2kq-zucb
vulnerability_id VCID-pkhx-v2kq-zucb
summary kernel: unprivileged users able to create RAW sockets in AF_IEEE802154 network protocol
references
0
reference_url http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17053.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17053.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17053
reference_id
reference_type
scores
0
value 0.00099
scoring_system epss
scoring_elements 0.27636
published_at 2026-04-01T12:55:00Z
1
value 0.00099
scoring_system epss
scoring_elements 0.27235
published_at 2026-04-29T12:55:00Z
2
value 0.00099
scoring_system epss
scoring_elements 0.2746
published_at 2026-04-21T12:55:00Z
3
value 0.00099
scoring_system epss
scoring_elements 0.27414
published_at 2026-04-24T12:55:00Z
4
value 0.00099
scoring_system epss
scoring_elements 0.2731
published_at 2026-04-26T12:55:00Z
5
value 0.00099
scoring_system epss
scoring_elements 0.27676
published_at 2026-04-02T12:55:00Z
6
value 0.00099
scoring_system epss
scoring_elements 0.27714
published_at 2026-04-04T12:55:00Z
7
value 0.00099
scoring_system epss
scoring_elements 0.27504
published_at 2026-04-07T12:55:00Z
8
value 0.00099
scoring_system epss
scoring_elements 0.27572
published_at 2026-04-08T12:55:00Z
9
value 0.00099
scoring_system epss
scoring_elements 0.27615
published_at 2026-04-09T12:55:00Z
10
value 0.00099
scoring_system epss
scoring_elements 0.27619
published_at 2026-04-11T12:55:00Z
11
value 0.00099
scoring_system epss
scoring_elements 0.27575
published_at 2026-04-12T12:55:00Z
12
value 0.00099
scoring_system epss
scoring_elements 0.27519
published_at 2026-04-13T12:55:00Z
13
value 0.00099
scoring_system epss
scoring_elements 0.27526
published_at 2026-04-16T12:55:00Z
14
value 0.00099
scoring_system epss
scoring_elements 0.27499
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17053
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0edc3f703f7bcaf550774b5d43ab727bcd0fe06b
reference_id
reference_type
scores
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0edc3f703f7bcaf550774b5d43ab727bcd0fe06b
6
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e69dbd4619e7674c1679cba49afd9dd9ac347eef
reference_id
reference_type
scores
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e69dbd4619e7674c1679cba49afd9dd9ac347eef
7
reference_url https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
8
reference_url https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6JNEWGIK7QA24OIUUL67QZNJN52NB7T/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6JNEWGIK7QA24OIUUL67QZNJN52NB7T/
10
reference_url https://seclists.org/bugtraq/2019/Nov/11
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Nov/11
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1758242
reference_id 1758242
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1758242
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-17053
reference_id CVE-2019-17053
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:P/A:N
1
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-17053
14
reference_url https://access.redhat.com/errata/RHSA-2020:1567
reference_id RHSA-2020:1567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1567
15
reference_url https://access.redhat.com/errata/RHSA-2020:1769
reference_id RHSA-2020:1769
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1769
16
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
17
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
18
reference_url https://usn.ubuntu.com/4184-1/
reference_id USN-4184-1
reference_type
scores
url https://usn.ubuntu.com/4184-1/
19
reference_url https://usn.ubuntu.com/4185-1/
reference_id USN-4185-1
reference_type
scores
url https://usn.ubuntu.com/4185-1/
20
reference_url https://usn.ubuntu.com/4185-2/
reference_id USN-4185-2
reference_type
scores
url https://usn.ubuntu.com/4185-2/
21
reference_url https://usn.ubuntu.com/4186-1/
reference_id USN-4186-1
reference_type
scores
url https://usn.ubuntu.com/4186-1/
22
reference_url https://usn.ubuntu.com/4186-2/
reference_id USN-4186-2
reference_type
scores
url https://usn.ubuntu.com/4186-2/
fixed_packages
aliases CVE-2019-17053
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pkhx-v2kq-zucb
30
url VCID-qgcy-w3xt-3qad
vulnerability_id VCID-qgcy-w3xt-3qad
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8649.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8649.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-8649
reference_id
reference_type
scores
0
value 0.00087
scoring_system epss
scoring_elements 0.25097
published_at 2026-04-01T12:55:00Z
1
value 0.00087
scoring_system epss
scoring_elements 0.25178
published_at 2026-04-02T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.25219
published_at 2026-04-04T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.24989
published_at 2026-04-07T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.25057
published_at 2026-04-08T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.25102
published_at 2026-04-09T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.25117
published_at 2026-04-11T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.25076
published_at 2026-04-12T12:55:00Z
8
value 0.00087
scoring_system epss
scoring_elements 0.25021
published_at 2026-04-13T12:55:00Z
9
value 0.00087
scoring_system epss
scoring_elements 0.25031
published_at 2026-04-16T12:55:00Z
10
value 0.00087
scoring_system epss
scoring_elements 0.25023
published_at 2026-04-18T12:55:00Z
11
value 0.00087
scoring_system epss
scoring_elements 0.24993
published_at 2026-04-21T12:55:00Z
12
value 0.00087
scoring_system epss
scoring_elements 0.2493
published_at 2026-04-24T12:55:00Z
13
value 0.00087
scoring_system epss
scoring_elements 0.24919
published_at 2026-04-26T12:55:00Z
14
value 0.00087
scoring_system epss
scoring_elements 0.24873
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-8649
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
33
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1802555
reference_id 1802555
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1802555
35
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
36
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
37
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
38
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
39
reference_url https://access.redhat.com/errata/RHSA-2022:1209
reference_id RHSA-2022:1209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1209
40
reference_url https://access.redhat.com/errata/RHSA-2022:1213
reference_id RHSA-2022:1213
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1213
fixed_packages
aliases CVE-2020-8649
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qgcy-w3xt-3qad
31
url VCID-rj4n-qbrw-sfdw
vulnerability_id VCID-rj4n-qbrw-sfdw
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2732.json
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2732.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2732
reference_id
reference_type
scores
0
value 0.00438
scoring_system epss
scoring_elements 0.62993
published_at 2026-04-01T12:55:00Z
1
value 0.00438
scoring_system epss
scoring_elements 0.63152
published_at 2026-04-29T12:55:00Z
2
value 0.00438
scoring_system epss
scoring_elements 0.63153
published_at 2026-04-26T12:55:00Z
3
value 0.00438
scoring_system epss
scoring_elements 0.6314
published_at 2026-04-24T12:55:00Z
4
value 0.00438
scoring_system epss
scoring_elements 0.63118
published_at 2026-04-21T12:55:00Z
5
value 0.00438
scoring_system epss
scoring_elements 0.63052
published_at 2026-04-02T12:55:00Z
6
value 0.00438
scoring_system epss
scoring_elements 0.63138
published_at 2026-04-18T12:55:00Z
7
value 0.00438
scoring_system epss
scoring_elements 0.6313
published_at 2026-04-16T12:55:00Z
8
value 0.00438
scoring_system epss
scoring_elements 0.63094
published_at 2026-04-13T12:55:00Z
9
value 0.00438
scoring_system epss
scoring_elements 0.63117
published_at 2026-04-12T12:55:00Z
10
value 0.00438
scoring_system epss
scoring_elements 0.63131
published_at 2026-04-11T12:55:00Z
11
value 0.00438
scoring_system epss
scoring_elements 0.63113
published_at 2026-04-09T12:55:00Z
12
value 0.00438
scoring_system epss
scoring_elements 0.63097
published_at 2026-04-08T12:55:00Z
13
value 0.00438
scoring_system epss
scoring_elements 0.63081
published_at 2026-04-04T12:55:00Z
14
value 0.00438
scoring_system epss
scoring_elements 0.63045
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2732
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11884
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
34
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
35
reference_url https://git.kernel.org/linus/07721feee46b4b248402133228235318199b05ec
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:48Z/
url https://git.kernel.org/linus/07721feee46b4b248402133228235318199b05ec
36
reference_url https://git.kernel.org/linus/35a571346a94fb93b5b3b6a599675ef3384bc75c
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:48Z/
url https://git.kernel.org/linus/35a571346a94fb93b5b3b6a599675ef3384bc75c
37
reference_url https://git.kernel.org/linus/e71237d3ff1abf9f3388337cfebf53b96df2020d
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:48Z/
url https://git.kernel.org/linus/e71237d3ff1abf9f3388337cfebf53b96df2020d
38
reference_url https://linux.oracle.com/errata/ELSA-2020-5540.html
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:48Z/
url https://linux.oracle.com/errata/ELSA-2020-5540.html
39
reference_url https://linux.oracle.com/errata/ELSA-2020-5542.html
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:48Z/
url https://linux.oracle.com/errata/ELSA-2020-5542.html
40
reference_url https://linux.oracle.com/errata/ELSA-2020-5543.html
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:48Z/
url https://linux.oracle.com/errata/ELSA-2020-5543.html
41
reference_url https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:48Z/
url https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
42
reference_url https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:48Z/
url https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
43
reference_url https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:48Z/
url https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
44
reference_url https://www.debian.org/security/2020/dsa-4667
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:48Z/
url https://www.debian.org/security/2020/dsa-4667
45
reference_url https://www.debian.org/security/2020/dsa-4698
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:48Z/
url https://www.debian.org/security/2020/dsa-4698
46
reference_url https://www.openwall.com/lists/oss-security/2020/02/25/3
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:48Z/
url https://www.openwall.com/lists/oss-security/2020/02/25/3
47
reference_url https://www.spinics.net/lists/kvm/msg208259.html
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:48Z/
url https://www.spinics.net/lists/kvm/msg208259.html
48
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1805135
reference_id 1805135
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:48Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=1805135
49
reference_url https://security.archlinux.org/ASA-202003-6
reference_id ASA-202003-6
reference_type
scores
url https://security.archlinux.org/ASA-202003-6
50
reference_url https://security.archlinux.org/AVG-1108
reference_id AVG-1108
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1108
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2732
reference_id CVE-2020-2732
reference_type
scores
0
value 2.3
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:S/C:P/I:N/A:N
1
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
2
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2020-2732
54
reference_url https://access.redhat.com/errata/RHSA-2020:2102
reference_id RHSA-2020:2102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2102
55
reference_url https://access.redhat.com/errata/RHSA-2020:2171
reference_id RHSA-2020:2171
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2171
56
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
57
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
58
reference_url https://usn.ubuntu.com/4300-1/
reference_id USN-4300-1
reference_type
scores
url https://usn.ubuntu.com/4300-1/
59
reference_url https://usn.ubuntu.com/4301-1/
reference_id USN-4301-1
reference_type
scores
url https://usn.ubuntu.com/4301-1/
60
reference_url https://usn.ubuntu.com/4302-1/
reference_id USN-4302-1
reference_type
scores
url https://usn.ubuntu.com/4302-1/
61
reference_url https://usn.ubuntu.com/4303-1/
reference_id USN-4303-1
reference_type
scores
url https://usn.ubuntu.com/4303-1/
62
reference_url https://usn.ubuntu.com/4303-2/
reference_id USN-4303-2
reference_type
scores
url https://usn.ubuntu.com/4303-2/
fixed_packages
aliases CVE-2020-2732
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rj4n-qbrw-sfdw
32
url VCID-rn3u-zbw6-fyeg
vulnerability_id VCID-rn3u-zbw6-fyeg
summary kernel: use-after-free in sound/core/timer.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19807.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19807.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19807
reference_id
reference_type
scores
0
value 0.00078
scoring_system epss
scoring_elements 0.23251
published_at 2026-04-01T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.23426
published_at 2026-04-02T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.23464
published_at 2026-04-04T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.23248
published_at 2026-04-07T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.23321
published_at 2026-04-08T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23371
published_at 2026-04-09T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.2339
published_at 2026-04-11T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.23353
published_at 2026-04-12T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.23297
published_at 2026-04-13T12:55:00Z
9
value 0.00078
scoring_system epss
scoring_elements 0.23313
published_at 2026-04-16T12:55:00Z
10
value 0.00078
scoring_system epss
scoring_elements 0.23307
published_at 2026-04-18T12:55:00Z
11
value 0.00078
scoring_system epss
scoring_elements 0.2329
published_at 2026-04-21T12:55:00Z
12
value 0.00078
scoring_system epss
scoring_elements 0.23098
published_at 2026-04-24T12:55:00Z
13
value 0.00078
scoring_system epss
scoring_elements 0.23092
published_at 2026-04-26T12:55:00Z
14
value 0.00078
scoring_system epss
scoring_elements 0.23085
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19807
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19807
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1786078
reference_id 1786078
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1786078
4
reference_url https://access.redhat.com/errata/RHSA-2020:3010
reference_id RHSA-2020:3010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3010
5
reference_url https://access.redhat.com/errata/RHSA-2020:3016
reference_id RHSA-2020:3016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3016
6
reference_url https://access.redhat.com/errata/RHSA-2020:3222
reference_id RHSA-2020:3222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3222
7
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
8
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
9
reference_url https://usn.ubuntu.com/4225-1/
reference_id USN-4225-1
reference_type
scores
url https://usn.ubuntu.com/4225-1/
10
reference_url https://usn.ubuntu.com/4227-1/
reference_id USN-4227-1
reference_type
scores
url https://usn.ubuntu.com/4227-1/
11
reference_url https://usn.ubuntu.com/4227-2/
reference_id USN-4227-2
reference_type
scores
url https://usn.ubuntu.com/4227-2/
fixed_packages
aliases CVE-2019-19807
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rn3u-zbw6-fyeg
33
url VCID-rnwz-k5v3-1ugd
vulnerability_id VCID-rnwz-k5v3-1ugd
summary kernel: use after free due to race condition in the video driver leads to local privilege escalation
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9458.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9458.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9458
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04347
published_at 2026-04-01T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04641
published_at 2026-04-29T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04545
published_at 2026-04-21T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04576
published_at 2026-04-24T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04596
published_at 2026-04-26T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04385
published_at 2026-04-02T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.0441
published_at 2026-04-18T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.0442
published_at 2026-04-07T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04455
published_at 2026-04-08T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.04473
published_at 2026-04-09T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04465
published_at 2026-04-11T12:55:00Z
11
value 0.00018
scoring_system epss
scoring_elements 0.0445
published_at 2026-04-12T12:55:00Z
12
value 0.00018
scoring_system epss
scoring_elements 0.04433
published_at 2026-04-13T12:55:00Z
13
value 0.00018
scoring_system epss
scoring_elements 0.04402
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9458
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9458
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9458
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://source.android.com/security/bulletin/pixel/2019-09-01
reference_id
reference_type
scores
url https://source.android.com/security/bulletin/pixel/2019-09-01
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1819377
reference_id 1819377
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1819377
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-9458
reference_id CVE-2019-9458
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
1
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-9458
10
reference_url https://access.redhat.com/errata/RHSA-2020:2854
reference_id RHSA-2020:2854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2854
11
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
12
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
13
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
14
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
fixed_packages
aliases CVE-2019-9458
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rnwz-k5v3-1ugd
34
url VCID-rpmj-nmbd-b7gc
vulnerability_id VCID-rpmj-nmbd-b7gc
summary kernel: use-after-free in drivers/bluetooth/hci_ldisc.c
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
2
reference_url http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15917.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15917.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-15917
reference_id
reference_type
scores
0
value 0.00087
scoring_system epss
scoring_elements 0.25005
published_at 2026-04-01T12:55:00Z
1
value 0.00087
scoring_system epss
scoring_elements 0.24793
published_at 2026-04-29T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.24907
published_at 2026-04-21T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.2485
published_at 2026-04-24T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.24838
published_at 2026-04-26T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.25083
published_at 2026-04-02T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.25121
published_at 2026-04-04T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.24896
published_at 2026-04-07T12:55:00Z
8
value 0.00087
scoring_system epss
scoring_elements 0.24964
published_at 2026-04-08T12:55:00Z
9
value 0.00087
scoring_system epss
scoring_elements 0.25009
published_at 2026-04-09T12:55:00Z
10
value 0.00087
scoring_system epss
scoring_elements 0.25023
published_at 2026-04-11T12:55:00Z
11
value 0.00087
scoring_system epss
scoring_elements 0.24983
published_at 2026-04-12T12:55:00Z
12
value 0.00087
scoring_system epss
scoring_elements 0.24929
published_at 2026-04-13T12:55:00Z
13
value 0.00087
scoring_system epss
scoring_elements 0.24942
published_at 2026-04-16T12:55:00Z
14
value 0.00087
scoring_system epss
scoring_elements 0.24934
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-15917
5
reference_url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.5
reference_id
reference_type
scores
url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.5
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15917
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15917
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://github.com/torvalds/linux/commit/56897b217a1d0a91c9920cb418d6b3fe922f590a
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/56897b217a1d0a91c9920cb418d6b3fe922f590a
9
reference_url https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
10
reference_url https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
11
reference_url https://seclists.org/bugtraq/2020/Jan/10
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2020/Jan/10
12
reference_url https://security.netapp.com/advisory/ntap-20191004-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20191004-0001/
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1760100
reference_id 1760100
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1760100
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-15917
reference_id CVE-2019-15917
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
1
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-15917
19
reference_url https://access.redhat.com/errata/RHSA-2020:2854
reference_id RHSA-2020:2854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2854
20
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
21
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
22
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
23
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
24
reference_url https://access.redhat.com/errata/RHSA-2021:0019
reference_id RHSA-2021:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0019
fixed_packages
aliases CVE-2019-15917
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rpmj-nmbd-b7gc
35
url VCID-rsce-drrq-23ey
vulnerability_id VCID-rsce-drrq-23ey
summary kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
1
reference_url http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19062.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19062.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19062
reference_id
reference_type
scores
0
value 0.00098
scoring_system epss
scoring_elements 0.27018
published_at 2026-04-01T12:55:00Z
1
value 0.00098
scoring_system epss
scoring_elements 0.26725
published_at 2026-04-29T12:55:00Z
2
value 0.00098
scoring_system epss
scoring_elements 0.26849
published_at 2026-04-21T12:55:00Z
3
value 0.00098
scoring_system epss
scoring_elements 0.26799
published_at 2026-04-24T12:55:00Z
4
value 0.00098
scoring_system epss
scoring_elements 0.26792
published_at 2026-04-26T12:55:00Z
5
value 0.00098
scoring_system epss
scoring_elements 0.27058
published_at 2026-04-02T12:55:00Z
6
value 0.00098
scoring_system epss
scoring_elements 0.27094
published_at 2026-04-04T12:55:00Z
7
value 0.00098
scoring_system epss
scoring_elements 0.26882
published_at 2026-04-07T12:55:00Z
8
value 0.00098
scoring_system epss
scoring_elements 0.26951
published_at 2026-04-08T12:55:00Z
9
value 0.00098
scoring_system epss
scoring_elements 0.26996
published_at 2026-04-09T12:55:00Z
10
value 0.00098
scoring_system epss
scoring_elements 0.27
published_at 2026-04-11T12:55:00Z
11
value 0.00098
scoring_system epss
scoring_elements 0.26955
published_at 2026-04-12T12:55:00Z
12
value 0.00098
scoring_system epss
scoring_elements 0.26899
published_at 2026-04-13T12:55:00Z
13
value 0.00098
scoring_system epss
scoring_elements 0.26909
published_at 2026-04-16T12:55:00Z
14
value 0.00098
scoring_system epss
scoring_elements 0.26885
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19062
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19062
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19062
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/torvalds/linux/commit/ffdde5932042600c6807d46c1550b28b0db6a3bc
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/ffdde5932042600c6807d46c1550b28b0db6a3bc
7
reference_url https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
8
reference_url https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
11
reference_url https://seclists.org/bugtraq/2020/Jan/10
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2020/Jan/10
12
reference_url https://security.netapp.com/advisory/ntap-20191205-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20191205-0001/
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1775021
reference_id 1775021
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1775021
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-19062
reference_id CVE-2019-19062
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
1
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-19062
26
reference_url https://access.redhat.com/errata/RHSA-2020:2854
reference_id RHSA-2020:2854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2854
27
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
28
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
29
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
30
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
31
reference_url https://usn.ubuntu.com/4254-1/
reference_id USN-4254-1
reference_type
scores
url https://usn.ubuntu.com/4254-1/
32
reference_url https://usn.ubuntu.com/4254-2/
reference_id USN-4254-2
reference_type
scores
url https://usn.ubuntu.com/4254-2/
33
reference_url https://usn.ubuntu.com/4258-1/
reference_id USN-4258-1
reference_type
scores
url https://usn.ubuntu.com/4258-1/
34
reference_url https://usn.ubuntu.com/4284-1/
reference_id USN-4284-1
reference_type
scores
url https://usn.ubuntu.com/4284-1/
35
reference_url https://usn.ubuntu.com/4287-1/
reference_id USN-4287-1
reference_type
scores
url https://usn.ubuntu.com/4287-1/
36
reference_url https://usn.ubuntu.com/4287-2/
reference_id USN-4287-2
reference_type
scores
url https://usn.ubuntu.com/4287-2/
fixed_packages
aliases CVE-2019-19062
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rsce-drrq-23ey
36
url VCID-s1tt-z4fw-tkd8
vulnerability_id VCID-s1tt-z4fw-tkd8
summary kernel: memory leak in mwifiex_tm_cmd in drivers/net/wireless/marvell/mwifiex/cfg80211.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20095.json
reference_id
reference_type
scores
0
value 5.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20095.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-20095
reference_id
reference_type
scores
0
value 0.00131
scoring_system epss
scoring_elements 0.32516
published_at 2026-04-21T12:55:00Z
1
value 0.00131
scoring_system epss
scoring_elements 0.32665
published_at 2026-04-02T12:55:00Z
2
value 0.00131
scoring_system epss
scoring_elements 0.327
published_at 2026-04-04T12:55:00Z
3
value 0.00131
scoring_system epss
scoring_elements 0.32522
published_at 2026-04-07T12:55:00Z
4
value 0.00131
scoring_system epss
scoring_elements 0.32569
published_at 2026-04-16T12:55:00Z
5
value 0.00131
scoring_system epss
scoring_elements 0.32596
published_at 2026-04-09T12:55:00Z
6
value 0.00131
scoring_system epss
scoring_elements 0.32598
published_at 2026-04-11T12:55:00Z
7
value 0.00131
scoring_system epss
scoring_elements 0.3256
published_at 2026-04-12T12:55:00Z
8
value 0.00131
scoring_system epss
scoring_elements 0.32533
published_at 2026-04-13T12:55:00Z
9
value 0.00131
scoring_system epss
scoring_elements 0.32548
published_at 2026-04-18T12:55:00Z
10
value 0.00131
scoring_system epss
scoring_elements 0.32346
published_at 2026-04-24T12:55:00Z
11
value 0.00131
scoring_system epss
scoring_elements 0.32231
published_at 2026-04-26T12:55:00Z
12
value 0.00131
scoring_system epss
scoring_elements 0.32146
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-20095
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20095
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1791954
reference_id 1791954
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1791954
5
reference_url https://access.redhat.com/errata/RHSA-2020:1493
reference_id RHSA-2020:1493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1493
6
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
7
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
fixed_packages
aliases CVE-2019-20095
risk_score 2.4
exploitability 0.5
weighted_severity 4.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s1tt-z4fw-tkd8
37
url VCID-sagp-jcer-mbh1
vulnerability_id VCID-sagp-jcer-mbh1
summary kernel: NFS client crash due to index buffer overflow during Direct IO write causing kernel panic
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10742.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10742.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-10742
reference_id
reference_type
scores
0
value 0.00051
scoring_system epss
scoring_elements 0.15841
published_at 2026-04-01T12:55:00Z
1
value 0.00051
scoring_system epss
scoring_elements 0.15907
published_at 2026-04-02T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.15969
published_at 2026-04-04T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.15769
published_at 2026-04-07T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.15854
published_at 2026-04-08T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.15916
published_at 2026-04-09T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.1589
published_at 2026-04-11T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.15852
published_at 2026-04-12T12:55:00Z
8
value 0.00051
scoring_system epss
scoring_elements 0.15783
published_at 2026-04-13T12:55:00Z
9
value 0.00051
scoring_system epss
scoring_elements 0.15705
published_at 2026-04-16T12:55:00Z
10
value 0.00051
scoring_system epss
scoring_elements 0.15715
published_at 2026-04-18T12:55:00Z
11
value 0.00051
scoring_system epss
scoring_elements 0.15761
published_at 2026-04-21T12:55:00Z
12
value 0.00051
scoring_system epss
scoring_elements 0.15777
published_at 2026-04-24T12:55:00Z
13
value 0.00051
scoring_system epss
scoring_elements 0.15774
published_at 2026-04-26T12:55:00Z
14
value 0.00051
scoring_system epss
scoring_elements 0.15733
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-10742
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10742
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1835127
reference_id 1835127
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1835127
5
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
6
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
fixed_packages
aliases CVE-2020-10742
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sagp-jcer-mbh1
38
url VCID-t9t7-3jgk-37b9
vulnerability_id VCID-t9t7-3jgk-37b9
summary kernel: race condition caused by a malicious USB device in the USB character device driver layer
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19537.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19537.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19537
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.20935
published_at 2026-04-01T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.21086
published_at 2026-04-02T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.21139
published_at 2026-04-04T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.20853
published_at 2026-04-07T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.20933
published_at 2026-04-08T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.20994
published_at 2026-04-09T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.2101
published_at 2026-04-11T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.20965
published_at 2026-04-12T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.20912
published_at 2026-04-13T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.20904
published_at 2026-04-16T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.20906
published_at 2026-04-18T12:55:00Z
11
value 0.00068
scoring_system epss
scoring_elements 0.20887
published_at 2026-04-21T12:55:00Z
12
value 0.00068
scoring_system epss
scoring_elements 0.20758
published_at 2026-04-24T12:55:00Z
13
value 0.00068
scoring_system epss
scoring_elements 0.20753
published_at 2026-04-26T12:55:00Z
14
value 0.00068
scoring_system epss
scoring_elements 0.2072
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19537
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19537
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19537
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1783561
reference_id 1783561
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1783561
5
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
6
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
7
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
8
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
fixed_packages
aliases CVE-2019-19537
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t9t7-3jgk-37b9
39
url VCID-tjm8-p11j-rqfr
vulnerability_id VCID-tjm8-p11j-rqfr
summary kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19523.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19523.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19523
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.0989
published_at 2026-04-01T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.10014
published_at 2026-04-02T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.1007
published_at 2026-04-04T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.09968
published_at 2026-04-07T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.10045
published_at 2026-04-08T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.10104
published_at 2026-04-09T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.10144
published_at 2026-04-11T12:55:00Z
7
value 0.00034
scoring_system epss
scoring_elements 0.10082
published_at 2026-04-13T12:55:00Z
8
value 0.00034
scoring_system epss
scoring_elements 0.09958
published_at 2026-04-16T12:55:00Z
9
value 0.00034
scoring_system epss
scoring_elements 0.09934
published_at 2026-04-18T12:55:00Z
10
value 0.00034
scoring_system epss
scoring_elements 0.10066
published_at 2026-04-21T12:55:00Z
11
value 0.00034
scoring_system epss
scoring_elements 0.10103
published_at 2026-04-12T12:55:00Z
12
value 0.00085
scoring_system epss
scoring_elements 0.24526
published_at 2026-04-26T12:55:00Z
13
value 0.00085
scoring_system epss
scoring_elements 0.24484
published_at 2026-04-29T12:55:00Z
14
value 0.00085
scoring_system epss
scoring_elements 0.24539
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19523
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19523
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19523
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1783434
reference_id 1783434
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1783434
5
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
6
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
7
reference_url https://access.redhat.com/errata/RHSA-2021:1578
reference_id RHSA-2021:1578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1578
8
reference_url https://access.redhat.com/errata/RHSA-2021:1739
reference_id RHSA-2021:1739
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1739
fixed_packages
aliases CVE-2019-19523
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tjm8-p11j-rqfr
40
url VCID-tu42-yjfk-5kgp
vulnerability_id VCID-tu42-yjfk-5kgp
summary kernel: memory leak in ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-18808.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-18808.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-18808
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03658
published_at 2026-04-01T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03829
published_at 2026-04-29T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03776
published_at 2026-04-21T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03779
published_at 2026-04-24T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03781
published_at 2026-04-26T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03706
published_at 2026-04-02T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03717
published_at 2026-04-04T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03731
published_at 2026-04-07T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03734
published_at 2026-04-08T12:55:00Z
9
value 0.00016
scoring_system epss
scoring_elements 0.03757
published_at 2026-04-09T12:55:00Z
10
value 0.00016
scoring_system epss
scoring_elements 0.03716
published_at 2026-04-11T12:55:00Z
11
value 0.00016
scoring_system epss
scoring_elements 0.03693
published_at 2026-04-12T12:55:00Z
12
value 0.00016
scoring_system epss
scoring_elements 0.03667
published_at 2026-04-13T12:55:00Z
13
value 0.00016
scoring_system epss
scoring_elements 0.03644
published_at 2026-04-16T12:55:00Z
14
value 0.00016
scoring_system epss
scoring_elements 0.03654
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-18808
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18808
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/torvalds/linux/commit/128c66429247add5128c03dc1e144ca56f05a4e2
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/128c66429247add5128c03dc1e144ca56f05a4e2
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/
8
reference_url https://security.netapp.com/advisory/ntap-20191205-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20191205-0001/
9
reference_url http://www.openwall.com/lists/oss-security/2021/09/14/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2021/09/14/1
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1777418
reference_id 1777418
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1777418
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-18808
reference_id CVE-2019-18808
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-18808
20
reference_url https://access.redhat.com/errata/RHSA-2020:2854
reference_id RHSA-2020:2854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2854
21
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
22
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
23
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
24
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
25
reference_url https://usn.ubuntu.com/4525-1/
reference_id USN-4525-1
reference_type
scores
url https://usn.ubuntu.com/4525-1/
26
reference_url https://usn.ubuntu.com/4526-1/
reference_id USN-4526-1
reference_type
scores
url https://usn.ubuntu.com/4526-1/
fixed_packages
aliases CVE-2019-18808
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tu42-yjfk-5kgp
41
url VCID-uw8x-rzh9-7uh7
vulnerability_id VCID-uw8x-rzh9-7uh7
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10751.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10751.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-10751
reference_id
reference_type
scores
0
value 0.00084
scoring_system epss
scoring_elements 0.24474
published_at 2026-04-08T12:55:00Z
1
value 0.00084
scoring_system epss
scoring_elements 0.24593
published_at 2026-04-02T12:55:00Z
2
value 0.00084
scoring_system epss
scoring_elements 0.24629
published_at 2026-04-04T12:55:00Z
3
value 0.00084
scoring_system epss
scoring_elements 0.24405
published_at 2026-04-07T12:55:00Z
4
value 0.00084
scoring_system epss
scoring_elements 0.24518
published_at 2026-04-09T12:55:00Z
5
value 0.00084
scoring_system epss
scoring_elements 0.24533
published_at 2026-04-11T12:55:00Z
6
value 0.00084
scoring_system epss
scoring_elements 0.24489
published_at 2026-04-12T12:55:00Z
7
value 0.00084
scoring_system epss
scoring_elements 0.24432
published_at 2026-04-13T12:55:00Z
8
value 0.00084
scoring_system epss
scoring_elements 0.24448
published_at 2026-04-16T12:55:00Z
9
value 0.00084
scoring_system epss
scoring_elements 0.24442
published_at 2026-04-18T12:55:00Z
10
value 0.00084
scoring_system epss
scoring_elements 0.24417
published_at 2026-04-21T12:55:00Z
11
value 0.00084
scoring_system epss
scoring_elements 0.24301
published_at 2026-04-24T12:55:00Z
12
value 0.00084
scoring_system epss
scoring_elements 0.24287
published_at 2026-04-26T12:55:00Z
13
value 0.00084
scoring_system epss
scoring_elements 0.24247
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-10751
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3016
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12768
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
35
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1839634
reference_id 1839634
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1839634
37
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
38
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
39
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
40
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
41
reference_url https://usn.ubuntu.com/4389-1/
reference_id USN-4389-1
reference_type
scores
url https://usn.ubuntu.com/4389-1/
42
reference_url https://usn.ubuntu.com/4390-1/
reference_id USN-4390-1
reference_type
scores
url https://usn.ubuntu.com/4390-1/
43
reference_url https://usn.ubuntu.com/4391-1/
reference_id USN-4391-1
reference_type
scores
url https://usn.ubuntu.com/4391-1/
44
reference_url https://usn.ubuntu.com/4412-1/
reference_id USN-4412-1
reference_type
scores
url https://usn.ubuntu.com/4412-1/
45
reference_url https://usn.ubuntu.com/4413-1/
reference_id USN-4413-1
reference_type
scores
url https://usn.ubuntu.com/4413-1/
fixed_packages
aliases CVE-2020-10751
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uw8x-rzh9-7uh7
42
url VCID-v6zz-z6u7-7kaa
vulnerability_id VCID-v6zz-z6u7-7kaa
summary kernel: memory leak in the nl80211_get_ftm_responder_stats() function in net/wireless/nl80211.c allows DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19055.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19055.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19055
reference_id
reference_type
scores
0
value 0.00096
scoring_system epss
scoring_elements 0.26633
published_at 2026-04-01T12:55:00Z
1
value 0.00096
scoring_system epss
scoring_elements 0.26343
published_at 2026-04-29T12:55:00Z
2
value 0.00096
scoring_system epss
scoring_elements 0.26465
published_at 2026-04-21T12:55:00Z
3
value 0.00096
scoring_system epss
scoring_elements 0.26405
published_at 2026-04-24T12:55:00Z
4
value 0.00096
scoring_system epss
scoring_elements 0.26399
published_at 2026-04-26T12:55:00Z
5
value 0.00096
scoring_system epss
scoring_elements 0.26679
published_at 2026-04-02T12:55:00Z
6
value 0.00096
scoring_system epss
scoring_elements 0.2672
published_at 2026-04-04T12:55:00Z
7
value 0.00096
scoring_system epss
scoring_elements 0.26505
published_at 2026-04-18T12:55:00Z
8
value 0.00096
scoring_system epss
scoring_elements 0.26573
published_at 2026-04-08T12:55:00Z
9
value 0.00096
scoring_system epss
scoring_elements 0.26622
published_at 2026-04-09T12:55:00Z
10
value 0.00096
scoring_system epss
scoring_elements 0.26627
published_at 2026-04-11T12:55:00Z
11
value 0.00096
scoring_system epss
scoring_elements 0.26582
published_at 2026-04-12T12:55:00Z
12
value 0.00096
scoring_system epss
scoring_elements 0.26525
published_at 2026-04-13T12:55:00Z
13
value 0.00096
scoring_system epss
scoring_elements 0.26532
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19055
2
reference_url https://bugzilla.suse.com/show_bug.cgi?id=1157319
reference_id
reference_type
scores
url https://bugzilla.suse.com/show_bug.cgi?id=1157319
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19055
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19055
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/torvalds/linux/commit/1399c59fa92984836db90538cf92397fe7caaa57
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/1399c59fa92984836db90538cf92397fe7caaa57
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1775074
reference_id 1775074
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1775074
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-19055
reference_id CVE-2019-19055
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-19055
16
reference_url https://access.redhat.com/errata/RHSA-2020:1567
reference_id RHSA-2020:1567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1567
17
reference_url https://access.redhat.com/errata/RHSA-2020:1769
reference_id RHSA-2020:1769
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1769
18
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
19
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
20
reference_url https://usn.ubuntu.com/4225-1/
reference_id USN-4225-1
reference_type
scores
url https://usn.ubuntu.com/4225-1/
21
reference_url https://usn.ubuntu.com/4225-2/
reference_id USN-4225-2
reference_type
scores
url https://usn.ubuntu.com/4225-2/
22
reference_url https://usn.ubuntu.com/4226-1/
reference_id USN-4226-1
reference_type
scores
url https://usn.ubuntu.com/4226-1/
fixed_packages
aliases CVE-2019-19055
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v6zz-z6u7-7kaa
43
url VCID-wh7x-9qu2-t7hy
vulnerability_id VCID-wh7x-9qu2-t7hy
summary kernel: use-after-free caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19530.json
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19530.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19530
reference_id
reference_type
scores
0
value 0.00077
scoring_system epss
scoring_elements 0.22927
published_at 2026-04-01T12:55:00Z
1
value 0.00077
scoring_system epss
scoring_elements 0.23094
published_at 2026-04-02T12:55:00Z
2
value 0.00077
scoring_system epss
scoring_elements 0.23139
published_at 2026-04-04T12:55:00Z
3
value 0.00077
scoring_system epss
scoring_elements 0.2293
published_at 2026-04-07T12:55:00Z
4
value 0.00077
scoring_system epss
scoring_elements 0.23003
published_at 2026-04-08T12:55:00Z
5
value 0.00077
scoring_system epss
scoring_elements 0.23055
published_at 2026-04-09T12:55:00Z
6
value 0.00077
scoring_system epss
scoring_elements 0.23076
published_at 2026-04-11T12:55:00Z
7
value 0.00077
scoring_system epss
scoring_elements 0.23039
published_at 2026-04-12T12:55:00Z
8
value 0.00077
scoring_system epss
scoring_elements 0.22983
published_at 2026-04-13T12:55:00Z
9
value 0.00077
scoring_system epss
scoring_elements 0.22996
published_at 2026-04-16T12:55:00Z
10
value 0.00077
scoring_system epss
scoring_elements 0.22988
published_at 2026-04-18T12:55:00Z
11
value 0.00077
scoring_system epss
scoring_elements 0.22951
published_at 2026-04-21T12:55:00Z
12
value 0.00077
scoring_system epss
scoring_elements 0.22782
published_at 2026-04-24T12:55:00Z
13
value 0.00077
scoring_system epss
scoring_elements 0.22777
published_at 2026-04-26T12:55:00Z
14
value 0.00077
scoring_system epss
scoring_elements 0.22771
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19530
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19530
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19530
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1783518
reference_id 1783518
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1783518
5
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
6
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
fixed_packages
aliases CVE-2019-19530
risk_score 2.5
exploitability 0.5
weighted_severity 5.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wh7x-9qu2-t7hy
44
url VCID-wjxm-be93-pbeg
vulnerability_id VCID-wjxm-be93-pbeg
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12770.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12770.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12770
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.12932
published_at 2026-04-01T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.13023
published_at 2026-04-02T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.13074
published_at 2026-04-04T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12875
published_at 2026-04-07T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12953
published_at 2026-04-08T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.13004
published_at 2026-04-09T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.12965
published_at 2026-04-11T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.12929
published_at 2026-04-12T12:55:00Z
8
value 0.00042
scoring_system epss
scoring_elements 0.12885
published_at 2026-04-13T12:55:00Z
9
value 0.00042
scoring_system epss
scoring_elements 0.12787
published_at 2026-04-16T12:55:00Z
10
value 0.00042
scoring_system epss
scoring_elements 0.1279
published_at 2026-04-18T12:55:00Z
11
value 0.00042
scoring_system epss
scoring_elements 0.1289
published_at 2026-04-21T12:55:00Z
12
value 0.00042
scoring_system epss
scoring_elements 0.12913
published_at 2026-04-24T12:55:00Z
13
value 0.00042
scoring_system epss
scoring_elements 0.12878
published_at 2026-04-26T12:55:00Z
14
value 0.00042
scoring_system epss
scoring_elements 0.12772
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12770
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3016
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12768
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
35
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1834845
reference_id 1834845
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1834845
37
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
38
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
39
reference_url https://access.redhat.com/errata/RHSA-2020:4431
reference_id RHSA-2020:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4431
40
reference_url https://access.redhat.com/errata/RHSA-2020:4609
reference_id RHSA-2020:4609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4609
41
reference_url https://access.redhat.com/errata/RHSA-2020:5206
reference_id RHSA-2020:5206
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5206
42
reference_url https://access.redhat.com/errata/RHSA-2020:5430
reference_id RHSA-2020:5430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5430
43
reference_url https://access.redhat.com/errata/RHSA-2020:5656
reference_id RHSA-2020:5656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5656
44
reference_url https://usn.ubuntu.com/4411-1/
reference_id USN-4411-1
reference_type
scores
url https://usn.ubuntu.com/4411-1/
45
reference_url https://usn.ubuntu.com/4412-1/
reference_id USN-4412-1
reference_type
scores
url https://usn.ubuntu.com/4412-1/
46
reference_url https://usn.ubuntu.com/4413-1/
reference_id USN-4413-1
reference_type
scores
url https://usn.ubuntu.com/4413-1/
47
reference_url https://usn.ubuntu.com/4414-1/
reference_id USN-4414-1
reference_type
scores
url https://usn.ubuntu.com/4414-1/
48
reference_url https://usn.ubuntu.com/4419-1/
reference_id USN-4419-1
reference_type
scores
url https://usn.ubuntu.com/4419-1/
fixed_packages
aliases CVE-2020-12770
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wjxm-be93-pbeg
45
url VCID-zpb5-rk45-dqbs
vulnerability_id VCID-zpb5-rk45-dqbs
summary kernel: Multiple memory leaks in the iwl_pcie_ctxt_info_gen3_init() function in drivers/net/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c allows for a DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19059.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19059.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19059
reference_id
reference_type
scores
0
value 0.00096
scoring_system epss
scoring_elements 0.26586
published_at 2026-04-01T12:55:00Z
1
value 0.00096
scoring_system epss
scoring_elements 0.26578
published_at 2026-04-09T12:55:00Z
2
value 0.00096
scoring_system epss
scoring_elements 0.26529
published_at 2026-04-08T12:55:00Z
3
value 0.00096
scoring_system epss
scoring_elements 0.26585
published_at 2026-04-11T12:55:00Z
4
value 0.00096
scoring_system epss
scoring_elements 0.26539
published_at 2026-04-12T12:55:00Z
5
value 0.00096
scoring_system epss
scoring_elements 0.26481
published_at 2026-04-13T12:55:00Z
6
value 0.00096
scoring_system epss
scoring_elements 0.26488
published_at 2026-04-16T12:55:00Z
7
value 0.00096
scoring_system epss
scoring_elements 0.26423
published_at 2026-04-21T12:55:00Z
8
value 0.00096
scoring_system epss
scoring_elements 0.26632
published_at 2026-04-02T12:55:00Z
9
value 0.00096
scoring_system epss
scoring_elements 0.26676
published_at 2026-04-04T12:55:00Z
10
value 0.00096
scoring_system epss
scoring_elements 0.26461
published_at 2026-04-18T12:55:00Z
11
value 0.00099
scoring_system epss
scoring_elements 0.27329
published_at 2026-04-26T12:55:00Z
12
value 0.00099
scoring_system epss
scoring_elements 0.27252
published_at 2026-04-29T12:55:00Z
13
value 0.00099
scoring_system epss
scoring_elements 0.27434
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19059
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19059
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19059
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/torvalds/linux/commit/0f4f199443faca715523b0659aa536251d8b978f
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/0f4f199443faca715523b0659aa536251d8b978f
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
7
reference_url https://security.netapp.com/advisory/ntap-20191205-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20191205-0001/
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1775042
reference_id 1775042
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1775042
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-19059
reference_id CVE-2019-19059
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
1
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-19059
15
reference_url https://access.redhat.com/errata/RHSA-2020:1567
reference_id RHSA-2020:1567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1567
16
reference_url https://access.redhat.com/errata/RHSA-2020:1769
reference_id RHSA-2020:1769
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1769
17
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
18
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
19
reference_url https://usn.ubuntu.com/4300-1/
reference_id USN-4300-1
reference_type
scores
url https://usn.ubuntu.com/4300-1/
20
reference_url https://usn.ubuntu.com/4301-1/
reference_id USN-4301-1
reference_type
scores
url https://usn.ubuntu.com/4301-1/
fixed_packages
aliases CVE-2019-19059
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zpb5-rk45-dqbs
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@3.10.0-1160%3Farch=el7