{"url":"http://public2.vulnerablecode.io/api/packages/103144?format=json","purl":"pkg:rpm/redhat/kernel@3.10.0-1062.26.1?arch=el7","type":"rpm","namespace":"redhat","name":"kernel","version":"3.10.0-1062.26.1","qualifiers":{"arch":"el7"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83721?format=json","vulnerability_id":"VCID-11nf-xxx4-4yfw","summary":"kernel: denial of service via ioctl call in network tun handling","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7191.json","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7191.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-7191","reference_id":"","reference_type":"","scores":[{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22142","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22363","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2231","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22161","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22149","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22539","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.2267","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22687","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22646","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22591","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22606","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22535","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22616","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22708","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22752","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-7191"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7191","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7191"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1716328","reference_id":"1716328","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1716328"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1016","reference_id":"RHSA-2020:1016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1070","reference_id":"RHSA-2020:1070","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1070"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2522","reference_id":"RHSA-2020:2522","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2522"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2851","reference_id":"RHSA-2020:2851","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2851"}],"fixed_packages":[],"aliases":["CVE-2018-7191"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-11nf-xxx4-4yfw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63426?format=json","vulnerability_id":"VCID-1uta-n239-s7e1","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10639.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10639.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10639","reference_id":"","reference_type":"","scores":[{"value":"0.01051","scoring_system":"epss","scoring_elements":"0.77486","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01051","scoring_system":"epss","scoring_elements":"0.77492","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01051","scoring_system":"epss","scoring_elements":"0.77518","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01051","scoring_system":"epss","scoring_elements":"0.77498","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01051","scoring_system":"epss","scoring_elements":"0.77527","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01051","scoring_system":"epss","scoring_elements":"0.77537","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01051","scoring_system":"epss","scoring_elements":"0.77562","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01051","scoring_system":"epss","scoring_elements":"0.77547","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01051","scoring_system":"epss","scoring_elements":"0.77544","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01051","scoring_system":"epss","scoring_elements":"0.77583","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01051","scoring_system":"epss","scoring_elements":"0.77581","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01051","scoring_system":"epss","scoring_elements":"0.77574","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01051","scoring_system":"epss","scoring_elements":"0.77609","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01051","scoring_system":"epss","scoring_elements":"0.77616","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01051","scoring_system":"epss","scoring_elements":"0.7763","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10639"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8553","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8553"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5995","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5995"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10639","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10639"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15239","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15239"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3882","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3882"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3900","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3900"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1729933","reference_id":"1729933","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1729933"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1016","reference_id":"RHSA-2020:1016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1070","reference_id":"RHSA-2020:1070","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1070"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1567","reference_id":"RHSA-2020:1567","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1567"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1769","reference_id":"RHSA-2020:1769","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1769"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2522","reference_id":"RHSA-2020:2522","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2522"},{"reference_url":"https://usn.ubuntu.com/4115-1/","reference_id":"USN-4115-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4115-1/"},{"reference_url":"https://usn.ubuntu.com/4118-1/","reference_id":"USN-4118-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4118-1/"}],"fixed_packages":[],"aliases":["CVE-2019-10639"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1uta-n239-s7e1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82517?format=json","vulnerability_id":"VCID-9jgx-kua4-q3bk","summary":"kernel: unchecked kstrdup of fwstr in drm_load_edid_firmware leads to denial of service","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12382.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12382.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-12382","reference_id":"","reference_type":"","scores":[{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.2957","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30646","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30782","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.3083","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30648","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30706","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30737","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30741","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30696","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30652","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30677","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.3066","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30626","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30446","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30332","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-12382"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12382","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12382"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1715554","reference_id":"1715554","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1715554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3517","reference_id":"RHSA-2019:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1016","reference_id":"RHSA-2020:1016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1070","reference_id":"RHSA-2020:1070","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1070"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2522","reference_id":"RHSA-2020:2522","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2522"}],"fixed_packages":[],"aliases":["CVE-2019-12382"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9jgx-kua4-q3bk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79277?format=json","vulnerability_id":"VCID-baxd-14v9-jqc9","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10711.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10711.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10711","reference_id":"","reference_type":"","scores":[{"value":"0.05438","scoring_system":"epss","scoring_elements":"0.90132","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05438","scoring_system":"epss","scoring_elements":"0.90135","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05438","scoring_system":"epss","scoring_elements":"0.90147","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05438","scoring_system":"epss","scoring_elements":"0.90152","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05438","scoring_system":"epss","scoring_elements":"0.90167","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05438","scoring_system":"epss","scoring_elements":"0.90172","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05438","scoring_system":"epss","scoring_elements":"0.90181","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05438","scoring_system":"epss","scoring_elements":"0.9018","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05438","scoring_system":"epss","scoring_elements":"0.90175","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05438","scoring_system":"epss","scoring_elements":"0.90193","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05438","scoring_system":"epss","scoring_elements":"0.90189","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05438","scoring_system":"epss","scoring_elements":"0.90204","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05438","scoring_system":"epss","scoring_elements":"0.90203","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05438","scoring_system":"epss","scoring_elements":"0.902","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3016","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12768","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12768"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1825116","reference_id":"1825116","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1825116"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2082","reference_id":"RHSA-2020:2082","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2082"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2085","reference_id":"RHSA-2020:2085","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2085"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2102","reference_id":"RHSA-2020:2102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2103","reference_id":"RHSA-2020:2103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2104","reference_id":"RHSA-2020:2104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2125","reference_id":"RHSA-2020:2125","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2125"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2171","reference_id":"RHSA-2020:2171","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2171"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2199","reference_id":"RHSA-2020:2199","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2199"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2203","reference_id":"RHSA-2020:2203","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2203"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2214","reference_id":"RHSA-2020:2214","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2214"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2242","reference_id":"RHSA-2020:2242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2277","reference_id":"RHSA-2020:2277","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2277"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2285","reference_id":"RHSA-2020:2285","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2285"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2289","reference_id":"RHSA-2020:2289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2291","reference_id":"RHSA-2020:2291","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2291"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2429","reference_id":"RHSA-2020:2429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2519","reference_id":"RHSA-2020:2519","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2519"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2522","reference_id":"RHSA-2020:2522","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2522"},{"reference_url":"https://usn.ubuntu.com/4411-1/","reference_id":"USN-4411-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4411-1/"},{"reference_url":"https://usn.ubuntu.com/4412-1/","reference_id":"USN-4412-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4412-1/"},{"reference_url":"https://usn.ubuntu.com/4413-1/","reference_id":"USN-4413-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4413-1/"},{"reference_url":"https://usn.ubuntu.com/4414-1/","reference_id":"USN-4414-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4414-1/"},{"reference_url":"https://usn.ubuntu.com/4419-1/","reference_id":"USN-4419-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4419-1/"}],"fixed_packages":[],"aliases":["CVE-2020-10711"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-baxd-14v9-jqc9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82123?format=json","vulnerability_id":"VCID-cjcd-saft-fqds","summary":"kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15916.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15916.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-15916","reference_id":"","reference_type":"","scores":[{"value":"0.02564","scoring_system":"epss","scoring_elements":"0.85576","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02564","scoring_system":"epss","scoring_elements":"0.85522","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02564","scoring_system":"epss","scoring_elements":"0.85545","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02564","scoring_system":"epss","scoring_elements":"0.8555","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02564","scoring_system":"epss","scoring_elements":"0.85546","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02564","scoring_system":"epss","scoring_elements":"0.85568","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02564","scoring_system":"epss","scoring_elements":"0.85578","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02564","scoring_system":"epss","scoring_elements":"0.85484","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02564","scoring_system":"epss","scoring_elements":"0.85504","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02564","scoring_system":"epss","scoring_elements":"0.85512","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02564","scoring_system":"epss","scoring_elements":"0.85527","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02564","scoring_system":"epss","scoring_elements":"0.85525","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02605","scoring_system":"epss","scoring_elements":"0.85565","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02605","scoring_system":"epss","scoring_elements":"0.85583","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02605","scoring_system":"epss","scoring_elements":"0.85553","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-15916"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.1","reference_id":"","reference_type":"","scores":[],"url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.1"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15916","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15916"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=895a5e96dbd6386c8e78e5b78e067dcc67b7f0ab","reference_id":"","reference_type":"","scores":[],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=895a5e96dbd6386c8e78e5b78e067dcc67b7f0ab"},{"reference_url":"https://security.netapp.com/advisory/ntap-20191004-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20191004-0001/"},{"reference_url":"https://support.f5.com/csp/article/K57418558?utm_source=f5support&amp%3Butm_medium=RSS","reference_id":"","reference_type":"","scores":[],"url":"https://support.f5.com/csp/article/K57418558?utm_source=f5support&amp%3Butm_medium=RSS"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1750813","reference_id":"1750813","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1750813"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-15916","reference_id":"CVE-2019-15916","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:C"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-15916"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3309","reference_id":"RHSA-2019:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3517","reference_id":"RHSA-2019:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0740","reference_id":"RHSA-2020:0740","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0740"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1016","reference_id":"RHSA-2020:1016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1070","reference_id":"RHSA-2020:1070","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1070"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2522","reference_id":"RHSA-2020:2522","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2522"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2851","reference_id":"RHSA-2020:2851","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2851"}],"fixed_packages":[],"aliases":["CVE-2019-15916"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cjcd-saft-fqds"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79041?format=json","vulnerability_id":"VCID-et66-rjvp-3uhf","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9503.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9503.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9503","reference_id":"","reference_type":"","scores":[{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66501","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.6654","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66565","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66537","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66585","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66599","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66617","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66605","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66573","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66609","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66627","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66611","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66636","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.6665","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9503"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10126","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10126"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11486","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11486"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11815","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11833","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11833"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11884","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11884"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3846","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3846"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5489","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9503","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9503"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1701842","reference_id":"1701842","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1701842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2703","reference_id":"RHSA-2019:2703","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2703"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2741","reference_id":"RHSA-2019:2741","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2741"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1016","reference_id":"RHSA-2020:1016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1070","reference_id":"RHSA-2020:1070","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1070"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2522","reference_id":"RHSA-2020:2522","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2522"},{"reference_url":"https://usn.ubuntu.com/3979-1/","reference_id":"USN-3979-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3979-1/"},{"reference_url":"https://usn.ubuntu.com/3980-1/","reference_id":"USN-3980-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3980-1/"},{"reference_url":"https://usn.ubuntu.com/3980-2/","reference_id":"USN-3980-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3980-2/"},{"reference_url":"https://usn.ubuntu.com/3981-1/","reference_id":"USN-3981-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3981-1/"},{"reference_url":"https://usn.ubuntu.com/3981-2/","reference_id":"USN-3981-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3981-2/"},{"reference_url":"https://usn.ubuntu.com/4076-1/","reference_id":"USN-4076-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4076-1/"},{"reference_url":"https://usn.ubuntu.com/4095-1/","reference_id":"USN-4095-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4095-1/"}],"fixed_packages":[],"aliases":["CVE-2019-9503"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-et66-rjvp-3uhf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85203?format=json","vulnerability_id":"VCID-fb43-v8p6-wqbb","summary":"kernel: perf_event_open() and execve() race in setuid programs allows a data leak","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3901.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3901.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3901","reference_id":"","reference_type":"","scores":[{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20974","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21129","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21183","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20896","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20977","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21038","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21055","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.2101","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20958","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20946","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20926","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20796","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20791","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20759","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3901"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3901","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3901"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1701245","reference_id":"1701245","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1701245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1016","reference_id":"RHSA-2020:1016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1070","reference_id":"RHSA-2020:1070","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1070"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2522","reference_id":"RHSA-2020:2522","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2522"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2851","reference_id":"RHSA-2020:2851","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2851"}],"fixed_packages":[],"aliases":["CVE-2019-3901"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fb43-v8p6-wqbb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79268?format=json","vulnerability_id":"VCID-fb84-2es5-q3hc","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19768.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19768.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19768","reference_id":"","reference_type":"","scores":[{"value":"0.01401","scoring_system":"epss","scoring_elements":"0.80372","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01401","scoring_system":"epss","scoring_elements":"0.80378","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01401","scoring_system":"epss","scoring_elements":"0.80398","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01401","scoring_system":"epss","scoring_elements":"0.80387","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01401","scoring_system":"epss","scoring_elements":"0.80416","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01401","scoring_system":"epss","scoring_elements":"0.80426","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01401","scoring_system":"epss","scoring_elements":"0.80445","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01401","scoring_system":"epss","scoring_elements":"0.8043","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01401","scoring_system":"epss","scoring_elements":"0.80423","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01401","scoring_system":"epss","scoring_elements":"0.80453","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01401","scoring_system":"epss","scoring_elements":"0.80454","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01401","scoring_system":"epss","scoring_elements":"0.80457","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01401","scoring_system":"epss","scoring_elements":"0.80482","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01401","scoring_system":"epss","scoring_elements":"0.80488","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01401","scoring_system":"epss","scoring_elements":"0.80505","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19768"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1786164","reference_id":"1786164","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1786164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1567","reference_id":"RHSA-2020:1567","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1567"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1769","reference_id":"RHSA-2020:1769","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1769"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1966","reference_id":"RHSA-2020:1966","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1966"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2082","reference_id":"RHSA-2020:2082","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2082"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2085","reference_id":"RHSA-2020:2085","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2085"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2104","reference_id":"RHSA-2020:2104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2199","reference_id":"RHSA-2020:2199","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2199"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2203","reference_id":"RHSA-2020:2203","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2203"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2214","reference_id":"RHSA-2020:2214","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2214"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2242","reference_id":"RHSA-2020:2242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2277","reference_id":"RHSA-2020:2277","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2277"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2285","reference_id":"RHSA-2020:2285","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2285"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2289","reference_id":"RHSA-2020:2289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2291","reference_id":"RHSA-2020:2291","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2291"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2519","reference_id":"RHSA-2020:2519","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2519"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2522","reference_id":"RHSA-2020:2522","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2522"},{"reference_url":"https://usn.ubuntu.com/4342-1/","reference_id":"USN-4342-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4342-1/"},{"reference_url":"https://usn.ubuntu.com/4344-1/","reference_id":"USN-4344-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4344-1/"},{"reference_url":"https://usn.ubuntu.com/4345-1/","reference_id":"USN-4345-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4345-1/"},{"reference_url":"https://usn.ubuntu.com/4346-1/","reference_id":"USN-4346-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4346-1/"}],"fixed_packages":[],"aliases":["CVE-2019-19768"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fb84-2es5-q3hc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82435?format=json","vulnerability_id":"VCID-hmp6-1pt2-3udk","summary":"kernel: use-after-free in arch/x86/lib/insn-eval.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-13233.json","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-13233.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-13233","reference_id":"","reference_type":"","scores":[{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16319","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16471","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16365","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16363","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17025","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16896","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16954","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16928","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16882","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16824","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16758","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16764","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16801","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16807","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16969","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-13233"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12984","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12984"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13233","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13233"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1999"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1727756","reference_id":"1727756","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1727756"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3309","reference_id":"RHSA-2019:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3517","reference_id":"RHSA-2019:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1016","reference_id":"RHSA-2020:1016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1070","reference_id":"RHSA-2020:1070","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1070"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2522","reference_id":"RHSA-2020:2522","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2522"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2851","reference_id":"RHSA-2020:2851","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2851"},{"reference_url":"https://usn.ubuntu.com/4093-1/","reference_id":"USN-4093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4093-1/"},{"reference_url":"https://usn.ubuntu.com/4094-1/","reference_id":"USN-4094-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4094-1/"},{"reference_url":"https://usn.ubuntu.com/4117-1/","reference_id":"USN-4117-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4117-1/"},{"reference_url":"https://usn.ubuntu.com/4118-1/","reference_id":"USN-4118-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4118-1/"}],"fixed_packages":[],"aliases":["CVE-2019-13233"],"risk_score":2.3,"exploitability":"0.5","weighted_severity":"4.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hmp6-1pt2-3udk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82124?format=json","vulnerability_id":"VCID-jybz-x1kz-hyh7","summary":"kernel: double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18595.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18595.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-18595","reference_id":"","reference_type":"","scores":[{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.3191","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31519","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31897","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.3173","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31603","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.32038","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.32078","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31902","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31954","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31983","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31986","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31946","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31913","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31947","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31925","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-18595"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.11","reference_id":"","reference_type":"","scores":[],"url":"https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.11"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18595"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4397f04575c44e1440ec2e49b6302785c95fd2f8","reference_id":"","reference_type":"","scores":[],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4397f04575c44e1440ec2e49b6302785c95fd2f8"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1758671","reference_id":"1758671","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1758671"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-18595","reference_id":"CVE-2017-18595","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-18595"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2082","reference_id":"RHSA-2020:2082","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2082"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2085","reference_id":"RHSA-2020:2085","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2085"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2104","reference_id":"RHSA-2020:2104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2214","reference_id":"RHSA-2020:2214","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2214"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2242","reference_id":"RHSA-2020:2242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2277","reference_id":"RHSA-2020:2277","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2277"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2285","reference_id":"RHSA-2020:2285","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2285"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2289","reference_id":"RHSA-2020:2289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2522","reference_id":"RHSA-2020:2522","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2522"}],"fixed_packages":[],"aliases":["CVE-2017-18595"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jybz-x1kz-hyh7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63429?format=json","vulnerability_id":"VCID-s6bg-vx1j-f3av","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14283.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14283.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14283","reference_id":"","reference_type":"","scores":[{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15861","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15927","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15989","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15789","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15875","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15937","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15913","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15806","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15729","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15738","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15782","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15799","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15797","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15753","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8553","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8553"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5995","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5995"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10639","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10639"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12984","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12984"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13233","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13233"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15239","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15239"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1999"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3882","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3882"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3900","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3900"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1734243","reference_id":"1734243","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1734243"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1016","reference_id":"RHSA-2020:1016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1070","reference_id":"RHSA-2020:1070","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1070"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2522","reference_id":"RHSA-2020:2522","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2522"},{"reference_url":"https://usn.ubuntu.com/4114-1/","reference_id":"USN-4114-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4114-1/"},{"reference_url":"https://usn.ubuntu.com/4115-1/","reference_id":"USN-4115-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4115-1/"},{"reference_url":"https://usn.ubuntu.com/4116-1/","reference_id":"USN-4116-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4116-1/"},{"reference_url":"https://usn.ubuntu.com/4117-1/","reference_id":"USN-4117-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4117-1/"},{"reference_url":"https://usn.ubuntu.com/4118-1/","reference_id":"USN-4118-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4118-1/"}],"fixed_packages":[],"aliases":["CVE-2019-14283"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s6bg-vx1j-f3av"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82957?format=json","vulnerability_id":"VCID-uss1-mjb5-fqb4","summary":"kernel: usb: missing size check in the __usb_get_extra_descriptor() leading to DoS","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20169.json","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20169.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20169","reference_id":"","reference_type":"","scores":[{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.2919","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29079","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29142","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29184","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29143","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29534","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.2965","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29601","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31351","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31384","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31364","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31335","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31043","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.30965","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31165","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20169"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20169","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20169"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1660385","reference_id":"1660385","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1660385"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3309","reference_id":"RHSA-2019:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3517","reference_id":"RHSA-2019:3517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1016","reference_id":"RHSA-2020:1016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1070","reference_id":"RHSA-2020:1070","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1070"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2522","reference_id":"RHSA-2020:2522","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2522"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2770","reference_id":"RHSA-2020:2770","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2770"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2777","reference_id":"RHSA-2020:2777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2851","reference_id":"RHSA-2020:2851","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2851"},{"reference_url":"https://usn.ubuntu.com/3879-1/","reference_id":"USN-3879-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3879-1/"},{"reference_url":"https://usn.ubuntu.com/3879-2/","reference_id":"USN-3879-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3879-2/"},{"reference_url":"https://usn.ubuntu.com/4094-1/","reference_id":"USN-4094-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4094-1/"},{"reference_url":"https://usn.ubuntu.com/4118-1/","reference_id":"USN-4118-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4118-1/"}],"fixed_packages":[],"aliases":["CVE-2018-20169"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uss1-mjb5-fqb4"}],"fixing_vulnerabilities":[],"risk_score":"3.5","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@3.10.0-1062.26.1%3Farch=el7"}