{"url":"http://public2.vulnerablecode.io/api/packages/103145?format=json","purl":"pkg:rpm/redhat/kernel-alt@4.14.0-115.21.2?arch=el7a","type":"rpm","namespace":"redhat","name":"kernel-alt","version":"4.14.0-115.21.2","qualifiers":{"arch":"el7a"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79276?format=json","vulnerability_id":"VCID-1x5s-sp31-63f8","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9383.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9383.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9383","reference_id":"","reference_type":"","scores":[{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26476","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.2619","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26248","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26241","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26528","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26573","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26357","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26426","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26483","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26437","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26378","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26385","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26356","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26318","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9383"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1810685","reference_id":"1810685","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1810685"},{"reference_url":"https://security.archlinux.org/ASA-202003-6","reference_id":"ASA-202003-6","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202003-6"},{"reference_url":"https://security.archlinux.org/AVG-1108","reference_id":"AVG-1108","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2104","reference_id":"RHSA-2020:2104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4060","reference_id":"RHSA-2020:4060","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4060"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4062","reference_id":"RHSA-2020:4062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4062"},{"reference_url":"https://usn.ubuntu.com/4342-1/","reference_id":"USN-4342-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4342-1/"},{"reference_url":"https://usn.ubuntu.com/4344-1/","reference_id":"USN-4344-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4344-1/"},{"reference_url":"https://usn.ubuntu.com/4345-1/","reference_id":"USN-4345-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4345-1/"},{"reference_url":"https://usn.ubuntu.com/4346-1/","reference_id":"USN-4346-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4346-1/"}],"fixed_packages":[],"aliases":["CVE-2020-9383"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1x5s-sp31-63f8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81762?format=json","vulnerability_id":"VCID-2ed6-g4ep-yfh1","summary":"kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19447.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19447.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19447","reference_id":"","reference_type":"","scores":[{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.82153","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.82166","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.82187","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.82183","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.82209","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.82217","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.82236","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.82228","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.82223","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.82259","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.8226","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.82282","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.82293","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.82298","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19447"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19447","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19447"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1781679","reference_id":"1781679","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1781679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2104","reference_id":"RHSA-2020:2104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4060","reference_id":"RHSA-2020:4060","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4060"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4062","reference_id":"RHSA-2020:4062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4062"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4431","reference_id":"RHSA-2020:4431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4609","reference_id":"RHSA-2020:4609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5206","reference_id":"RHSA-2020:5206","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5206"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5430","reference_id":"RHSA-2020:5430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5656","reference_id":"RHSA-2020:5656","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5656"}],"fixed_packages":[],"aliases":["CVE-2019-19447"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2ed6-g4ep-yfh1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81858?format=json","vulnerability_id":"VCID-2w4w-t45z-v3bf","summary":"kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19524.json","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19524.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19524","reference_id":"","reference_type":"","scores":[{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12713","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12819","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12868","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12671","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12751","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12803","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12771","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12734","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12687","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12592","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12603","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12715","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12727","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1269","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12576","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19524"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19524","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19524"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1783459","reference_id":"1783459","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1783459"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2104","reference_id":"RHSA-2020:2104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4060","reference_id":"RHSA-2020:4060","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4060"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4062","reference_id":"RHSA-2020:4062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4062"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4431","reference_id":"RHSA-2020:4431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4609","reference_id":"RHSA-2020:4609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4609"},{"reference_url":"https://usn.ubuntu.com/4225-1/","reference_id":"USN-4225-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4225-1/"},{"reference_url":"https://usn.ubuntu.com/4225-2/","reference_id":"USN-4225-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4225-2/"},{"reference_url":"https://usn.ubuntu.com/4226-1/","reference_id":"USN-4226-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4226-1/"},{"reference_url":"https://usn.ubuntu.com/4227-1/","reference_id":"USN-4227-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4227-1/"},{"reference_url":"https://usn.ubuntu.com/4227-2/","reference_id":"USN-4227-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4227-2/"},{"reference_url":"https://usn.ubuntu.com/4228-1/","reference_id":"USN-4228-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4228-1/"},{"reference_url":"https://usn.ubuntu.com/4228-2/","reference_id":"USN-4228-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4228-2/"}],"fixed_packages":[],"aliases":["CVE-2019-19524"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2w4w-t45z-v3bf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82248?format=json","vulnerability_id":"VCID-5zsw-fkhr-3ffj","summary":"kernel: out of bounds write in function i2c_smbus_xfer_emulated in drivers/i2c/i2c-core-smbus.c","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18551.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18551.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-18551","reference_id":"","reference_type":"","scores":[{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32749","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32385","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32734","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32583","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32467","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.3288","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32915","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32737","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32784","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32811","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32812","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32775","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32748","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32789","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32765","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-18551"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.15","reference_id":"","reference_type":"","scores":[],"url":"https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.15"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18551","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18551"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89c6efa61f5709327ecfa24bff18e57a4e80c7fa","reference_id":"","reference_type":"","scores":[],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89c6efa61f5709327ecfa24bff18e57a4e80c7fa"},{"reference_url":"https://support.f5.com/csp/article/K48073202?utm_source=f5support&amp%3Butm_medium=RSS","reference_id":"","reference_type":"","scores":[],"url":"https://support.f5.com/csp/article/K48073202?utm_source=f5support&amp%3Butm_medium=RSS"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1757368","reference_id":"1757368","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1757368"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-18551","reference_id":"CVE-2017-18551","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"},{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-18551"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2104","reference_id":"RHSA-2020:2104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4060","reference_id":"RHSA-2020:4060","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4060"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4062","reference_id":"RHSA-2020:4062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4062"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5206","reference_id":"RHSA-2020:5206","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5206"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5430","reference_id":"RHSA-2020:5430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5656","reference_id":"RHSA-2020:5656","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5656"}],"fixed_packages":[],"aliases":["CVE-2017-18551"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5zsw-fkhr-3ffj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82499?format=json","vulnerability_id":"VCID-9sy3-h5gv-hkfj","summary":"kernel: null pointer dereference in dlpar_parse_cc_property in arch/powerrc/platforms/pseries/dlpar.c causing denial of service","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12614.json","reference_id":"","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12614.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-12614","reference_id":"","reference_type":"","scores":[{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24569","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24647","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24684","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24456","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24526","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.2457","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24586","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24542","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24488","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24501","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24493","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24469","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24409","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24393","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24351","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-12614"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12614","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12614"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1718176","reference_id":"1718176","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1718176"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2104","reference_id":"RHSA-2020:2104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4060","reference_id":"RHSA-2020:4060","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4060"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4431","reference_id":"RHSA-2020:4431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4431"},{"reference_url":"https://usn.ubuntu.com/4093-1/","reference_id":"USN-4093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4093-1/"},{"reference_url":"https://usn.ubuntu.com/4094-1/","reference_id":"USN-4094-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4094-1/"},{"reference_url":"https://usn.ubuntu.com/4095-1/","reference_id":"USN-4095-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4095-1/"},{"reference_url":"https://usn.ubuntu.com/4095-2/","reference_id":"USN-4095-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4095-2/"}],"fixed_packages":[],"aliases":["CVE-2019-12614"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9sy3-h5gv-hkfj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79277?format=json","vulnerability_id":"VCID-baxd-14v9-jqc9","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10711.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10711.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10711","reference_id":"","reference_type":"","scores":[{"value":"0.05438","scoring_system":"epss","scoring_elements":"0.90132","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05438","scoring_system":"epss","scoring_elements":"0.90135","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05438","scoring_system":"epss","scoring_elements":"0.90147","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05438","scoring_system":"epss","scoring_elements":"0.90152","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05438","scoring_system":"epss","scoring_elements":"0.90167","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05438","scoring_system":"epss","scoring_elements":"0.90172","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05438","scoring_system":"epss","scoring_elements":"0.90181","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05438","scoring_system":"epss","scoring_elements":"0.9018","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05438","scoring_system":"epss","scoring_elements":"0.90175","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05438","scoring_system":"epss","scoring_elements":"0.90193","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05438","scoring_system":"epss","scoring_elements":"0.90189","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05438","scoring_system":"epss","scoring_elements":"0.90204","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05438","scoring_system":"epss","scoring_elements":"0.90203","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05438","scoring_system":"epss","scoring_elements":"0.902","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3016","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12768","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12768"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1825116","reference_id":"1825116","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1825116"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2082","reference_id":"RHSA-2020:2082","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2082"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2085","reference_id":"RHSA-2020:2085","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2085"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2102","reference_id":"RHSA-2020:2102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2103","reference_id":"RHSA-2020:2103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2104","reference_id":"RHSA-2020:2104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2125","reference_id":"RHSA-2020:2125","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2125"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2171","reference_id":"RHSA-2020:2171","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2171"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2199","reference_id":"RHSA-2020:2199","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2199"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2203","reference_id":"RHSA-2020:2203","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2203"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2214","reference_id":"RHSA-2020:2214","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2214"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2242","reference_id":"RHSA-2020:2242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2277","reference_id":"RHSA-2020:2277","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2277"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2285","reference_id":"RHSA-2020:2285","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2285"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2289","reference_id":"RHSA-2020:2289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2291","reference_id":"RHSA-2020:2291","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2291"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2429","reference_id":"RHSA-2020:2429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2519","reference_id":"RHSA-2020:2519","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2519"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2522","reference_id":"RHSA-2020:2522","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2522"},{"reference_url":"https://usn.ubuntu.com/4411-1/","reference_id":"USN-4411-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4411-1/"},{"reference_url":"https://usn.ubuntu.com/4412-1/","reference_id":"USN-4412-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4412-1/"},{"reference_url":"https://usn.ubuntu.com/4413-1/","reference_id":"USN-4413-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4413-1/"},{"reference_url":"https://usn.ubuntu.com/4414-1/","reference_id":"USN-4414-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4414-1/"},{"reference_url":"https://usn.ubuntu.com/4419-1/","reference_id":"USN-4419-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4419-1/"}],"fixed_packages":[],"aliases":["CVE-2020-10711"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-baxd-14v9-jqc9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79268?format=json","vulnerability_id":"VCID-fb84-2es5-q3hc","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19768.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19768.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19768","reference_id":"","reference_type":"","scores":[{"value":"0.01401","scoring_system":"epss","scoring_elements":"0.80372","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01401","scoring_system":"epss","scoring_elements":"0.80378","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01401","scoring_system":"epss","scoring_elements":"0.80398","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01401","scoring_system":"epss","scoring_elements":"0.80387","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01401","scoring_system":"epss","scoring_elements":"0.80416","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01401","scoring_system":"epss","scoring_elements":"0.80426","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01401","scoring_system":"epss","scoring_elements":"0.80445","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01401","scoring_system":"epss","scoring_elements":"0.8043","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01401","scoring_system":"epss","scoring_elements":"0.80423","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01401","scoring_system":"epss","scoring_elements":"0.80453","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01401","scoring_system":"epss","scoring_elements":"0.80454","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01401","scoring_system":"epss","scoring_elements":"0.80457","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01401","scoring_system":"epss","scoring_elements":"0.80482","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01401","scoring_system":"epss","scoring_elements":"0.80488","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01401","scoring_system":"epss","scoring_elements":"0.80505","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19768"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1786164","reference_id":"1786164","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1786164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1567","reference_id":"RHSA-2020:1567","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1567"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1769","reference_id":"RHSA-2020:1769","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1769"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1966","reference_id":"RHSA-2020:1966","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1966"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2082","reference_id":"RHSA-2020:2082","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2082"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2085","reference_id":"RHSA-2020:2085","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2085"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2104","reference_id":"RHSA-2020:2104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2199","reference_id":"RHSA-2020:2199","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2199"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2203","reference_id":"RHSA-2020:2203","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2203"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2214","reference_id":"RHSA-2020:2214","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2214"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2242","reference_id":"RHSA-2020:2242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2277","reference_id":"RHSA-2020:2277","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2277"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2285","reference_id":"RHSA-2020:2285","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2285"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2289","reference_id":"RHSA-2020:2289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2291","reference_id":"RHSA-2020:2291","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2291"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2519","reference_id":"RHSA-2020:2519","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2519"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2522","reference_id":"RHSA-2020:2522","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2522"},{"reference_url":"https://usn.ubuntu.com/4342-1/","reference_id":"USN-4342-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4342-1/"},{"reference_url":"https://usn.ubuntu.com/4344-1/","reference_id":"USN-4344-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4344-1/"},{"reference_url":"https://usn.ubuntu.com/4345-1/","reference_id":"USN-4345-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4345-1/"},{"reference_url":"https://usn.ubuntu.com/4346-1/","reference_id":"USN-4346-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4346-1/"}],"fixed_packages":[],"aliases":["CVE-2019-19768"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fb84-2es5-q3hc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82141?format=json","vulnerability_id":"VCID-feqr-yruq-pfhh","summary":"kernel: out of bounds write in i2c driver leads to local escalation of privilege","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9454.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9454.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9454","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05644","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05935","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0589","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05926","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05678","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05719","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05712","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05752","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05778","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05756","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05748","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05743","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05698","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05708","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05859","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9454"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9454","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9454"},{"reference_url":"https://source.android.com/security/bulletin/pixel/2019-09-01","reference_id":"","reference_type":"","scores":[],"url":"https://source.android.com/security/bulletin/pixel/2019-09-01"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1818818","reference_id":"1818818","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1818818"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9454","reference_id":"CVE-2019-9454","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"},{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9454"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2104","reference_id":"RHSA-2020:2104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4060","reference_id":"RHSA-2020:4060","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4060"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4062","reference_id":"RHSA-2020:4062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4062"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5206","reference_id":"RHSA-2020:5206","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5206"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5430","reference_id":"RHSA-2020:5430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5656","reference_id":"RHSA-2020:5656","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5656"}],"fixed_packages":[],"aliases":["CVE-2019-9454"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-feqr-yruq-pfhh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82124?format=json","vulnerability_id":"VCID-jybz-x1kz-hyh7","summary":"kernel: double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18595.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18595.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-18595","reference_id":"","reference_type":"","scores":[{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.3191","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31519","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31897","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.3173","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31603","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.32038","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.32078","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31902","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31954","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31983","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31986","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31946","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31913","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31947","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31925","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-18595"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.11","reference_id":"","reference_type":"","scores":[],"url":"https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.11"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18595"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4397f04575c44e1440ec2e49b6302785c95fd2f8","reference_id":"","reference_type":"","scores":[],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4397f04575c44e1440ec2e49b6302785c95fd2f8"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1758671","reference_id":"1758671","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1758671"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-18595","reference_id":"CVE-2017-18595","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-18595"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2082","reference_id":"RHSA-2020:2082","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2082"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2085","reference_id":"RHSA-2020:2085","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2085"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2104","reference_id":"RHSA-2020:2104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2214","reference_id":"RHSA-2020:2214","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2214"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2242","reference_id":"RHSA-2020:2242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2277","reference_id":"RHSA-2020:2277","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2277"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2285","reference_id":"RHSA-2020:2285","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2285"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2289","reference_id":"RHSA-2020:2289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2522","reference_id":"RHSA-2020:2522","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2522"}],"fixed_packages":[],"aliases":["CVE-2017-18595"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jybz-x1kz-hyh7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82218?format=json","vulnerability_id":"VCID-kqh6-xctg-b3dv","summary":"kernel: denial of service in in xfs_setattr_nonsize in fs/xfs/xfs_iops.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15538.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15538.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-15538","reference_id":"","reference_type":"","scores":[{"value":"0.16428","scoring_system":"epss","scoring_elements":"0.94847","published_at":"2026-04-01T12:55:00Z"},{"value":"0.16428","scoring_system":"epss","scoring_elements":"0.94856","published_at":"2026-04-02T12:55:00Z"},{"value":"0.16428","scoring_system":"epss","scoring_elements":"0.9486","published_at":"2026-04-04T12:55:00Z"},{"value":"0.16428","scoring_system":"epss","scoring_elements":"0.94862","published_at":"2026-04-07T12:55:00Z"},{"value":"0.16428","scoring_system":"epss","scoring_elements":"0.94871","published_at":"2026-04-08T12:55:00Z"},{"value":"0.16428","scoring_system":"epss","scoring_elements":"0.94875","published_at":"2026-04-09T12:55:00Z"},{"value":"0.16428","scoring_system":"epss","scoring_elements":"0.94879","published_at":"2026-04-11T12:55:00Z"},{"value":"0.16428","scoring_system":"epss","scoring_elements":"0.94882","published_at":"2026-04-12T12:55:00Z"},{"value":"0.16428","scoring_system":"epss","scoring_elements":"0.94883","published_at":"2026-04-13T12:55:00Z"},{"value":"0.16428","scoring_system":"epss","scoring_elements":"0.9489","published_at":"2026-04-16T12:55:00Z"},{"value":"0.16428","scoring_system":"epss","scoring_elements":"0.94894","published_at":"2026-04-18T12:55:00Z"},{"value":"0.16428","scoring_system":"epss","scoring_elements":"0.94897","published_at":"2026-04-21T12:55:00Z"},{"value":"0.16428","scoring_system":"epss","scoring_elements":"0.94898","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-15538"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1746777","reference_id":"1746777","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1746777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2104","reference_id":"RHSA-2020:2104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2104"},{"reference_url":"https://usn.ubuntu.com/4144-1/","reference_id":"USN-4144-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4144-1/"},{"reference_url":"https://usn.ubuntu.com/4147-1/","reference_id":"USN-4147-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4147-1/"}],"fixed_packages":[],"aliases":["CVE-2019-15538"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kqh6-xctg-b3dv"}],"fixing_vulnerabilities":[],"risk_score":"4.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-alt@4.14.0-115.21.2%3Farch=el7a"}