{"url":"http://public2.vulnerablecode.io/api/packages/1037157?format=json","purl":"pkg:deb/debian/systemd@232-25%2Bdeb9u12","type":"deb","namespace":"debian","name":"systemd","version":"232-25+deb9u12","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"252.39-1~deb12u2","latest_non_vulnerable_version":"260.1-1","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60275?format=json","vulnerability_id":"VCID-1mej-gstk-pfbs","summary":"Multiple vulnerabilities have been found in systemd, the worst of\n    which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15686.json","reference_id":"","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15686.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-15686","reference_id":"","reference_type":"","scores":[{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81507","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81259","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81268","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.8129","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81289","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81317","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81322","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81343","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81329","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81359","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81361","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81383","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81391","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81396","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81412","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81432","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81454","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.8145","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81468","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-15686"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15686","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15686"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/systemd/systemd/pull/10519","reference_id":"10519","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:50:23Z/"}],"url":"https://github.com/systemd/systemd/pull/10519"},{"reference_url":"http://www.securityfocus.com/bid/105747","reference_id":"105747","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:50:23Z/"}],"url":"http://www.securityfocus.com/bid/105747"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1639071","reference_id":"1639071","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1639071"},{"reference_url":"https://www.exploit-db.com/exploits/45714/","reference_id":"45714","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:50:23Z/"}],"url":"https://www.exploit-db.com/exploits/45714/"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912005","reference_id":"912005","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912005"},{"reference_url":"https://security.archlinux.org/ASA-201811-11","reference_id":"ASA-201811-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201811-11"},{"reference_url":"https://security.archlinux.org/AVG-789","reference_id":"AVG-789","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-789"},{"reference_url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1687","reference_id":"CVE-2018-15686","reference_type":"exploit","scores":[],"url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1687"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/45714.c","reference_id":"CVE-2018-15686","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/45714.c"},{"reference_url":"https://security.gentoo.org/glsa/201810-10","reference_id":"GLSA-201810-10","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:50:23Z/"}],"url":"https://security.gentoo.org/glsa/201810-10"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/11/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:50:23Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2018/11/msg00017.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2091","reference_id":"RHSA-2019:2091","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:50:23Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:2091"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3222","reference_id":"RHSA-2019:3222","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:50:23Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3222"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0593","reference_id":"RHSA-2020:0593","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:50:23Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0593"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1264","reference_id":"RHSA-2020:1264","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1264"},{"reference_url":"https://usn.ubuntu.com/3816-1/","reference_id":"USN-3816-1","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:50:23Z/"}],"url":"https://usn.ubuntu.com/3816-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1038433?format=json","purl":"pkg:deb/debian/systemd@241-7~deb10u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2nq3-t67f-57ha"},{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-71xj-3x1z-6kh4"},{"vulnerability":"VCID-7mtw-85gb-vyfz"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-8sva-z329-ekcr"},{"vulnerability":"VCID-94hk-2ehw-bqds"},{"vulnerability":"VCID-dvhg-mcz2-r3f5"},{"vulnerability":"VCID-e9ng-ewvh-kqeq"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-sdnj-avfk-7bch"},{"vulnerability":"VCID-sn1e-9p1f-1fen"},{"vulnerability":"VCID-tv9q-bzvp-sqb5"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-w7ys-gs9d-m3f5"},{"vulnerability":"VCID-yk9j-tm66-eyev"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@241-7~deb10u8"}],"aliases":["CVE-2018-15686"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1mej-gstk-pfbs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81640?format=json","vulnerability_id":"VCID-2nq3-t67f-57ha","summary":"systemd: memory leak in button_open() in login/logind-button.c when udev events are received","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20386.json","reference_id":"","reference_type":"","scores":[{"value":"2.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20386.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-20386","reference_id":"","reference_type":"","scores":[{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.3546","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35789","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35979","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35832","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35604","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35573","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35487","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35372","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35442","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35464","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35369","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35393","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.36009","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35839","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.3589","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35912","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35918","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35877","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35853","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35892","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.3588","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-20386"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1793979","reference_id":"1793979","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1793979"},{"reference_url":"https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad","reference_id":"b2774a3ae692113e1f47a336a6c09bac9cfb49ad","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:39:48Z/"}],"url":"https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/","reference_id":"HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:39:48Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html","reference_id":"msg00014.html","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:39:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20200210-0002/","reference_id":"ntap-20200210-0002","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:39:48Z/"}],"url":"https://security.netapp.com/advisory/ntap-20200210-0002/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4007","reference_id":"RHSA-2020:4007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4553","reference_id":"RHSA-2020:4553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0949","reference_id":"RHSA-2021:0949","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0949"},{"reference_url":"https://usn.ubuntu.com/4269-1/","reference_id":"USN-4269-1","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:39:48Z/"}],"url":"https://usn.ubuntu.com/4269-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049390?format=json","purl":"pkg:deb/debian/systemd@247.3-7%2Bdeb11u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-vprj-j7u6-zbe7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@247.3-7%252Bdeb11u4"}],"aliases":["CVE-2019-20386"],"risk_score":2.3,"exploitability":"0.5","weighted_severity":"4.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2nq3-t67f-57ha"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84222?format=json","vulnerability_id":"VCID-4dq5-84vh-u3bz","summary":"systemd: Out-of-bounds write in systemd-resolved due to allocating too small buffer in dns_packet_new","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9445.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9445.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9445","reference_id":"","reference_type":"","scores":[{"value":"0.0133","scoring_system":"epss","scoring_elements":"0.80127","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0133","scoring_system":"epss","scoring_elements":"0.80074","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0133","scoring_system":"epss","scoring_elements":"0.8007","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0133","scoring_system":"epss","scoring_elements":"0.80086","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01695","scoring_system":"epss","scoring_elements":"0.8221","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01695","scoring_system":"epss","scoring_elements":"0.8223","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01695","scoring_system":"epss","scoring_elements":"0.82226","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01695","scoring_system":"epss","scoring_elements":"0.82252","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01695","scoring_system":"epss","scoring_elements":"0.8226","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01695","scoring_system":"epss","scoring_elements":"0.82279","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01695","scoring_system":"epss","scoring_elements":"0.82272","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01695","scoring_system":"epss","scoring_elements":"0.82266","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01695","scoring_system":"epss","scoring_elements":"0.82302","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01695","scoring_system":"epss","scoring_elements":"0.82303","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01695","scoring_system":"epss","scoring_elements":"0.82304","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01695","scoring_system":"epss","scoring_elements":"0.82325","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01695","scoring_system":"epss","scoring_elements":"0.82337","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01695","scoring_system":"epss","scoring_elements":"0.82341","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01695","scoring_system":"epss","scoring_elements":"0.82359","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01695","scoring_system":"epss","scoring_elements":"0.8238","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01695","scoring_system":"epss","scoring_elements":"0.82197","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9445"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9445","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9445"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1463609","reference_id":"1463609","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1463609"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=866147","reference_id":"866147","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=866147"},{"reference_url":"https://security.archlinux.org/ASA-201707-2","reference_id":"ASA-201707-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201707-2"},{"reference_url":"https://security.archlinux.org/AVG-329","reference_id":"AVG-329","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-329"},{"reference_url":"https://usn.ubuntu.com/3341-1/","reference_id":"USN-3341-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3341-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1038433?format=json","purl":"pkg:deb/debian/systemd@241-7~deb10u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2nq3-t67f-57ha"},{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-71xj-3x1z-6kh4"},{"vulnerability":"VCID-7mtw-85gb-vyfz"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-8sva-z329-ekcr"},{"vulnerability":"VCID-94hk-2ehw-bqds"},{"vulnerability":"VCID-dvhg-mcz2-r3f5"},{"vulnerability":"VCID-e9ng-ewvh-kqeq"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-sdnj-avfk-7bch"},{"vulnerability":"VCID-sn1e-9p1f-1fen"},{"vulnerability":"VCID-tv9q-bzvp-sqb5"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-w7ys-gs9d-m3f5"},{"vulnerability":"VCID-yk9j-tm66-eyev"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@241-7~deb10u8"}],"aliases":["CVE-2017-9445"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4dq5-84vh-u3bz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/351411?format=json","vulnerability_id":"VCID-4eyp-2xve-qugd","summary":"In nspawn in systemd 233 through 259 before 260, an escape-to-host action can occur via a crafted optional config file.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-40226.json","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-40226.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-40226","reference_id":"","reference_type":"","scores":[{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01175","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01163","published_at":"2026-05-12T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00375","published_at":"2026-04-12T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00374","published_at":"2026-04-13T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00379","published_at":"2026-04-11T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00707","published_at":"2026-04-18T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00701","published_at":"2026-04-16T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00983","published_at":"2026-05-11T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00991","published_at":"2026-04-24T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00996","published_at":"2026-04-26T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00988","published_at":"2026-04-29T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00989","published_at":"2026-05-09T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00987","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-40226"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-40226","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-40226"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2457326","reference_id":"2457326","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2457326"},{"reference_url":"https://github.com/systemd/systemd/security/advisories/GHSA-9mj4-rrc3-gjcx","reference_id":"GHSA-9mj4-rrc3-gjcx","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-04-14T14:47:51Z/"}],"url":"https://github.com/systemd/systemd/security/advisories/GHSA-9mj4-rrc3-gjcx"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7299","reference_id":"RHSA-2026:7299","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7299"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994540?format=json","purl":"pkg:deb/debian/systemd@252.39-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@252.39-1~deb12u1"},{"url":"http://public2.vulnerablecode.io/api/packages/1089422?format=json","purl":"pkg:deb/debian/systemd@252.39-1~deb12u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@252.39-1~deb12u2"},{"url":"http://public2.vulnerablecode.io/api/packages/994541?format=json","purl":"pkg:deb/debian/systemd@254.26-1~bpo12%2B1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@254.26-1~bpo12%252B1"},{"url":"http://public2.vulnerablecode.io/api/packages/1089423?format=json","purl":"pkg:deb/debian/systemd@257.13-1~deb13u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@257.13-1~deb13u1"},{"url":"http://public2.vulnerablecode.io/api/packages/994543?format=json","purl":"pkg:deb/debian/systemd@260.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@260.1-1"}],"aliases":["CVE-2026-40226"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4eyp-2xve-qugd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64284?format=json","vulnerability_id":"VCID-4n47-ffax-sbdu","summary":"systemd: systemd: Privilege escalation via improper access control in RegisterMachine D-Bus method","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4105.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4105.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-4105","reference_id":"","reference_type":"","scores":[{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01182","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.0118","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01701","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01775","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01732","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01696","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01687","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04918","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04876","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04902","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04921","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04957","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04974","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04955","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04936","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05777","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.0577","published_at":"2026-04-16T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00875","published_at":"2026-05-14T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00872","published_at":"2026-05-11T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00868","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-4105"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4105","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4105"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2447262","reference_id":"2447262","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-13T16:03:09Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2447262"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1","reference_id":"cpe:/a:redhat:hummingbird:1","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4","reference_id":"cpe:/a:redhat:openshift:4","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10","reference_id":"cpe:/o:redhat:enterprise_linux:10","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2026-4105","reference_id":"CVE-2026-4105","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-13T16:03:09Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2026-4105"},{"reference_url":"https://github.com/systemd/systemd/security/advisories/GHSA-4h6x-r8vx-3862","reference_id":"GHSA-4h6x-r8vx-3862","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-13T16:03:09Z/"}],"url":"https://github.com/systemd/systemd/security/advisories/GHSA-4h6x-r8vx-3862"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7299","reference_id":"RHSA-2026:7299","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-13T16:03:09Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:7299"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994540?format=json","purl":"pkg:deb/debian/systemd@252.39-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@252.39-1~deb12u1"},{"url":"http://public2.vulnerablecode.io/api/packages/1089422?format=json","purl":"pkg:deb/debian/systemd@252.39-1~deb12u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@252.39-1~deb12u2"},{"url":"http://public2.vulnerablecode.io/api/packages/994541?format=json","purl":"pkg:deb/debian/systemd@254.26-1~bpo12%2B1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@254.26-1~bpo12%252B1"},{"url":"http://public2.vulnerablecode.io/api/packages/1089423?format=json","purl":"pkg:deb/debian/systemd@257.13-1~deb13u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@257.13-1~deb13u1"},{"url":"http://public2.vulnerablecode.io/api/packages/994543?format=json","purl":"pkg:deb/debian/systemd@260.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@260.1-1"}],"aliases":["CVE-2026-4105"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4n47-ffax-sbdu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78837?format=json","vulnerability_id":"VCID-552s-n3yf-fkgq","summary":"systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-7008.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-7008.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-7008","reference_id":"","reference_type":"","scores":[{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63113","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63142","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63107","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63159","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63176","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63194","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63178","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63156","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63191","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00477","scoring_system":"epss","scoring_elements":"0.65049","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00477","scoring_system":"epss","scoring_elements":"0.65105","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00477","scoring_system":"epss","scoring_elements":"0.64977","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00477","scoring_system":"epss","scoring_elements":"0.64961","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00477","scoring_system":"epss","scoring_elements":"0.6498","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00477","scoring_system":"epss","scoring_elements":"0.64993","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00477","scoring_system":"epss","scoring_elements":"0.64988","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00477","scoring_system":"epss","scoring_elements":"0.64969","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00477","scoring_system":"epss","scoring_elements":"0.65016","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00477","scoring_system":"epss","scoring_elements":"0.65058","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00477","scoring_system":"epss","scoring_elements":"0.65027","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-7008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7008","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7008"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059278","reference_id":"1059278","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059278"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2222672","reference_id":"2222672","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2222672"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2463","reference_id":"RHSA-2024:2463","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2463"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3203","reference_id":"RHSA-2024:3203","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3203"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994540?format=json","purl":"pkg:deb/debian/systemd@252.39-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@252.39-1~deb12u1"}],"aliases":["CVE-2023-7008"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-552s-n3yf-fkgq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83708?format=json","vulnerability_id":"VCID-5j51-kyj4-gkag","summary":"systemd: Mishandled symlinks in systemd-tmpfiles allows local users to obtain ownership of arbitrary files","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6954.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6954.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-6954","reference_id":"","reference_type":"","scores":[{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32107","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31939","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32067","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32009","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32012","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31973","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31952","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31926","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31757","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.3163","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31548","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31395","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31466","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31476","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31384","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31408","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31929","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.3198","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34529","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-6954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6954"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1545017","reference_id":"1545017","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1545017"},{"reference_url":"https://github.com/systemd/systemd/issues/7986","reference_id":"7986","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:53:55Z/"}],"url":"https://github.com/systemd/systemd/issues/7986"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=890779","reference_id":"890779","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=890779"},{"reference_url":"https://security.archlinux.org/ASA-201901-4","reference_id":"ASA-201901-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201901-4"},{"reference_url":"https://security.archlinux.org/AVG-615","reference_id":"AVG-615","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-615"},{"reference_url":"https://usn.ubuntu.com/3816-1/","reference_id":"USN-3816-1","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:53:55Z/"}],"url":"https://usn.ubuntu.com/3816-1/"},{"reference_url":"https://usn.ubuntu.com/3816-2/","reference_id":"USN-3816-2","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:53:55Z/"}],"url":"https://usn.ubuntu.com/3816-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1038433?format=json","purl":"pkg:deb/debian/systemd@241-7~deb10u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2nq3-t67f-57ha"},{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-71xj-3x1z-6kh4"},{"vulnerability":"VCID-7mtw-85gb-vyfz"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-8sva-z329-ekcr"},{"vulnerability":"VCID-94hk-2ehw-bqds"},{"vulnerability":"VCID-dvhg-mcz2-r3f5"},{"vulnerability":"VCID-e9ng-ewvh-kqeq"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-sdnj-avfk-7bch"},{"vulnerability":"VCID-sn1e-9p1f-1fen"},{"vulnerability":"VCID-tv9q-bzvp-sqb5"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-w7ys-gs9d-m3f5"},{"vulnerability":"VCID-yk9j-tm66-eyev"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@241-7~deb10u8"}],"aliases":["CVE-2018-6954"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5j51-kyj4-gkag"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61411?format=json","vulnerability_id":"VCID-66sa-bc5p-jqde","summary":"Multiple vulnerabilities have been discovered in Dnsmasq, the worst of which could lead to a denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-50387.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-50387.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-50387","reference_id":"","reference_type":"","scores":[{"value":"0.51989","scoring_system":"epss","scoring_elements":"0.97939","published_at":"2026-05-14T12:55:00Z"},{"value":"0.51989","scoring_system":"epss","scoring_elements":"0.97928","published_at":"2026-05-07T12:55:00Z"},{"value":"0.51989","scoring_system":"epss","scoring_elements":"0.97931","published_at":"2026-05-11T12:55:00Z"},{"value":"0.51989","scoring_system":"epss","scoring_elements":"0.97926","published_at":"2026-04-29T12:55:00Z"},{"value":"0.51989","scoring_system":"epss","scoring_elements":"0.9792","published_at":"2026-04-24T12:55:00Z"},{"value":"0.51989","scoring_system":"epss","scoring_elements":"0.97921","published_at":"2026-04-26T12:55:00Z"},{"value":"0.51989","scoring_system":"epss","scoring_elements":"0.97896","published_at":"2026-04-02T12:55:00Z"},{"value":"0.51989","scoring_system":"epss","scoring_elements":"0.97922","published_at":"2026-04-18T12:55:00Z"},{"value":"0.51989","scoring_system":"epss","scoring_elements":"0.97914","published_at":"2026-04-13T12:55:00Z"},{"value":"0.51989","scoring_system":"epss","scoring_elements":"0.97913","published_at":"2026-04-12T12:55:00Z"},{"value":"0.51989","scoring_system":"epss","scoring_elements":"0.97912","published_at":"2026-04-11T12:55:00Z"},{"value":"0.51989","scoring_system":"epss","scoring_elements":"0.97909","published_at":"2026-04-09T12:55:00Z"},{"value":"0.51989","scoring_system":"epss","scoring_elements":"0.97906","published_at":"2026-04-08T12:55:00Z"},{"value":"0.51989","scoring_system":"epss","scoring_elements":"0.97901","published_at":"2026-04-07T12:55:00Z"},{"value":"0.51989","scoring_system":"epss","scoring_elements":"0.97898","published_at":"2026-04-04T12:55:00Z"},{"value":"0.51989","scoring_system":"epss","scoring_elements":"0.97935","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-50387"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html","reference_id":"017430.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"}],"url":"https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1063845","reference_id":"1063845","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1063845"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1063852","reference_id":"1063852","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1063852"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077750","reference_id":"1077750","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077750"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/02/16/2","reference_id":"2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/02/16/2"},{"reference_url":"https://www.isc.org/blogs/2024-bind-security-release/","reference_id":"2024-bind-security-release","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"}],"url":"https://www.isc.org/blogs/2024-bind-security-release/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2263914","reference_id":"2263914","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2263914"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/02/16/3","reference_id":"3","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/02/16/3"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/","reference_id":"6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/","reference_id":"BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/"},{"reference_url":"https://kb.isc.org/docs/cve-2023-50387","reference_id":"cve-2023-50387","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"}],"url":"https://kb.isc.org/docs/cve-2023-50387"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-50387","reference_id":"CVE-2023-50387","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-50387"},{"reference_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-50387","reference_id":"CVE-2023-50387","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"}],"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-50387"},{"reference_url":"https://www.theregister.com/2024/02/13/dnssec_vulnerability_internet/","reference_id":"dnssec_vulnerability_internet","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"}],"url":"https://www.theregister.com/2024/02/13/dnssec_vulnerability_internet/"},{"reference_url":"https://security.gentoo.org/glsa/202412-10","reference_id":"GLSA-202412-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-10"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/","reference_id":"HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/","reference_id":"IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/"},{"reference_url":"https://news.ycombinator.com/item?id=39367411","reference_id":"item?id=39367411","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"}],"url":"https://news.ycombinator.com/item?id=39367411"},{"reference_url":"https://news.ycombinator.com/item?id=39372384","reference_id":"item?id=39372384","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"}],"url":"https://news.ycombinator.com/item?id=39372384"},{"reference_url":"https://www.athene-center.de/aktuelles/key-trap","reference_id":"key-trap","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"}],"url":"https://www.athene-center.de/aktuelles/key-trap"},{"reference_url":"https://www.securityweek.com/keytrap-dns-attack-could-disable-large-parts-of-internet-researchers/","reference_id":"keytrap-dns-attack-could-disable-large-parts-of-internet-researchers","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"}],"url":"https://www.securityweek.com/keytrap-dns-attack-could-disable-large-parts-of-internet-researchers/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html","reference_id":"msg00011.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240307-0007/","reference_id":"ntap-20240307-0007","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240307-0007/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/","reference_id":"PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/"},{"reference_url":"https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html","reference_id":"powerdns-advisory-2024-01.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"}],"url":"https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/","reference_id":"RGS7JN6FZXUSTC2XKQHH27574XOULYYJ","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0965","reference_id":"RHSA-2024:0965","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0965"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0977","reference_id":"RHSA-2024:0977","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0977"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0981","reference_id":"RHSA-2024:0981","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0981"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0982","reference_id":"RHSA-2024:0982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11003","reference_id":"RHSA-2024:11003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1334","reference_id":"RHSA-2024:1334","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1334"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1335","reference_id":"RHSA-2024:1335","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1335"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1522","reference_id":"RHSA-2024:1522","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1522"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1543","reference_id":"RHSA-2024:1543","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1543"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1544","reference_id":"RHSA-2024:1544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1545","reference_id":"RHSA-2024:1545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1647","reference_id":"RHSA-2024:1647","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1647"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1648","reference_id":"RHSA-2024:1648","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1648"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1781","reference_id":"RHSA-2024:1781","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1781"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1782","reference_id":"RHSA-2024:1782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1789","reference_id":"RHSA-2024:1789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1800","reference_id":"RHSA-2024:1800","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1800"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1801","reference_id":"RHSA-2024:1801","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1801"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1803","reference_id":"RHSA-2024:1803","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1803"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1804","reference_id":"RHSA-2024:1804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1804"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2551","reference_id":"RHSA-2024:2551","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2551"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2587","reference_id":"RHSA-2024:2587","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2587"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2696","reference_id":"RHSA-2024:2696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2696"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2720","reference_id":"RHSA-2024:2720","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2720"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2721","reference_id":"RHSA-2024:2721","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2721"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2821","reference_id":"RHSA-2024:2821","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2821"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2890","reference_id":"RHSA-2024:2890","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2890"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3271","reference_id":"RHSA-2024:3271","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3271"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3741","reference_id":"RHSA-2024:3741","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3741"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3877","reference_id":"RHSA-2024:3877","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3877"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3929","reference_id":"RHSA-2024:3929","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3929"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0039","reference_id":"RHSA-2025:0039","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0039"},{"reference_url":"https://bugzilla.suse.com/show_bug.cgi?id=1219823","reference_id":"show_bug.cgi?id=1219823","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"}],"url":"https://bugzilla.suse.com/show_bug.cgi?id=1219823"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/","reference_id":"SVYA42BLXUCIDLD35YIJPJSHDIADNYMP","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/"},{"reference_url":"https://www.athene-center.de/fileadmin/content/PDF/Technical_Report_KeyTrap.pdf","reference_id":"Technical_Report_KeyTrap.pdf","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"}],"url":"https://www.athene-center.de/fileadmin/content/PDF/Technical_Report_KeyTrap.pdf"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/","reference_id":"TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/"},{"reference_url":"https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/","reference_id":"unbound-1.19.1-released","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"}],"url":"https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/","reference_id":"UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/"},{"reference_url":"https://usn.ubuntu.com/6633-1/","reference_id":"USN-6633-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6633-1/"},{"reference_url":"https://usn.ubuntu.com/6642-1/","reference_id":"USN-6642-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6642-1/"},{"reference_url":"https://usn.ubuntu.com/6657-1/","reference_id":"USN-6657-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6657-1/"},{"reference_url":"https://usn.ubuntu.com/6657-2/","reference_id":"USN-6657-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6657-2/"},{"reference_url":"https://usn.ubuntu.com/6665-1/","reference_id":"USN-6665-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6665-1/"},{"reference_url":"https://usn.ubuntu.com/6723-1/","reference_id":"USN-6723-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6723-1/"},{"reference_url":"https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1","reference_id":"v5.7.1","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"}],"url":"https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/","reference_id":"ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994540?format=json","purl":"pkg:deb/debian/systemd@252.39-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@252.39-1~deb12u1"}],"aliases":["CVE-2023-50387"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-66sa-bc5p-jqde"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62465?format=json","vulnerability_id":"VCID-71xj-3x1z-6kh4","summary":"A heap use-after-free flaw in systemd at worst might allow an\n    attacker to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1712.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1712.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-1712","reference_id":"","reference_type":"","scores":[{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28644","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28173","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28776","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28583","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28649","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28689","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.2869","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28646","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28599","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28619","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28594","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28545","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28429","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28317","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.2824","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28077","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28139","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28164","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28081","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28101","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28728","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-1712"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1712","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:42Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1712"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1712","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1712"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/systemd/systemd/commit/1068447e6954dc6ce52f099ed174c442cb89ed54","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:42Z/"}],"url":"https://github.com/systemd/systemd/commit/1068447e6954dc6ce52f099ed174c442cb89ed54"},{"reference_url":"https://github.com/systemd/systemd/commit/637486261528e8aa3da9f26a4487dc254f4b7abb","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:42Z/"}],"url":"https://github.com/systemd/systemd/commit/637486261528e8aa3da9f26a4487dc254f4b7abb"},{"reference_url":"https://github.com/systemd/systemd/commit/bc130b6858327b382b07b3985cf48e2aa9016b2d","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:42Z/"}],"url":"https://github.com/systemd/systemd/commit/bc130b6858327b382b07b3985cf48e2aa9016b2d"},{"reference_url":"https://github.com/systemd/systemd/commit/ea0d0ede03c6f18dbc5036c5e9cccf97e415ccc2","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:42Z/"}],"url":"https://github.com/systemd/systemd/commit/ea0d0ede03c6f18dbc5036c5e9cccf97e415ccc2"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/06/msg00025.html","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:42Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/06/msg00025.html"},{"reference_url":"https://www.openwall.com/lists/oss-security/2020/02/05/1","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:42Z/"}],"url":"https://www.openwall.com/lists/oss-security/2020/02/05/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1794578","reference_id":"1794578","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1794578"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950732","reference_id":"950732","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950732"},{"reference_url":"https://security.archlinux.org/ASA-202002-8","reference_id":"ASA-202002-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202002-8"},{"reference_url":"https://security.archlinux.org/AVG-1094","reference_id":"AVG-1094","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1094"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:ceph_storage:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:discovery:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:discovery:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:discovery:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:migration_toolkit:1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:migration_toolkit:1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:migration_toolkit:1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-1712","reference_id":"CVE-2020-1712","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-1712"},{"reference_url":"https://security.gentoo.org/glsa/202003-20","reference_id":"GLSA-202003-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0564","reference_id":"RHSA-2020:0564","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0564"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0575","reference_id":"RHSA-2020:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0575"},{"reference_url":"https://usn.ubuntu.com/4269-1/","reference_id":"USN-4269-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4269-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049390?format=json","purl":"pkg:deb/debian/systemd@247.3-7%2Bdeb11u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-vprj-j7u6-zbe7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@247.3-7%252Bdeb11u4"}],"aliases":["CVE-2020-1712"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-71xj-3x1z-6kh4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46533?format=json","vulnerability_id":"VCID-7mtw-85gb-vyfz","summary":"Multiple vulnerabilities have been found in systemd, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33910.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33910.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-33910","reference_id":"","reference_type":"","scores":[{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13572","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13482","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13582","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13642","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13441","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13523","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13544","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13506","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.1346","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13373","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13371","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13447","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13418","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13314","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16648","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16578","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16683","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16458","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16767","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16684","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-33910"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1970887","reference_id":"1970887","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1970887"},{"reference_url":"https://www.openwall.com/lists/oss-security/2021/07/20/2","reference_id":"2","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/"}],"url":"https://www.openwall.com/lists/oss-security/2021/07/20/2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2021/08/04/2","reference_id":"2","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/"}],"url":"http://www.openwall.com/lists/oss-security/2021/08/04/2"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/","reference_id":"2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/"},{"reference_url":"http://www.openwall.com/lists/oss-security/2021/08/17/3","reference_id":"3","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/"}],"url":"http://www.openwall.com/lists/oss-security/2021/08/17/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2021/09/07/3","reference_id":"3","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/"}],"url":"http://www.openwall.com/lists/oss-security/2021/09/07/3"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/","reference_id":"42TMJVNYRY65B4QCJICBYOEIVZV3KUYI","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/"},{"reference_url":"https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9","reference_id":"441e0115646d54f080e5c3bb0ba477c892861ab9","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/"}],"url":"https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9"},{"reference_url":"https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b","reference_id":"4a1c5f34bd3e1daed4490e9d97918e504d19733b","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/"}],"url":"https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b"},{"reference_url":"https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce","reference_id":"764b74113e36ac5219a4b82a05f311b5a92136ce","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/"}],"url":"https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce"},{"reference_url":"https://security.archlinux.org/ASA-202107-57","reference_id":"ASA-202107-57","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-57"},{"reference_url":"https://security.archlinux.org/AVG-2179","reference_id":"AVG-2179","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2179"},{"reference_url":"https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538","reference_id":"b00674347337b7531c92fdb65590ab253bb57538","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/"}],"url":"https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538"},{"reference_url":"https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b","reference_id":"b34a4f0e6729de292cb3b0c03c1d48f246ad896b","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/"}],"url":"https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b"},{"reference_url":"https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61","reference_id":"cfd14c65374027b34dbbc4f0551456c5dc2d1f61","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/"}],"url":"https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61"},{"reference_url":"https://www.debian.org/security/2021/dsa-4942","reference_id":"dsa-4942","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/"}],"url":"https://www.debian.org/security/2021/dsa-4942"},{"reference_url":"https://security.gentoo.org/glsa/202107-48","reference_id":"GLSA-202107-48","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/"}],"url":"https://security.gentoo.org/glsa/202107-48"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211104-0008/","reference_id":"ntap-20211104-0008","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211104-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2717","reference_id":"RHSA-2021:2717","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2717"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2721","reference_id":"RHSA-2021:2721","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2721"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2724","reference_id":"RHSA-2021:2724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2736","reference_id":"RHSA-2021:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2736"},{"reference_url":"http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html","reference_id":"Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/"}],"url":"http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html"},{"reference_url":"https://usn.ubuntu.com/5013-1/","reference_id":"USN-5013-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5013-1/"},{"reference_url":"https://usn.ubuntu.com/5013-2/","reference_id":"USN-5013-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5013-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1038433?format=json","purl":"pkg:deb/debian/systemd@241-7~deb10u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2nq3-t67f-57ha"},{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-71xj-3x1z-6kh4"},{"vulnerability":"VCID-7mtw-85gb-vyfz"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-8sva-z329-ekcr"},{"vulnerability":"VCID-94hk-2ehw-bqds"},{"vulnerability":"VCID-dvhg-mcz2-r3f5"},{"vulnerability":"VCID-e9ng-ewvh-kqeq"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-sdnj-avfk-7bch"},{"vulnerability":"VCID-sn1e-9p1f-1fen"},{"vulnerability":"VCID-tv9q-bzvp-sqb5"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-w7ys-gs9d-m3f5"},{"vulnerability":"VCID-yk9j-tm66-eyev"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@241-7~deb10u8"},{"url":"http://public2.vulnerablecode.io/api/packages/1049390?format=json","purl":"pkg:deb/debian/systemd@247.3-7%2Bdeb11u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-vprj-j7u6-zbe7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@247.3-7%252Bdeb11u4"}],"aliases":["CVE-2021-33910"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7mtw-85gb-vyfz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79119?format=json","vulnerability_id":"VCID-7p2k-q6vr-3kf5","summary":"systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2526.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2526.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2526","reference_id":"","reference_type":"","scores":[{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52788","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52814","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52782","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52833","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52827","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52877","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52861","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52846","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52883","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.5289","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52873","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52842","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52852","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52813","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52758","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.5281","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52854","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52821","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52847","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.5292","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2526"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2526","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2526"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2109926","reference_id":"2109926","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2109926"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6160","reference_id":"RHSA-2022:6160","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6160"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6161","reference_id":"RHSA-2022:6161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6161"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6162","reference_id":"RHSA-2022:6162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6163","reference_id":"RHSA-2022:6163","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6206","reference_id":"RHSA-2022:6206","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6206"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6551","reference_id":"RHSA-2022:6551","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6551"},{"reference_url":"https://usn.ubuntu.com/5583-1/","reference_id":"USN-5583-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5583-1/"},{"reference_url":"https://usn.ubuntu.com/5583-2/","reference_id":"USN-5583-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5583-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1038433?format=json","purl":"pkg:deb/debian/systemd@241-7~deb10u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2nq3-t67f-57ha"},{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-71xj-3x1z-6kh4"},{"vulnerability":"VCID-7mtw-85gb-vyfz"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-8sva-z329-ekcr"},{"vulnerability":"VCID-94hk-2ehw-bqds"},{"vulnerability":"VCID-dvhg-mcz2-r3f5"},{"vulnerability":"VCID-e9ng-ewvh-kqeq"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-sdnj-avfk-7bch"},{"vulnerability":"VCID-sn1e-9p1f-1fen"},{"vulnerability":"VCID-tv9q-bzvp-sqb5"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-w7ys-gs9d-m3f5"},{"vulnerability":"VCID-yk9j-tm66-eyev"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@241-7~deb10u8"}],"aliases":["CVE-2022-2526"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7p2k-q6vr-3kf5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79394?format=json","vulnerability_id":"VCID-7war-ne2h-wkej","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:47:18Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html"},{"reference_url":"http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:47:18Z/"}],"url":"http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3842.json","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3842.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3842","reference_id":"","reference_type":"","scores":[{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26695","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26988","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27028","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26856","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26925","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26971","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26975","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.2693","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26872","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26883","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26854","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26815","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26757","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26749","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.2668","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26546","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26615","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.2667","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26597","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27066","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3842"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:47:18Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3842"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:47:18Z/"}],"url":"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:47:18Z/"}],"url":"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:47:18Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:47:18Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/"},{"reference_url":"https://www.exploit-db.com/exploits/46743/","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:47:18Z/"}],"url":"https://www.exploit-db.com/exploits/46743/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1668521","reference_id":"1668521","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1668521"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:242:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:systemd_project:systemd:242:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:242:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:242:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:systemd_project:systemd:242:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:242:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:242:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:systemd_project:systemd:242:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:242:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1756","reference_id":"CVE-2019-3842","reference_type":"exploit","scores":[],"url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1756"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/46743.txt","reference_id":"CVE-2019-3842","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/46743.txt"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-3842","reference_id":"CVE-2019-3842","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:P/A:P"},{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"7.0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-3842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1611","reference_id":"RHSA-2021:1611","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1611"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3900","reference_id":"RHSA-2021:3900","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3900"},{"reference_url":"https://usn.ubuntu.com/3938-1/","reference_id":"USN-3938-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3938-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1038433?format=json","purl":"pkg:deb/debian/systemd@241-7~deb10u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2nq3-t67f-57ha"},{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-71xj-3x1z-6kh4"},{"vulnerability":"VCID-7mtw-85gb-vyfz"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-8sva-z329-ekcr"},{"vulnerability":"VCID-94hk-2ehw-bqds"},{"vulnerability":"VCID-dvhg-mcz2-r3f5"},{"vulnerability":"VCID-e9ng-ewvh-kqeq"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-sdnj-avfk-7bch"},{"vulnerability":"VCID-sn1e-9p1f-1fen"},{"vulnerability":"VCID-tv9q-bzvp-sqb5"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-w7ys-gs9d-m3f5"},{"vulnerability":"VCID-yk9j-tm66-eyev"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@241-7~deb10u8"}],"aliases":["CVE-2019-3842"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7war-ne2h-wkej"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69485?format=json","vulnerability_id":"VCID-86qy-wkqz-5qam","summary":"systemd-coredump: race condition that allows a local attacker to crash a SUID program and gain read access to the resulting core dump","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4598.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4598.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-4598","reference_id":"","reference_type":"","scores":[{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24604","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.2455","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24427","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24593","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24661","published_at":"2026-04-21T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27578","published_at":"2026-04-18T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27749","published_at":"2026-04-02T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27788","published_at":"2026-04-04T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.2758","published_at":"2026-04-07T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27648","published_at":"2026-04-08T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27691","published_at":"2026-04-09T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27696","published_at":"2026-04-11T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27652","published_at":"2026-04-12T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27595","published_at":"2026-04-13T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27603","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.2839","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28485","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28411","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28467","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.29888","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-4598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4598","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4598"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106785","reference_id":"1106785","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106785"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2369242","reference_id":"2369242","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T13:43:28Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2369242"},{"reference_url":"https://www.openwall.com/lists/oss-security/2025/05/29/3","reference_id":"3","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T13:43:28Z/"}],"url":"https://www.openwall.com/lists/oss-security/2025/05/29/3"},{"reference_url":"https://security.archlinux.org/AVG-2893","reference_id":"AVG-2893","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2893"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:7::el9","reference_id":"cpe:/a:redhat:ceph_storage:7::el9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:7::el9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:8::el9","reference_id":"cpe:/a:redhat:ceph_storage:8::el9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:8::el9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9","reference_id":"cpe:/a:redhat:discovery:2::el9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9","reference_id":"cpe:/a:redhat:insights_proxy:1.5::el9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4","reference_id":"cpe:/a:redhat:openshift:4","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10","reference_id":"cpe:/o:redhat:enterprise_linux:10","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:9::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-4598","reference_id":"CVE-2025-4598","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T13:43:28Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-4598"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22660","reference_id":"RHSA-2025:22660","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T13:43:28Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22660"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22868","reference_id":"RHSA-2025:22868","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T13:43:28Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22868"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23227","reference_id":"RHSA-2025:23227","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T13:43:28Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23227"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23234","reference_id":"RHSA-2025:23234","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T13:43:28Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23234"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0414","reference_id":"RHSA-2026:0414","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T13:43:28Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:0414"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1652","reference_id":"RHSA-2026:1652","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T13:43:28Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:1652"},{"reference_url":"https://usn.ubuntu.com/7559-1/","reference_id":"USN-7559-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7559-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994540?format=json","purl":"pkg:deb/debian/systemd@252.39-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@252.39-1~deb12u1"}],"aliases":["CVE-2025-4598"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-86qy-wkqz-5qam"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82137?format=json","vulnerability_id":"VCID-8sva-z329-ekcr","summary":"systemd: systemd-resolved allows unprivileged users to configure DNS","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15718.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15718.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-15718","reference_id":"","reference_type":"","scores":[{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.2861","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28135","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28127","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28044","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28064","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28693","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28741","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28549","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28614","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28654","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28656","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28612","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28563","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28583","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28559","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.2851","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28395","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28283","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28203","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.2804","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28102","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-15718"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15718","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15718"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRE5IS24XTF5WNZGH2L7GSQJKARBOEGL/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRE5IS24XTF5WNZGH2L7GSQJKARBOEGL/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HIKGKXZ5OEGOEYURHLJHEMFYNLEGAW5B/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HIKGKXZ5OEGOEYURHLJHEMFYNLEGAW5B/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U2WNHRJW4XI6H5YMDG4BUFGPAXWUMUVG/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U2WNHRJW4XI6H5YMDG4BUFGPAXWUMUVG/"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/09/03/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2019/09/03/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1746057","reference_id":"1746057","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1746057"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939353","reference_id":"939353","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939353"},{"reference_url":"https://security.archlinux.org/ASA-201910-3","reference_id":"ASA-201910-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201910-3"},{"reference_url":"https://security.archlinux.org/AVG-1035","reference_id":"AVG-1035","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1035"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:240:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:systemd_project:systemd:240:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:240:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_8_s390x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_8_s390x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_8_s390x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus_s390x:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus_s390x:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus_s390x:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus_s390x:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus_s390x:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus_s390x:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-15718","reference_id":"CVE-2019-15718","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:N"},{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-15718"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3592","reference_id":"RHSA-2019:3592","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3592"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3941","reference_id":"RHSA-2019:3941","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3941"},{"reference_url":"https://usn.ubuntu.com/4120-1/","reference_id":"USN-4120-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4120-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049390?format=json","purl":"pkg:deb/debian/systemd@247.3-7%2Bdeb11u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-vprj-j7u6-zbe7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@247.3-7%252Bdeb11u4"}],"aliases":["CVE-2019-15718"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8sva-z329-ekcr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83762?format=json","vulnerability_id":"VCID-8x92-ah94-47f7","summary":"systemd: Unsafe handling of hard links allowing privilege escalation","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18078.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18078.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-18078","reference_id":"","reference_type":"","scores":[{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24599","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24439","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24342","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24361","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24676","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24714","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24486","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24557","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24603","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24619","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24576","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24522","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24534","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24526","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24502","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24446","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24431","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24389","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24265","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24344","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24406","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-18078"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18078","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18078"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1539758","reference_id":"1539758","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1539758"},{"reference_url":"https://security.archlinux.org/AVG-621","reference_id":"AVG-621","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-621"},{"reference_url":"http://seclists.org/oss-sec/2018/q1/115","reference_id":"CVE-2017-18078","reference_type":"exploit","scores":[],"url":"http://seclists.org/oss-sec/2018/q1/115"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/43935.txt","reference_id":"CVE-2017-18078","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/43935.txt"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1038433?format=json","purl":"pkg:deb/debian/systemd@241-7~deb10u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2nq3-t67f-57ha"},{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-71xj-3x1z-6kh4"},{"vulnerability":"VCID-7mtw-85gb-vyfz"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-8sva-z329-ekcr"},{"vulnerability":"VCID-94hk-2ehw-bqds"},{"vulnerability":"VCID-dvhg-mcz2-r3f5"},{"vulnerability":"VCID-e9ng-ewvh-kqeq"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-sdnj-avfk-7bch"},{"vulnerability":"VCID-sn1e-9p1f-1fen"},{"vulnerability":"VCID-tv9q-bzvp-sqb5"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-w7ys-gs9d-m3f5"},{"vulnerability":"VCID-yk9j-tm66-eyev"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@241-7~deb10u8"}],"aliases":["CVE-2017-18078"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8x92-ah94-47f7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82586?format=json","vulnerability_id":"VCID-94hk-2ehw-bqds","summary":"systemd: services with DynamicUser can get new privileges and create SGID binaries","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3844.json","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3844.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3844","reference_id":"","reference_type":"","scores":[{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35654","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35853","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35325","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35742","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35719","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35761","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35749","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35701","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35466","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35434","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35348","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.3523","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35301","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35328","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35234","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35257","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35879","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35709","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35756","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35779","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35787","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securityfocus.com/bid/108096","reference_id":"108096","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:49:10Z/"}],"url":"http://www.securityfocus.com/bid/108096"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1684610","reference_id":"1684610","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1684610"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928102","reference_id":"928102","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928102"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190619-0002/","reference_id":"ntap-20190619-0002","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:49:10Z/"}],"url":"https://security.netapp.com/advisory/ntap-20190619-0002/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1794","reference_id":"RHSA-2020:1794","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1794"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844","reference_id":"show_bug.cgi?id=CVE-2019-3844","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:49:10Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844"},{"reference_url":"https://usn.ubuntu.com/4269-1/","reference_id":"USN-4269-1","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:49:10Z/"}],"url":"https://usn.ubuntu.com/4269-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049390?format=json","purl":"pkg:deb/debian/systemd@247.3-7%2Bdeb11u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-vprj-j7u6-zbe7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@247.3-7%252Bdeb11u4"}],"aliases":["CVE-2019-3844"],"risk_score":8.0,"exploitability":"2.0","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-94hk-2ehw-bqds"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60276?format=json","vulnerability_id":"VCID-cmbj-869t-c3e3","summary":"Multiple vulnerabilities have been found in systemd, the worst of\n    which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15687.json","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15687.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-15687","reference_id":"","reference_type":"","scores":[{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.55955","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56116","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56066","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56086","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56065","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56121","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56133","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.5611","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56093","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56128","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.5613","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59424","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59453","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.5948","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59552","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.5945","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59445","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.5943","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59388","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59436","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59494","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-15687"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15687","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15687"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securityfocus.com/bid/105748","reference_id":"105748","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:48:02Z/"}],"url":"http://www.securityfocus.com/bid/105748"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1639076","reference_id":"1639076","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1639076"},{"reference_url":"https://www.exploit-db.com/exploits/45715/","reference_id":"45715","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:48:02Z/"}],"url":"https://www.exploit-db.com/exploits/45715/"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912007","reference_id":"912007","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912007"},{"reference_url":"https://security.archlinux.org/ASA-201811-11","reference_id":"ASA-201811-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201811-11"},{"reference_url":"https://security.archlinux.org/AVG-789","reference_id":"AVG-789","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-789"},{"reference_url":"https://github.com/systemd/systemd/pull/10517/commits","reference_id":"commits","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:48:02Z/"}],"url":"https://github.com/systemd/systemd/pull/10517/commits"},{"reference_url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1689","reference_id":"CVE-2018-15687","reference_type":"exploit","scores":[],"url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1689"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/45715.txt","reference_id":"CVE-2018-15687","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/45715.txt"},{"reference_url":"https://security.gentoo.org/glsa/201810-10","reference_id":"GLSA-201810-10","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:48:02Z/"}],"url":"https://security.gentoo.org/glsa/201810-10"},{"reference_url":"https://usn.ubuntu.com/3816-1/","reference_id":"USN-3816-1","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:48:02Z/"}],"url":"https://usn.ubuntu.com/3816-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1038433?format=json","purl":"pkg:deb/debian/systemd@241-7~deb10u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2nq3-t67f-57ha"},{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-71xj-3x1z-6kh4"},{"vulnerability":"VCID-7mtw-85gb-vyfz"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-8sva-z329-ekcr"},{"vulnerability":"VCID-94hk-2ehw-bqds"},{"vulnerability":"VCID-dvhg-mcz2-r3f5"},{"vulnerability":"VCID-e9ng-ewvh-kqeq"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-sdnj-avfk-7bch"},{"vulnerability":"VCID-sn1e-9p1f-1fen"},{"vulnerability":"VCID-tv9q-bzvp-sqb5"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-w7ys-gs9d-m3f5"},{"vulnerability":"VCID-yk9j-tm66-eyev"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@241-7~deb10u8"}],"aliases":["CVE-2018-15687"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cmbj-869t-c3e3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60592?format=json","vulnerability_id":"VCID-dvhg-mcz2-r3f5","summary":"Multiple vulnerabilities have been discovered in systemd, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3997.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3997.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3997","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05695","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05745","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0574","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05704","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05855","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05887","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05922","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05932","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06221","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06163","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06148","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.0619","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06229","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06132","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.061","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07723","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08418","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08287","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08354","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08331","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08361","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3997"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1003467","reference_id":"1003467","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1003467"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2024639","reference_id":"2024639","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2024639"},{"reference_url":"https://security.gentoo.org/glsa/202305-15","reference_id":"GLSA-202305-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202305-15"},{"reference_url":"https://usn.ubuntu.com/5226-1/","reference_id":"USN-5226-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5226-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049390?format=json","purl":"pkg:deb/debian/systemd@247.3-7%2Bdeb11u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-vprj-j7u6-zbe7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@247.3-7%252Bdeb11u4"}],"aliases":["CVE-2021-3997"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dvhg-mcz2-r3f5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83858?format=json","vulnerability_id":"VCID-e7km-pysq-hqe2","summary":"systemd: Infinite loop in the dns_packet_read_type_window() function","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15908.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15908.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15908","reference_id":"","reference_type":"","scores":[{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50138","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50132","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50069","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50122","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.5015","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50104","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50183","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50211","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50161","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50215","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50209","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50237","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.5021","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50199","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50244","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50245","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50219","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50192","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50198","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50151","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15908"},{"reference_url":"https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1725351","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1725351"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15908","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15908"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:C"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/systemd/systemd/pull/7184","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/systemd/systemd/pull/7184"},{"reference_url":"http://www.securityfocus.com/bid/101600","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/101600"},{"reference_url":"http://www.securitytracker.com/id/1039662","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1039662"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1507515","reference_id":"1507515","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1507515"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=880026","reference_id":"880026","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=880026"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:223:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:systemd_project:systemd:223:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:223:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:224:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:systemd_project:systemd:224:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:224:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:225:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:systemd_project:systemd:225:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:225:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:226:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:systemd_project:systemd:226:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:226:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:227:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:systemd_project:systemd:227:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:227:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:228:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:systemd_project:systemd:228:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:228:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:229:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:systemd_project:systemd:229:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:229:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:230:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:systemd_project:systemd:230:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:230:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:231:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:systemd_project:systemd:231:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:231:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:232:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:systemd_project:systemd:232:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:232:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:233:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:systemd_project:systemd:233:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:233:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:234:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:systemd_project:systemd:234:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:234:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:235:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:systemd_project:systemd:235:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:235:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15908","reference_id":"CVE-2017-15908","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15908"},{"reference_url":"https://usn.ubuntu.com/3466-1/","reference_id":"USN-3466-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3466-1/"},{"reference_url":"https://usn.ubuntu.com/3558-1/","reference_id":"USN-3558-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3558-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1038433?format=json","purl":"pkg:deb/debian/systemd@241-7~deb10u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2nq3-t67f-57ha"},{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-71xj-3x1z-6kh4"},{"vulnerability":"VCID-7mtw-85gb-vyfz"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-8sva-z329-ekcr"},{"vulnerability":"VCID-94hk-2ehw-bqds"},{"vulnerability":"VCID-dvhg-mcz2-r3f5"},{"vulnerability":"VCID-e9ng-ewvh-kqeq"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-sdnj-avfk-7bch"},{"vulnerability":"VCID-sn1e-9p1f-1fen"},{"vulnerability":"VCID-tv9q-bzvp-sqb5"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-w7ys-gs9d-m3f5"},{"vulnerability":"VCID-yk9j-tm66-eyev"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@241-7~deb10u8"}],"aliases":["CVE-2017-15908"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e7km-pysq-hqe2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60593?format=json","vulnerability_id":"VCID-e9ng-ewvh-kqeq","summary":"Multiple vulnerabilities have been discovered in systemd, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3821.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3821.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3821","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08078","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08072","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08121","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08133","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08154","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08927","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08769","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08879","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08892","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10254","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10309","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10316","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10398","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10203","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.1042","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.1035","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10202","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.1044","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10497","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10336","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3821"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3821","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3821"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2139327","reference_id":"2139327","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-02T18:10:56Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2139327"},{"reference_url":"https://github.com/systemd/systemd/issues/23928","reference_id":"23928","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-02T18:10:56Z/"}],"url":"https://github.com/systemd/systemd/issues/23928"},{"reference_url":"https://github.com/systemd/systemd/pull/23933","reference_id":"23933","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-02T18:10:56Z/"}],"url":"https://github.com/systemd/systemd/pull/23933"},{"reference_url":"https://github.com/systemd/systemd/commit/9102c625a673a3246d7e73d8737f3494446bad4e","reference_id":"9102c625a673a3246d7e73d8737f3494446bad4e","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-02T18:10:56Z/"}],"url":"https://github.com/systemd/systemd/commit/9102c625a673a3246d7e73d8737f3494446bad4e"},{"reference_url":"https://security.gentoo.org/glsa/202305-15","reference_id":"GLSA-202305-15","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-02T18:10:56Z/"}],"url":"https://security.gentoo.org/glsa/202305-15"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/06/msg00036.html","reference_id":"msg00036.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-02T18:10:56Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/06/msg00036.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0100","reference_id":"RHSA-2023:0100","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0100"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0336","reference_id":"RHSA-2023:0336","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0336"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1105","reference_id":"RHSA-2024:1105","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1105"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RVBQC2VLSDVQAPJTEMTREXDL4HYLXG2P/","reference_id":"RVBQC2VLSDVQAPJTEMTREXDL4HYLXG2P","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-02T18:10:56Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RVBQC2VLSDVQAPJTEMTREXDL4HYLXG2P/"},{"reference_url":"https://usn.ubuntu.com/5928-1/","reference_id":"USN-5928-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5928-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049390?format=json","purl":"pkg:deb/debian/systemd@247.3-7%2Bdeb11u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-vprj-j7u6-zbe7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@247.3-7%252Bdeb11u4"}],"aliases":["CVE-2022-3821"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e9ng-ewvh-kqeq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84200?format=json","vulnerability_id":"VCID-fdkt-299k-vufa","summary":"systemd: fails to parse usernames that start with digits","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000082.json","reference_id":"","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000082.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-1000082","reference_id":"","reference_type":"","scores":[{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49107","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49197","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49094","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49122","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.4914","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49169","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49121","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49176","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49173","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.4919","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49164","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49215","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49213","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49183","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49182","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49138","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49055","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49118","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49146","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-1000082"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000082","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000082"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:S/C:C/I:C/A:C"},{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1468427","reference_id":"1468427","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1468427"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1038433?format=json","purl":"pkg:deb/debian/systemd@241-7~deb10u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2nq3-t67f-57ha"},{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-71xj-3x1z-6kh4"},{"vulnerability":"VCID-7mtw-85gb-vyfz"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-8sva-z329-ekcr"},{"vulnerability":"VCID-94hk-2ehw-bqds"},{"vulnerability":"VCID-dvhg-mcz2-r3f5"},{"vulnerability":"VCID-e9ng-ewvh-kqeq"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-sdnj-avfk-7bch"},{"vulnerability":"VCID-sn1e-9p1f-1fen"},{"vulnerability":"VCID-tv9q-bzvp-sqb5"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-w7ys-gs9d-m3f5"},{"vulnerability":"VCID-yk9j-tm66-eyev"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@241-7~deb10u8"}],"aliases":["CVE-2017-1000082"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fdkt-299k-vufa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64123?format=json","vulnerability_id":"VCID-fp54-ff23-vbb5","summary":"systemd: systemd: Arbitrary code execution or Denial of Service via spurious IPC API call data","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-29111.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-29111.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-29111","reference_id":"","reference_type":"","scores":[{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01346","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01351","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.0134","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01349","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01355","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01365","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01366","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01361","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04372","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05548","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05547","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05507","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05692","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05686","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05598","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05553","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05681","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05674","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-29111"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29111","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29111"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/systemd/systemd/commit/1d22f706bd04f45f8422e17fbde3f56ece17758a","reference_id":"1d22f706bd04f45f8422e17fbde3f56ece17758a","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:12:36Z/"}],"url":"https://github.com/systemd/systemd/commit/1d22f706bd04f45f8422e17fbde3f56ece17758a"},{"reference_url":"https://github.com/systemd/systemd/commit/20021e7686426052e3a7505425d7e12085feb2a6","reference_id":"20021e7686426052e3a7505425d7e12085feb2a6","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:12:36Z/"}],"url":"https://github.com/systemd/systemd/commit/20021e7686426052e3a7505425d7e12085feb2a6"},{"reference_url":"https://github.com/systemd/systemd/commit/21167006574d6b83813c7596759b474f56562412","reference_id":"21167006574d6b83813c7596759b474f56562412","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:12:36Z/"}],"url":"https://github.com/systemd/systemd/commit/21167006574d6b83813c7596759b474f56562412"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2450505","reference_id":"2450505","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2450505"},{"reference_url":"https://github.com/systemd/systemd/commit/3cee294fe8cf4fa0eff933ab21416d099942cabd","reference_id":"3cee294fe8cf4fa0eff933ab21416d099942cabd","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:12:36Z/"}],"url":"https://github.com/systemd/systemd/commit/3cee294fe8cf4fa0eff933ab21416d099942cabd"},{"reference_url":"https://github.com/systemd/systemd/commit/42aee39107fbdd7db1ccd402a2151822b2805e9f","reference_id":"42aee39107fbdd7db1ccd402a2151822b2805e9f","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:12:36Z/"}],"url":"https://github.com/systemd/systemd/commit/42aee39107fbdd7db1ccd402a2151822b2805e9f"},{"reference_url":"https://github.com/systemd/systemd/commit/54588d2dedff54bfb6036670820650e4ea74628f","reference_id":"54588d2dedff54bfb6036670820650e4ea74628f","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:12:36Z/"}],"url":"https://github.com/systemd/systemd/commit/54588d2dedff54bfb6036670820650e4ea74628f"},{"reference_url":"https://github.com/systemd/systemd/commit/7ac3220213690e8a8d6d2a6e81e43bd1dce01d69","reference_id":"7ac3220213690e8a8d6d2a6e81e43bd1dce01d69","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:12:36Z/"}],"url":"https://github.com/systemd/systemd/commit/7ac3220213690e8a8d6d2a6e81e43bd1dce01d69"},{"reference_url":"https://github.com/systemd/systemd/commit/80acea4ef80a4bb78560ed970c34952299b890d6","reference_id":"80acea4ef80a4bb78560ed970c34952299b890d6","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:12:36Z/"}],"url":"https://github.com/systemd/systemd/commit/80acea4ef80a4bb78560ed970c34952299b890d6"},{"reference_url":"https://github.com/systemd/systemd/commit/b5fd14693057e5f2c9b4a49603be64ec3608ff6c","reference_id":"b5fd14693057e5f2c9b4a49603be64ec3608ff6c","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:12:36Z/"}],"url":"https://github.com/systemd/systemd/commit/b5fd14693057e5f2c9b4a49603be64ec3608ff6c"},{"reference_url":"https://github.com/systemd/systemd/commit/efa6ba2ab625aaa160ac435a09e6482fc63bdbe8","reference_id":"efa6ba2ab625aaa160ac435a09e6482fc63bdbe8","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:12:36Z/"}],"url":"https://github.com/systemd/systemd/commit/efa6ba2ab625aaa160ac435a09e6482fc63bdbe8"},{"reference_url":"https://github.com/systemd/systemd/security/advisories/GHSA-gx6q-6f99-m764","reference_id":"GHSA-gx6q-6f99-m764","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:12:36Z/"}],"url":"https://github.com/systemd/systemd/security/advisories/GHSA-gx6q-6f99-m764"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13651","reference_id":"RHSA-2026:13651","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13651"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13677","reference_id":"RHSA-2026:13677","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13677"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:14162","reference_id":"RHSA-2026:14162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:14162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7299","reference_id":"RHSA-2026:7299","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7299"},{"reference_url":"https://usn.ubuntu.com/8119-1/","reference_id":"USN-8119-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8119-1/"},{"reference_url":"https://usn.ubuntu.com/8119-2/","reference_id":"USN-8119-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8119-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994540?format=json","purl":"pkg:deb/debian/systemd@252.39-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@252.39-1~deb12u1"},{"url":"http://public2.vulnerablecode.io/api/packages/1089422?format=json","purl":"pkg:deb/debian/systemd@252.39-1~deb12u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@252.39-1~deb12u2"},{"url":"http://public2.vulnerablecode.io/api/packages/994541?format=json","purl":"pkg:deb/debian/systemd@254.26-1~bpo12%2B1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@254.26-1~bpo12%252B1"},{"url":"http://public2.vulnerablecode.io/api/packages/1089423?format=json","purl":"pkg:deb/debian/systemd@257.13-1~deb13u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@257.13-1~deb13u1"},{"url":"http://public2.vulnerablecode.io/api/packages/994543?format=json","purl":"pkg:deb/debian/systemd@260.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@260.1-1"}],"aliases":["CVE-2026-29111"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fp54-ff23-vbb5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/351410?format=json","vulnerability_id":"VCID-hwg6-vaus-cfa2","summary":"In udev in systemd before 260, local root execution can occur via malicious hardware devices and unsanitized kernel output.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-40225.json","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-40225.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-40225","reference_id":"","reference_type":"","scores":[{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05219","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05206","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05234","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07037","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07055","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12459","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12229","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12365","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12431","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12426","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12457","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12427","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12316","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13794","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13696","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-40225"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-40225","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-40225"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2457324","reference_id":"2457324","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2457324"},{"reference_url":"https://github.com/systemd/systemd/security/advisories/GHSA-vpfq-8p5f-jcqx","reference_id":"GHSA-vpfq-8p5f-jcqx","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-14T14:40:04Z/"}],"url":"https://github.com/systemd/systemd/security/advisories/GHSA-vpfq-8p5f-jcqx"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7299","reference_id":"RHSA-2026:7299","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7299"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994540?format=json","purl":"pkg:deb/debian/systemd@252.39-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@252.39-1~deb12u1"},{"url":"http://public2.vulnerablecode.io/api/packages/1089422?format=json","purl":"pkg:deb/debian/systemd@252.39-1~deb12u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@252.39-1~deb12u2"},{"url":"http://public2.vulnerablecode.io/api/packages/994541?format=json","purl":"pkg:deb/debian/systemd@254.26-1~bpo12%2B1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@254.26-1~bpo12%252B1"},{"url":"http://public2.vulnerablecode.io/api/packages/1089423?format=json","purl":"pkg:deb/debian/systemd@257.13-1~deb13u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@257.13-1~deb13u1"},{"url":"http://public2.vulnerablecode.io/api/packages/994543?format=json","purl":"pkg:deb/debian/systemd@260.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@260.1-1"}],"aliases":["CVE-2026-40225"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hwg6-vaus-cfa2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60024?format=json","vulnerability_id":"VCID-mgcn-uevn-13c3","summary":"Multiple vulnerabilities have been found in systemd, the worst of\n    which may allow execution of arbitrary code.","references":[{"reference_url":"http://packetstormsecurity.com/files/152841/System-Down-A-systemd-journald-Exploit.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"http://packetstormsecurity.com/files/152841/System-Down-A-systemd-journald-Exploit.html"},{"reference_url":"https://access.redhat.com/errata/RHBA-2019:0327","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"https://access.redhat.com/errata/RHBA-2019:0327"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16865.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16865.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16865","reference_id":"","reference_type":"","scores":[{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79193","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79179","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79163","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79156","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79124","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79055","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79127","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79048","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79286","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79247","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79229","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.7923","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79213","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79109","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79123","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79098","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79091","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79067","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79081","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79099","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16865"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16865","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16866","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16866"},{"reference_url":"http://seclists.org/fulldisclosure/2019/May/21","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"http://seclists.org/fulldisclosure/2019/May/21"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/01/msg00016.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2019/01/msg00016.html"},{"reference_url":"https://seclists.org/bugtraq/2019/May/25","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"https://seclists.org/bugtraq/2019/May/25"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190117-0001/","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"https://security.netapp.com/advisory/ntap-20190117-0001/"},{"reference_url":"https://www.debian.org/security/2019/dsa-4367","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"https://www.debian.org/security/2019/dsa-4367"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"reference_url":"https://www.qualys.com/2019/01/09/system-down/system-down.txt","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"https://www.qualys.com/2019/01/09/system-down/system-down.txt"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/05/10/4","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"http://www.openwall.com/lists/oss-security/2019/05/10/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2021/07/20/2","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"http://www.openwall.com/lists/oss-security/2021/07/20/2"},{"reference_url":"http://www.securityfocus.com/bid/106525","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"http://www.securityfocus.com/bid/106525"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1653861","reference_id":"1653861","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1653861"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=918848","reference_id":"918848","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=918848"},{"reference_url":"https://security.archlinux.org/ASA-201901-9","reference_id":"ASA-201901-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201901-9"},{"reference_url":"https://security.archlinux.org/AVG-845","reference_id":"AVG-845","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-845"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-16865","reference_id":"CVE-2018-16865","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-16865"},{"reference_url":"https://security.gentoo.org/glsa/201903-07","reference_id":"GLSA-201903-07","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"https://security.gentoo.org/glsa/201903-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0049","reference_id":"RHSA-2019:0049","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:0049"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0204","reference_id":"RHSA-2019:0204","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:0204"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0271","reference_id":"RHSA-2019:0271","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:0271"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0342","reference_id":"RHSA-2019:0342","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:0342"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0361","reference_id":"RHSA-2019:0361","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:0361"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2402","reference_id":"RHSA-2019:2402","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:2402"},{"reference_url":"https://usn.ubuntu.com/3855-1/","reference_id":"USN-3855-1","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"https://usn.ubuntu.com/3855-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1038433?format=json","purl":"pkg:deb/debian/systemd@241-7~deb10u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2nq3-t67f-57ha"},{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-71xj-3x1z-6kh4"},{"vulnerability":"VCID-7mtw-85gb-vyfz"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-8sva-z329-ekcr"},{"vulnerability":"VCID-94hk-2ehw-bqds"},{"vulnerability":"VCID-dvhg-mcz2-r3f5"},{"vulnerability":"VCID-e9ng-ewvh-kqeq"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-sdnj-avfk-7bch"},{"vulnerability":"VCID-sn1e-9p1f-1fen"},{"vulnerability":"VCID-tv9q-bzvp-sqb5"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-w7ys-gs9d-m3f5"},{"vulnerability":"VCID-yk9j-tm66-eyev"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@241-7~deb10u8"}],"aliases":["CVE-2018-16865"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mgcn-uevn-13c3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60025?format=json","vulnerability_id":"VCID-nuf5-cg89-8bb7","summary":"Multiple vulnerabilities have been found in systemd, the worst of\n    which may allow execution of arbitrary code.","references":[{"reference_url":"http://packetstormsecurity.com/files/152841/System-Down-A-systemd-journald-Exploit.html","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:41:29Z/"}],"url":"http://packetstormsecurity.com/files/152841/System-Down-A-systemd-journald-Exploit.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16866.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16866.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16866","reference_id":"","reference_type":"","scores":[{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18882","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18974","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19109","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19162","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18878","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18956","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.1901","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19017","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.1897","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18918","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18873","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18885","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18897","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18786","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18765","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18722","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.186","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18684","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18787","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.1875","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18782","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16866"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16866","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:41:29Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16866"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16866","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16866"},{"reference_url":"http://seclists.org/fulldisclosure/2019/May/21","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:41:29Z/"}],"url":"http://seclists.org/fulldisclosure/2019/May/21"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://seclists.org/bugtraq/2019/May/25","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:41:29Z/"}],"url":"https://seclists.org/bugtraq/2019/May/25"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190117-0001/","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:41:29Z/"}],"url":"https://security.netapp.com/advisory/ntap-20190117-0001/"},{"reference_url":"https://www.debian.org/security/2019/dsa-4367","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:41:29Z/"}],"url":"https://www.debian.org/security/2019/dsa-4367"},{"reference_url":"https://www.qualys.com/2019/01/09/system-down/system-down.txt","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:41:29Z/"}],"url":"https://www.qualys.com/2019/01/09/system-down/system-down.txt"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/05/10/4","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:41:29Z/"}],"url":"http://www.openwall.com/lists/oss-security/2019/05/10/4"},{"reference_url":"http://www.securityfocus.com/bid/106527","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:41:29Z/"}],"url":"http://www.securityfocus.com/bid/106527"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1653867","reference_id":"1653867","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1653867"},{"reference_url":"https://security.archlinux.org/ASA-201901-4","reference_id":"ASA-201901-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201901-4"},{"reference_url":"https://security.archlinux.org/AVG-615","reference_id":"AVG-615","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-615"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:element_software:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_\\(structure_a\\):7_s390x:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_\\(structure_a\\):7_s390x:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_\\(structure_a\\):7_s390x:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-16866","reference_id":"CVE-2018-16866","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:N"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-16866"},{"reference_url":"https://security.gentoo.org/glsa/201903-07","reference_id":"GLSA-201903-07","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:41:29Z/"}],"url":"https://security.gentoo.org/glsa/201903-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2091","reference_id":"RHSA-2019:2091","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:41:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:2091"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3222","reference_id":"RHSA-2019:3222","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:41:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3222"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0593","reference_id":"RHSA-2020:0593","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:41:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0593"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1264","reference_id":"RHSA-2020:1264","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1264"},{"reference_url":"https://usn.ubuntu.com/3855-1/","reference_id":"USN-3855-1","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:41:29Z/"}],"url":"https://usn.ubuntu.com/3855-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1038433?format=json","purl":"pkg:deb/debian/systemd@241-7~deb10u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2nq3-t67f-57ha"},{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-71xj-3x1z-6kh4"},{"vulnerability":"VCID-7mtw-85gb-vyfz"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-8sva-z329-ekcr"},{"vulnerability":"VCID-94hk-2ehw-bqds"},{"vulnerability":"VCID-dvhg-mcz2-r3f5"},{"vulnerability":"VCID-e9ng-ewvh-kqeq"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-sdnj-avfk-7bch"},{"vulnerability":"VCID-sn1e-9p1f-1fen"},{"vulnerability":"VCID-tv9q-bzvp-sqb5"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-w7ys-gs9d-m3f5"},{"vulnerability":"VCID-yk9j-tm66-eyev"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@241-7~deb10u8"}],"aliases":["CVE-2018-16866"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nuf5-cg89-8bb7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60277?format=json","vulnerability_id":"VCID-q4kr-rg2c-f7ad","summary":"Multiple vulnerabilities have been found in systemd, the worst of\n    which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15688.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15688.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-15688","reference_id":"","reference_type":"","scores":[{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71965","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71906","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72688","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.7256","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72567","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72598","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.7261","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72634","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72616","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72606","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72648","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72658","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72649","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72691","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.727","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72696","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72718","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72742","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72706","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72584","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-15688"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15688","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15688"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/systemd/systemd/pull/10518","reference_id":"10518","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:55:22Z/"}],"url":"https://github.com/systemd/systemd/pull/10518"},{"reference_url":"http://www.securityfocus.com/bid/105745","reference_id":"105745","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:55:22Z/"}],"url":"http://www.securityfocus.com/bid/105745"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1639067","reference_id":"1639067","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1639067"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912008","reference_id":"912008","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912008"},{"reference_url":"https://security.archlinux.org/ASA-201811-11","reference_id":"ASA-201811-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201811-11"},{"reference_url":"https://security.archlinux.org/AVG-789","reference_id":"AVG-789","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-789"},{"reference_url":"https://security.gentoo.org/glsa/201810-10","reference_id":"GLSA-201810-10","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:55:22Z/"}],"url":"https://security.gentoo.org/glsa/201810-10"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/11/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:55:22Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2018/11/msg00017.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3665","reference_id":"RHSA-2018:3665","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:55:22Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:3665"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0049","reference_id":"RHSA-2019:0049","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:55:22Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:0049"},{"reference_url":"https://usn.ubuntu.com/3806-1/","reference_id":"USN-3806-1","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:55:22Z/"}],"url":"https://usn.ubuntu.com/3806-1/"},{"reference_url":"https://usn.ubuntu.com/3807-1/","reference_id":"USN-3807-1","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:55:22Z/"}],"url":"https://usn.ubuntu.com/3807-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1038433?format=json","purl":"pkg:deb/debian/systemd@241-7~deb10u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2nq3-t67f-57ha"},{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-71xj-3x1z-6kh4"},{"vulnerability":"VCID-7mtw-85gb-vyfz"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-8sva-z329-ekcr"},{"vulnerability":"VCID-94hk-2ehw-bqds"},{"vulnerability":"VCID-dvhg-mcz2-r3f5"},{"vulnerability":"VCID-e9ng-ewvh-kqeq"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-sdnj-avfk-7bch"},{"vulnerability":"VCID-sn1e-9p1f-1fen"},{"vulnerability":"VCID-tv9q-bzvp-sqb5"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-w7ys-gs9d-m3f5"},{"vulnerability":"VCID-yk9j-tm66-eyev"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@241-7~deb10u8"}],"aliases":["CVE-2018-15688"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q4kr-rg2c-f7ad"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83370?format=json","vulnerability_id":"VCID-sdnj-avfk-7bch","summary":"systemd: incorrect certificate validation results in acceptance of any certificate signed by a trusted certificate authority for DNS over TLS","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-21029.json","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-21029.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-21029","reference_id":"","reference_type":"","scores":[{"value":"0.0156","scoring_system":"epss","scoring_elements":"0.81414","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0156","scoring_system":"epss","scoring_elements":"0.81664","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0156","scoring_system":"epss","scoring_elements":"0.81609","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0156","scoring_system":"epss","scoring_elements":"0.81625","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0156","scoring_system":"epss","scoring_elements":"0.81423","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0156","scoring_system":"epss","scoring_elements":"0.81445","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0156","scoring_system":"epss","scoring_elements":"0.81443","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0156","scoring_system":"epss","scoring_elements":"0.81471","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0156","scoring_system":"epss","scoring_elements":"0.81476","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0156","scoring_system":"epss","scoring_elements":"0.81498","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0156","scoring_system":"epss","scoring_elements":"0.81485","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0156","scoring_system":"epss","scoring_elements":"0.81479","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0156","scoring_system":"epss","scoring_elements":"0.81515","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0156","scoring_system":"epss","scoring_elements":"0.81516","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0156","scoring_system":"epss","scoring_elements":"0.81518","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0156","scoring_system":"epss","scoring_elements":"0.8154","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0156","scoring_system":"epss","scoring_elements":"0.81548","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0156","scoring_system":"epss","scoring_elements":"0.81553","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0156","scoring_system":"epss","scoring_elements":"0.81571","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0156","scoring_system":"epss","scoring_elements":"0.81589","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0156","scoring_system":"epss","scoring_elements":"0.81612","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-21029"},{"reference_url":"https://blog.cloudflare.com/dns-encryption-explained/","reference_id":"","reference_type":"","scores":[],"url":"https://blog.cloudflare.com/dns-encryption-explained/"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21029","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21029"},{"reference_url":"https://github.com/systemd/systemd/blob/v239/man/resolved.conf.xml#L199-L207","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/systemd/systemd/blob/v239/man/resolved.conf.xml#L199-L207"},{"reference_url":"https://github.com/systemd/systemd/blob/v243/man/resolved.conf.xml#L196-L207","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/systemd/systemd/blob/v243/man/resolved.conf.xml#L196-L207"},{"reference_url":"https://github.com/systemd/systemd/blob/v243/src/resolve/resolved-dnstls-gnutls.c#L62-L63","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/systemd/systemd/blob/v243/src/resolve/resolved-dnstls-gnutls.c#L62-L63"},{"reference_url":"https://github.com/systemd/systemd/issues/9397","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/systemd/systemd/issues/9397"},{"reference_url":"https://github.com/systemd/systemd/pull/13870","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/systemd/systemd/pull/13870"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4NLJVOJMB6ANDILRLDZK26YGLYBEPHKY/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4NLJVOJMB6ANDILRLDZK26YGLYBEPHKY/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20191122-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20191122-0002/"},{"reference_url":"https://tools.ietf.org/html/rfc7858#section-4.1","reference_id":"","reference_type":"","scores":[],"url":"https://tools.ietf.org/html/rfc7858#section-4.1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1771725","reference_id":"1771725","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1771725"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-21029","reference_id":"CVE-2018-21029","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-21029"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049390?format=json","purl":"pkg:deb/debian/systemd@247.3-7%2Bdeb11u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-vprj-j7u6-zbe7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@247.3-7%252Bdeb11u4"}],"aliases":["CVE-2018-21029"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sdnj-avfk-7bch"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82585?format=json","vulnerability_id":"VCID-sn1e-9p1f-1fen","summary":"systemd: services with DynamicUser can create SUID/SGID binaries","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3843.json","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3843.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3843","reference_id":"","reference_type":"","scores":[{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31124","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31249","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.3067","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31165","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31196","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31201","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31158","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31114","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31146","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31127","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31095","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.30936","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.30815","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.30731","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.30583","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.30651","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.3066","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.30605","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31291","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31112","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securityfocus.com/bid/108116","reference_id":"108116","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:49:43Z/"}],"url":"http://www.securityfocus.com/bid/108116"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1684607","reference_id":"1684607","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1684607"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/","reference_id":"5JXQAKSTMABZ46EVCRMW62DHWYHTTFES","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:49:43Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928102","reference_id":"928102","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928102"},{"reference_url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1771","reference_id":"CVE-2019-3844;CVE-2019-3843","reference_type":"exploit","scores":[],"url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1771"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/46760.txt","reference_id":"CVE-2019-3844;CVE-2019-3843","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/46760.txt"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190619-0002/","reference_id":"ntap-20190619-0002","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:49:43Z/"}],"url":"https://security.netapp.com/advisory/ntap-20190619-0002/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1794","reference_id":"RHSA-2020:1794","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1794"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843","reference_id":"show_bug.cgi?id=CVE-2019-3843","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:49:43Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843"},{"reference_url":"https://usn.ubuntu.com/4269-1/","reference_id":"USN-4269-1","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:49:43Z/"}],"url":"https://usn.ubuntu.com/4269-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049390?format=json","purl":"pkg:deb/debian/systemd@247.3-7%2Bdeb11u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-vprj-j7u6-zbe7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@247.3-7%252Bdeb11u4"}],"aliases":["CVE-2019-3843"],"risk_score":8.0,"exploitability":"2.0","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sn1e-9p1f-1fen"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60023?format=json","vulnerability_id":"VCID-sn9x-3yp1-2ke4","summary":"Multiple vulnerabilities have been found in systemd, the worst of\n    which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/errata/RHBA-2019:0327","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:03Z/"}],"url":"https://access.redhat.com/errata/RHBA-2019:0327"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16864.json","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16864.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16864","reference_id":"","reference_type":"","scores":[{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34595","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34859","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35057","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35084","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34964","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35009","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35038","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35042","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35006","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34982","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35022","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35007","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34961","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34733","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34714","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34623","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34494","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34566","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34603","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34501","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34527","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16864","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:03Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16866","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16866"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/01/msg00016.html","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:03Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2019/01/msg00016.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190117-0001/","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:03Z/"}],"url":"https://security.netapp.com/advisory/ntap-20190117-0001/"},{"reference_url":"https://www.debian.org/security/2019/dsa-4367","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:03Z/"}],"url":"https://www.debian.org/security/2019/dsa-4367"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:03Z/"}],"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"reference_url":"https://www.qualys.com/2019/01/09/system-down/system-down.txt","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:03Z/"}],"url":"https://www.qualys.com/2019/01/09/system-down/system-down.txt"},{"reference_url":"http://www.openwall.com/lists/oss-security/2021/07/20/2","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:03Z/"}],"url":"http://www.openwall.com/lists/oss-security/2021/07/20/2"},{"reference_url":"http://www.securityfocus.com/bid/106523","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:03Z/"}],"url":"http://www.securityfocus.com/bid/106523"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1653855","reference_id":"1653855","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1653855"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=918841","reference_id":"918841","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=918841"},{"reference_url":"https://security.archlinux.org/ASA-201901-9","reference_id":"ASA-201901-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201901-9"},{"reference_url":"https://security.archlinux.org/AVG-845","reference_id":"AVG-845","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-845"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-16864","reference_id":"CVE-2018-16864","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"},{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-16864"},{"reference_url":"https://security.gentoo.org/glsa/201903-07","reference_id":"GLSA-201903-07","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:03Z/"}],"url":"https://security.gentoo.org/glsa/201903-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0049","reference_id":"RHSA-2019:0049","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:03Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:0049"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0204","reference_id":"RHSA-2019:0204","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:03Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:0204"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0271","reference_id":"RHSA-2019:0271","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:03Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:0271"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0342","reference_id":"RHSA-2019:0342","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:03Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:0342"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0361","reference_id":"RHSA-2019:0361","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:03Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:0361"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2402","reference_id":"RHSA-2019:2402","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:03Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:2402"},{"reference_url":"https://usn.ubuntu.com/3855-1/","reference_id":"USN-3855-1","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:03Z/"}],"url":"https://usn.ubuntu.com/3855-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1038433?format=json","purl":"pkg:deb/debian/systemd@241-7~deb10u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2nq3-t67f-57ha"},{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-71xj-3x1z-6kh4"},{"vulnerability":"VCID-7mtw-85gb-vyfz"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-8sva-z329-ekcr"},{"vulnerability":"VCID-94hk-2ehw-bqds"},{"vulnerability":"VCID-dvhg-mcz2-r3f5"},{"vulnerability":"VCID-e9ng-ewvh-kqeq"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-sdnj-avfk-7bch"},{"vulnerability":"VCID-sn1e-9p1f-1fen"},{"vulnerability":"VCID-tv9q-bzvp-sqb5"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-w7ys-gs9d-m3f5"},{"vulnerability":"VCID-yk9j-tm66-eyev"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@241-7~deb10u8"}],"aliases":["CVE-2018-16864"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sn9x-3yp1-2ke4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84048?format=json","vulnerability_id":"VCID-t3bf-3486-wqh1","summary":"systemd: kills privileged process if unprivileged PIDFile was tampered","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16888.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16888.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16888","reference_id":"","reference_type":"","scores":[{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36617","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.3628","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36241","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36269","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36183","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36206","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36773","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36804","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.3664","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36691","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36708","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36717","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36683","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36656","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36701","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36684","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36623","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36399","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36368","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36282","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36166","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16888"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16888","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16888"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16888","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16888"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.apache.org/thread.html/5960a34a524848cd722fd7ab7e2227eac10107b0f90d9d1e9c3caa74%40%3Cuser.cassandra.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/5960a34a524848cd722fd7ab7e2227eac10107b0f90d9d1e9c3caa74%40%3Cuser.cassandra.apache.org%3E"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190307-0007/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20190307-0007/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1662867","reference_id":"1662867","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1662867"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-16888","reference_id":"CVE-2018-16888","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:P"},{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H"},{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-16888"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2091","reference_id":"RHSA-2019:2091","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2091"},{"reference_url":"https://usn.ubuntu.com/4269-1/","reference_id":"USN-4269-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4269-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1038433?format=json","purl":"pkg:deb/debian/systemd@241-7~deb10u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2nq3-t67f-57ha"},{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-71xj-3x1z-6kh4"},{"vulnerability":"VCID-7mtw-85gb-vyfz"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-8sva-z329-ekcr"},{"vulnerability":"VCID-94hk-2ehw-bqds"},{"vulnerability":"VCID-dvhg-mcz2-r3f5"},{"vulnerability":"VCID-e9ng-ewvh-kqeq"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-sdnj-avfk-7bch"},{"vulnerability":"VCID-sn1e-9p1f-1fen"},{"vulnerability":"VCID-tv9q-bzvp-sqb5"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-w7ys-gs9d-m3f5"},{"vulnerability":"VCID-yk9j-tm66-eyev"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@241-7~deb10u8"}],"aliases":["CVE-2018-16888"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t3bf-3486-wqh1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78618?format=json","vulnerability_id":"VCID-tv9q-bzvp-sqb5","summary":"systemd: privilege escalation via the less pager","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-26604.json","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-26604.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-26604","reference_id":"","reference_type":"","scores":[{"value":"0.05624","scoring_system":"epss","scoring_elements":"0.90426","published_at":"2026-05-14T12:55:00Z"},{"value":"0.05624","scoring_system":"epss","scoring_elements":"0.903","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05624","scoring_system":"epss","scoring_elements":"0.90346","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05624","scoring_system":"epss","scoring_elements":"0.9034","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05624","scoring_system":"epss","scoring_elements":"0.90356","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05624","scoring_system":"epss","scoring_elements":"0.90353","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05624","scoring_system":"epss","scoring_elements":"0.90369","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05624","scoring_system":"epss","scoring_elements":"0.90365","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05624","scoring_system":"epss","scoring_elements":"0.90378","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05624","scoring_system":"epss","scoring_elements":"0.90395","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05624","scoring_system":"epss","scoring_elements":"0.90407","published_at":"2026-05-09T12:55:00Z"},{"value":"0.05624","scoring_system":"epss","scoring_elements":"0.90403","published_at":"2026-05-11T12:55:00Z"},{"value":"0.05624","scoring_system":"epss","scoring_elements":"0.90412","published_at":"2026-05-12T12:55:00Z"},{"value":"0.05624","scoring_system":"epss","scoring_elements":"0.90313","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05624","scoring_system":"epss","scoring_elements":"0.90318","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05624","scoring_system":"epss","scoring_elements":"0.90332","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05624","scoring_system":"epss","scoring_elements":"0.90339","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05624","scoring_system":"epss","scoring_elements":"0.90347","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-26604"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26604"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2175611","reference_id":"2175611","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2175611"},{"reference_url":"https://blog.compass-security.com/2012/10/dangerous-sudoers-entries-part-2-insecure-functionality/","reference_id":"dangerous-sudoers-entries-part-2-insecure-functionality","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-03-07T18:16:19Z/"}],"url":"https://blog.compass-security.com/2012/10/dangerous-sudoers-entries-part-2-insecure-functionality/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/03/msg00032.html","reference_id":"msg00032.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-03-07T18:16:19Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/03/msg00032.html"},{"reference_url":"https://github.com/systemd/systemd/blob/main/NEWS#L4335-L4340","reference_id":"NEWS#L4335-L4340","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-03-07T18:16:19Z/"}],"url":"https://github.com/systemd/systemd/blob/main/NEWS#L4335-L4340"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230505-0009/","reference_id":"ntap-20230505-0009","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-03-07T18:16:19Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230505-0009/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3837","reference_id":"RHSA-2023:3837","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3837"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1105","reference_id":"RHSA-2024:1105","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1105"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7705","reference_id":"RHSA-2024:7705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7705"},{"reference_url":"https://medium.com/%40zenmoviefornotification/saidov-maxim-cve-2023-26604-c1232a526ba7","reference_id":"saidov-maxim-cve-2023-26604-c1232a526ba7","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-03-07T18:16:19Z/"}],"url":"https://medium.com/%40zenmoviefornotification/saidov-maxim-cve-2023-26604-c1232a526ba7"},{"reference_url":"http://packetstormsecurity.com/files/174130/systemd-246-Local-Root-Privilege-Escalation.html","reference_id":"systemd-246-Local-Root-Privilege-Escalation.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-03-07T18:16:19Z/"}],"url":"http://packetstormsecurity.com/files/174130/systemd-246-Local-Root-Privilege-Escalation.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049390?format=json","purl":"pkg:deb/debian/systemd@247.3-7%2Bdeb11u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-vprj-j7u6-zbe7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@247.3-7%252Bdeb11u4"}],"aliases":["CVE-2023-26604"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tv9q-bzvp-sqb5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61412?format=json","vulnerability_id":"VCID-vprj-j7u6-zbe7","summary":"Multiple vulnerabilities have been discovered in Dnsmasq, the worst of which could lead to a denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-50868.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-50868.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-50868","reference_id":"","reference_type":"","scores":[{"value":"0.11802","scoring_system":"epss","scoring_elements":"0.93778","published_at":"2026-05-12T12:55:00Z"},{"value":"0.11802","scoring_system":"epss","scoring_elements":"0.93774","published_at":"2026-05-11T12:55:00Z"},{"value":"0.11802","scoring_system":"epss","scoring_elements":"0.9377","published_at":"2026-05-09T12:55:00Z"},{"value":"0.11802","scoring_system":"epss","scoring_elements":"0.9373","published_at":"2026-04-16T12:55:00Z"},{"value":"0.11802","scoring_system":"epss","scoring_elements":"0.93684","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11802","scoring_system":"epss","scoring_elements":"0.93791","published_at":"2026-05-14T12:55:00Z"},{"value":"0.11802","scoring_system":"epss","scoring_elements":"0.93741","published_at":"2026-04-29T12:55:00Z"},{"value":"0.11802","scoring_system":"epss","scoring_elements":"0.93742","published_at":"2026-04-26T12:55:00Z"},{"value":"0.11802","scoring_system":"epss","scoring_elements":"0.93745","published_at":"2026-04-24T12:55:00Z"},{"value":"0.11802","scoring_system":"epss","scoring_elements":"0.9374","published_at":"2026-04-21T12:55:00Z"},{"value":"0.11802","scoring_system":"epss","scoring_elements":"0.93694","published_at":"2026-04-04T12:55:00Z"},{"value":"0.11802","scoring_system":"epss","scoring_elements":"0.93696","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11802","scoring_system":"epss","scoring_elements":"0.93706","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11802","scoring_system":"epss","scoring_elements":"0.93708","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11802","scoring_system":"epss","scoring_elements":"0.93712","published_at":"2026-04-12T12:55:00Z"},{"value":"0.11802","scoring_system":"epss","scoring_elements":"0.93713","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11802","scoring_system":"epss","scoring_elements":"0.93737","published_at":"2026-04-18T12:55:00Z"},{"value":"0.11802","scoring_system":"epss","scoring_elements":"0.93761","published_at":"2026-05-07T12:55:00Z"},{"value":"0.11802","scoring_system":"epss","scoring_elements":"0.9375","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-50868"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html","reference_id":"017430.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"}],"url":"https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1063845","reference_id":"1063845","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1063845"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1063852","reference_id":"1063852","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1063852"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077751","reference_id":"1077751","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077751"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/02/16/2","reference_id":"2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/02/16/2"},{"reference_url":"https://www.isc.org/blogs/2024-bind-security-release/","reference_id":"2024-bind-security-release","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"}],"url":"https://www.isc.org/blogs/2024-bind-security-release/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2263917","reference_id":"2263917","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2263917"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/02/16/3","reference_id":"3","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/02/16/3"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/","reference_id":"6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/","reference_id":"BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/"},{"reference_url":"https://kb.isc.org/docs/cve-2023-50868","reference_id":"cve-2023-50868","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"}],"url":"https://kb.isc.org/docs/cve-2023-50868"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-50868","reference_id":"CVE-2023-50868","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-50868"},{"reference_url":"https://security.gentoo.org/glsa/202412-10","reference_id":"GLSA-202412-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-10"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/","reference_id":"HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/","reference_id":"IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html","reference_id":"msg00011.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240307-0008/","reference_id":"ntap-20240307-0008","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240307-0008/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/","reference_id":"PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/"},{"reference_url":"https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html","reference_id":"powerdns-advisory-2024-01.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"}],"url":"https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html"},{"reference_url":"https://datatracker.ietf.org/doc/html/rfc5155","reference_id":"rfc5155","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"}],"url":"https://datatracker.ietf.org/doc/html/rfc5155"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/","reference_id":"RGS7JN6FZXUSTC2XKQHH27574XOULYYJ","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0965","reference_id":"RHSA-2024:0965","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0965"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0977","reference_id":"RHSA-2024:0977","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0977"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0981","reference_id":"RHSA-2024:0981","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0981"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0982","reference_id":"RHSA-2024:0982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11003","reference_id":"RHSA-2024:11003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1334","reference_id":"RHSA-2024:1334","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1334"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1335","reference_id":"RHSA-2024:1335","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1335"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1522","reference_id":"RHSA-2024:1522","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1522"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1543","reference_id":"RHSA-2024:1543","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1543"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1544","reference_id":"RHSA-2024:1544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1545","reference_id":"RHSA-2024:1545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1647","reference_id":"RHSA-2024:1647","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1647"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1648","reference_id":"RHSA-2024:1648","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1648"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1781","reference_id":"RHSA-2024:1781","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1781"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1782","reference_id":"RHSA-2024:1782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1789","reference_id":"RHSA-2024:1789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1800","reference_id":"RHSA-2024:1800","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1800"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1801","reference_id":"RHSA-2024:1801","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1801"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1803","reference_id":"RHSA-2024:1803","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1803"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1804","reference_id":"RHSA-2024:1804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1804"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2551","reference_id":"RHSA-2024:2551","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2551"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2587","reference_id":"RHSA-2024:2587","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2587"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2696","reference_id":"RHSA-2024:2696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2696"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2720","reference_id":"RHSA-2024:2720","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2720"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2721","reference_id":"RHSA-2024:2721","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2721"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2821","reference_id":"RHSA-2024:2821","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2821"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2890","reference_id":"RHSA-2024:2890","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2890"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3271","reference_id":"RHSA-2024:3271","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3271"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3741","reference_id":"RHSA-2024:3741","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3741"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3877","reference_id":"RHSA-2024:3877","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3877"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3929","reference_id":"RHSA-2024:3929","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3929"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0039","reference_id":"RHSA-2025:0039","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0039"},{"reference_url":"https://bugzilla.suse.com/show_bug.cgi?id=1219826","reference_id":"show_bug.cgi?id=1219826","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"}],"url":"https://bugzilla.suse.com/show_bug.cgi?id=1219826"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/","reference_id":"SVYA42BLXUCIDLD35YIJPJSHDIADNYMP","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/","reference_id":"TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/"},{"reference_url":"https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/","reference_id":"unbound-1.19.1-released","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"}],"url":"https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/","reference_id":"UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/"},{"reference_url":"https://usn.ubuntu.com/6633-1/","reference_id":"USN-6633-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6633-1/"},{"reference_url":"https://usn.ubuntu.com/6642-1/","reference_id":"USN-6642-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6642-1/"},{"reference_url":"https://usn.ubuntu.com/6657-1/","reference_id":"USN-6657-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6657-1/"},{"reference_url":"https://usn.ubuntu.com/6657-2/","reference_id":"USN-6657-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6657-2/"},{"reference_url":"https://usn.ubuntu.com/6665-1/","reference_id":"USN-6665-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6665-1/"},{"reference_url":"https://usn.ubuntu.com/6723-1/","reference_id":"USN-6723-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6723-1/"},{"reference_url":"https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1","reference_id":"v5.7.1","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"}],"url":"https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/","reference_id":"ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994540?format=json","purl":"pkg:deb/debian/systemd@252.39-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@252.39-1~deb12u1"}],"aliases":["CVE-2023-50868"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vprj-j7u6-zbe7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60026?format=json","vulnerability_id":"VCID-vrsm-6j4m-cka4","summary":"Multiple vulnerabilities have been found in systemd, the worst of\n    which may allow execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00070.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00070.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6454.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6454.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-6454","reference_id":"","reference_type":"","scores":[{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29629","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29573","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29079","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.2914","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29154","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29078","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29098","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29695","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29746","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29565","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29628","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29665","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29668","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29623","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29592","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29566","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29521","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29405","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29291","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29225","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29565","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-6454"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6454","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6454"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/systemd/systemd/commits/master/src/libsystemd/sd-bus/bus-objects.c","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/systemd/systemd/commits/master/src/libsystemd/sd-bus/bus-objects.c"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10278","reference_id":"","reference_type":"","scores":[],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10278"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/02/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/02/msg00031.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N67IOBOTDOMVNQJ5QRU2MXLEECXPGNVJ/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N67IOBOTDOMVNQJ5QRU2MXLEECXPGNVJ/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190327-0004/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20190327-0004/"},{"reference_url":"https://www.debian.org/security/2019/dsa-4393","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2019/dsa-4393"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/02/18/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2019/02/18/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/02/19/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2019/02/19/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2021/07/20/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2021/07/20/2"},{"reference_url":"http://www.securityfocus.com/bid/107081","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/107081"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1667032","reference_id":"1667032","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1667032"},{"reference_url":"https://security.archlinux.org/ASA-201902-24","reference_id":"ASA-201902-24","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201902-24"},{"reference_url":"https://security.archlinux.org/AVG-906","reference_id":"AVG-906","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-906"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:239:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:systemd_project:systemd:239:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:239:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-6454","reference_id":"CVE-2019-6454","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:C"},{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-6454"},{"reference_url":"https://security.gentoo.org/glsa/201903-07","reference_id":"GLSA-201903-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201903-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0368","reference_id":"RHSA-2019:0368","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0368"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0457","reference_id":"RHSA-2019:0457","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0457"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0461","reference_id":"RHSA-2019:0461","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0461"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0990","reference_id":"RHSA-2019:0990","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0990"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1322","reference_id":"RHSA-2019:1322","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1322"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1502","reference_id":"RHSA-2019:1502","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2805","reference_id":"RHSA-2019:2805","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2805"},{"reference_url":"https://usn.ubuntu.com/3891-1/","reference_id":"USN-3891-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3891-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1038433?format=json","purl":"pkg:deb/debian/systemd@241-7~deb10u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2nq3-t67f-57ha"},{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-71xj-3x1z-6kh4"},{"vulnerability":"VCID-7mtw-85gb-vyfz"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-8sva-z329-ekcr"},{"vulnerability":"VCID-94hk-2ehw-bqds"},{"vulnerability":"VCID-dvhg-mcz2-r3f5"},{"vulnerability":"VCID-e9ng-ewvh-kqeq"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-sdnj-avfk-7bch"},{"vulnerability":"VCID-sn1e-9p1f-1fen"},{"vulnerability":"VCID-tv9q-bzvp-sqb5"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-w7ys-gs9d-m3f5"},{"vulnerability":"VCID-yk9j-tm66-eyev"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@241-7~deb10u8"}],"aliases":["CVE-2019-6454"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vrsm-6j4m-cka4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81235?format=json","vulnerability_id":"VCID-w7ys-gs9d-m3f5","summary":"systemd: Mishandles numerical usernames beginning with decimal digits or 0x followed by hexadecimal digits","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13776.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13776.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-13776","reference_id":"","reference_type":"","scores":[{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.3341","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.3355","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33174","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33243","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33163","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33049","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33118","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33158","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33069","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33094","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33582","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33422","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33466","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.335","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33503","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33462","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33438","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33475","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.3345","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33417","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33262","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-13776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13776"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/systemd/systemd/issues/15985","reference_id":"15985","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:45:10Z/"}],"url":"https://github.com/systemd/systemd/issues/15985"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1845534","reference_id":"1845534","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1845534"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/","reference_id":"IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:45:10Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20200611-0003/","reference_id":"ntap-20200611-0003","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:45:10Z/"}],"url":"https://security.netapp.com/advisory/ntap-20200611-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1611","reference_id":"RHSA-2021:1611","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1611"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3900","reference_id":"RHSA-2021:3900","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3900"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049390?format=json","purl":"pkg:deb/debian/systemd@247.3-7%2Bdeb11u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-vprj-j7u6-zbe7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@247.3-7%252Bdeb11u4"}],"aliases":["CVE-2020-13776"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w7ys-gs9d-m3f5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49034?format=json","vulnerability_id":"VCID-yk9j-tm66-eyev","summary":"Multiple vulnerabilities have been discovered in systemd, the worst of which can lead to a denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4415.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4415.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-4415","reference_id":"","reference_type":"","scores":[{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09552","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09599","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09613","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09527","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09688","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09758","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09733","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09768","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09601","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09513","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09587","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09636","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09646","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09614","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09488","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09492","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09641","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09689","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09654","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.1056","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-4415"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4415","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4415"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026831","reference_id":"1026831","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026831"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2155515","reference_id":"2155515","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2155515"},{"reference_url":"https://www.openwall.com/lists/oss-security/2022/12/21/3","reference_id":"3","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:33Z/"}],"url":"https://www.openwall.com/lists/oss-security/2022/12/21/3"},{"reference_url":"https://github.com/systemd/systemd/commit/b7641425659243c09473cd8fb3aef2c0d4a3eb9c","reference_id":"b7641425659243c09473cd8fb3aef2c0d4a3eb9c","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:33Z/"}],"url":"https://github.com/systemd/systemd/commit/b7641425659243c09473cd8fb3aef2c0d4a3eb9c"},{"reference_url":"https://security.gentoo.org/glsa/202405-04","reference_id":"GLSA-202405-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0837","reference_id":"RHSA-2023:0837","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0837"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0954","reference_id":"RHSA-2023:0954","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0954"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1105","reference_id":"RHSA-2024:1105","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1105"},{"reference_url":"https://usn.ubuntu.com/5928-1/","reference_id":"USN-5928-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5928-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049390?format=json","purl":"pkg:deb/debian/systemd@247.3-7%2Bdeb11u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-vprj-j7u6-zbe7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@247.3-7%252Bdeb11u4"}],"aliases":["CVE-2022-4415"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yk9j-tm66-eyev"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84382?format=json","vulnerability_id":"VCID-z5kr-1k65-hyh3","summary":"systemd: automount: access to automounted volumes can lock up","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1049.json","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1049.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1049","reference_id":"","reference_type":"","scores":[{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64474","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64421","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00512","scoring_system":"epss","scoring_elements":"0.66441","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00512","scoring_system":"epss","scoring_elements":"0.66467","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00512","scoring_system":"epss","scoring_elements":"0.66438","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00512","scoring_system":"epss","scoring_elements":"0.66487","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00512","scoring_system":"epss","scoring_elements":"0.665","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00512","scoring_system":"epss","scoring_elements":"0.6652","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00512","scoring_system":"epss","scoring_elements":"0.66508","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00512","scoring_system":"epss","scoring_elements":"0.66477","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00512","scoring_system":"epss","scoring_elements":"0.66512","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00512","scoring_system":"epss","scoring_elements":"0.6653","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00512","scoring_system":"epss","scoring_elements":"0.66515","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00512","scoring_system":"epss","scoring_elements":"0.66539","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00512","scoring_system":"epss","scoring_elements":"0.66554","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00512","scoring_system":"epss","scoring_elements":"0.66555","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00512","scoring_system":"epss","scoring_elements":"0.66529","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00512","scoring_system":"epss","scoring_elements":"0.66574","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00512","scoring_system":"epss","scoring_elements":"0.66618","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00512","scoring_system":"epss","scoring_elements":"0.66591","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00512","scoring_system":"epss","scoring_elements":"0.66402","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1049"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1049","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1049"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1534701","reference_id":"1534701","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1534701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0260","reference_id":"RHSA-2018:0260","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0260"},{"reference_url":"https://usn.ubuntu.com/3558-1/","reference_id":"USN-3558-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3558-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1038433?format=json","purl":"pkg:deb/debian/systemd@241-7~deb10u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2nq3-t67f-57ha"},{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-71xj-3x1z-6kh4"},{"vulnerability":"VCID-7mtw-85gb-vyfz"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-8sva-z329-ekcr"},{"vulnerability":"VCID-94hk-2ehw-bqds"},{"vulnerability":"VCID-dvhg-mcz2-r3f5"},{"vulnerability":"VCID-e9ng-ewvh-kqeq"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-sdnj-avfk-7bch"},{"vulnerability":"VCID-sn1e-9p1f-1fen"},{"vulnerability":"VCID-tv9q-bzvp-sqb5"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-w7ys-gs9d-m3f5"},{"vulnerability":"VCID-yk9j-tm66-eyev"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@241-7~deb10u8"}],"aliases":["CVE-2018-1049"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z5kr-1k65-hyh3"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79394?format=json","vulnerability_id":"VCID-7war-ne2h-wkej","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:47:18Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html"},{"reference_url":"http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:47:18Z/"}],"url":"http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3842.json","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3842.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3842","reference_id":"","reference_type":"","scores":[{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26695","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26988","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27028","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26856","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26925","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26971","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26975","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.2693","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26872","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26883","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26854","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26815","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26757","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26749","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.2668","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26546","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26615","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.2667","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26597","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27066","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3842"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:47:18Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3842"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:47:18Z/"}],"url":"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:47:18Z/"}],"url":"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:47:18Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:47:18Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/"},{"reference_url":"https://www.exploit-db.com/exploits/46743/","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:47:18Z/"}],"url":"https://www.exploit-db.com/exploits/46743/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1668521","reference_id":"1668521","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1668521"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:242:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:systemd_project:systemd:242:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:242:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:242:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:systemd_project:systemd:242:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:242:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:242:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:systemd_project:systemd:242:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:242:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1756","reference_id":"CVE-2019-3842","reference_type":"exploit","scores":[],"url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1756"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/46743.txt","reference_id":"CVE-2019-3842","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/46743.txt"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-3842","reference_id":"CVE-2019-3842","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:P/A:P"},{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"7.0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-3842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1611","reference_id":"RHSA-2021:1611","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1611"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3900","reference_id":"RHSA-2021:3900","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3900"},{"reference_url":"https://usn.ubuntu.com/3938-1/","reference_id":"USN-3938-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3938-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037157?format=json","purl":"pkg:deb/debian/systemd@232-25%2Bdeb9u12","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1mej-gstk-pfbs"},{"vulnerability":"VCID-2nq3-t67f-57ha"},{"vulnerability":"VCID-4dq5-84vh-u3bz"},{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-5j51-kyj4-gkag"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-71xj-3x1z-6kh4"},{"vulnerability":"VCID-7mtw-85gb-vyfz"},{"vulnerability":"VCID-7p2k-q6vr-3kf5"},{"vulnerability":"VCID-7war-ne2h-wkej"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-8sva-z329-ekcr"},{"vulnerability":"VCID-8x92-ah94-47f7"},{"vulnerability":"VCID-94hk-2ehw-bqds"},{"vulnerability":"VCID-cmbj-869t-c3e3"},{"vulnerability":"VCID-dvhg-mcz2-r3f5"},{"vulnerability":"VCID-e7km-pysq-hqe2"},{"vulnerability":"VCID-e9ng-ewvh-kqeq"},{"vulnerability":"VCID-fdkt-299k-vufa"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-mgcn-uevn-13c3"},{"vulnerability":"VCID-nuf5-cg89-8bb7"},{"vulnerability":"VCID-q4kr-rg2c-f7ad"},{"vulnerability":"VCID-sdnj-avfk-7bch"},{"vulnerability":"VCID-sn1e-9p1f-1fen"},{"vulnerability":"VCID-sn9x-3yp1-2ke4"},{"vulnerability":"VCID-t3bf-3486-wqh1"},{"vulnerability":"VCID-tv9q-bzvp-sqb5"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-vrsm-6j4m-cka4"},{"vulnerability":"VCID-w7ys-gs9d-m3f5"},{"vulnerability":"VCID-yk9j-tm66-eyev"},{"vulnerability":"VCID-z5kr-1k65-hyh3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@232-25%252Bdeb9u12"},{"url":"http://public2.vulnerablecode.io/api/packages/1038433?format=json","purl":"pkg:deb/debian/systemd@241-7~deb10u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2nq3-t67f-57ha"},{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-71xj-3x1z-6kh4"},{"vulnerability":"VCID-7mtw-85gb-vyfz"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-8sva-z329-ekcr"},{"vulnerability":"VCID-94hk-2ehw-bqds"},{"vulnerability":"VCID-dvhg-mcz2-r3f5"},{"vulnerability":"VCID-e9ng-ewvh-kqeq"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-sdnj-avfk-7bch"},{"vulnerability":"VCID-sn1e-9p1f-1fen"},{"vulnerability":"VCID-tv9q-bzvp-sqb5"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-w7ys-gs9d-m3f5"},{"vulnerability":"VCID-yk9j-tm66-eyev"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@241-7~deb10u8"}],"aliases":["CVE-2019-3842"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7war-ne2h-wkej"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84347?format=json","vulnerability_id":"VCID-egf8-guux-pybe","summary":"systemd: Null pointer dereference in dns_packet_is_reply_for function","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9217.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9217.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9217","reference_id":"","reference_type":"","scores":[{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.76054","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75989","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.76004","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01498","scoring_system":"epss","scoring_elements":"0.81063","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01498","scoring_system":"epss","scoring_elements":"0.81072","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01498","scoring_system":"epss","scoring_elements":"0.81096","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01498","scoring_system":"epss","scoring_elements":"0.81124","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01498","scoring_system":"epss","scoring_elements":"0.8113","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01498","scoring_system":"epss","scoring_elements":"0.81148","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01498","scoring_system":"epss","scoring_elements":"0.81135","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01498","scoring_system":"epss","scoring_elements":"0.81128","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01498","scoring_system":"epss","scoring_elements":"0.81164","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01498","scoring_system":"epss","scoring_elements":"0.81166","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01498","scoring_system":"epss","scoring_elements":"0.81187","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01498","scoring_system":"epss","scoring_elements":"0.81194","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01498","scoring_system":"epss","scoring_elements":"0.81199","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01498","scoring_system":"epss","scoring_elements":"0.81214","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01498","scoring_system":"epss","scoring_elements":"0.81235","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01498","scoring_system":"epss","scoring_elements":"0.81256","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9217"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9217","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9217"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"},{"value":"4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1455493","reference_id":"1455493","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1455493"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863277","reference_id":"863277","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863277"},{"reference_url":"https://security.archlinux.org/ASA-201707-5","reference_id":"ASA-201707-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201707-5"},{"reference_url":"https://security.archlinux.org/AVG-337","reference_id":"AVG-337","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-337"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037157?format=json","purl":"pkg:deb/debian/systemd@232-25%2Bdeb9u12","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1mej-gstk-pfbs"},{"vulnerability":"VCID-2nq3-t67f-57ha"},{"vulnerability":"VCID-4dq5-84vh-u3bz"},{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-5j51-kyj4-gkag"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-71xj-3x1z-6kh4"},{"vulnerability":"VCID-7mtw-85gb-vyfz"},{"vulnerability":"VCID-7p2k-q6vr-3kf5"},{"vulnerability":"VCID-7war-ne2h-wkej"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-8sva-z329-ekcr"},{"vulnerability":"VCID-8x92-ah94-47f7"},{"vulnerability":"VCID-94hk-2ehw-bqds"},{"vulnerability":"VCID-cmbj-869t-c3e3"},{"vulnerability":"VCID-dvhg-mcz2-r3f5"},{"vulnerability":"VCID-e7km-pysq-hqe2"},{"vulnerability":"VCID-e9ng-ewvh-kqeq"},{"vulnerability":"VCID-fdkt-299k-vufa"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-mgcn-uevn-13c3"},{"vulnerability":"VCID-nuf5-cg89-8bb7"},{"vulnerability":"VCID-q4kr-rg2c-f7ad"},{"vulnerability":"VCID-sdnj-avfk-7bch"},{"vulnerability":"VCID-sn1e-9p1f-1fen"},{"vulnerability":"VCID-sn9x-3yp1-2ke4"},{"vulnerability":"VCID-t3bf-3486-wqh1"},{"vulnerability":"VCID-tv9q-bzvp-sqb5"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-vrsm-6j4m-cka4"},{"vulnerability":"VCID-w7ys-gs9d-m3f5"},{"vulnerability":"VCID-yk9j-tm66-eyev"},{"vulnerability":"VCID-z5kr-1k65-hyh3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@232-25%252Bdeb9u12"}],"aliases":["CVE-2017-9217"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-egf8-guux-pybe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84876?format=json","vulnerability_id":"VCID-gkrw-z2cb-aud5","summary":"systemd: Assertion failure when PID 1 receives a zero-length message over notify socket","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7795.json","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7795.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7795","reference_id":"","reference_type":"","scores":[{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36794","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36453","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36356","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36378","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36953","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36986","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36818","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36869","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36884","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36893","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36857","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36832","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36877","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36859","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36802","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36575","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36544","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36456","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36339","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36412","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36439","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7795"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1380286","reference_id":"1380286","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1380286"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839171","reference_id":"839171","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839171"},{"reference_url":"https://security.archlinux.org/ASA-201610-2","reference_id":"ASA-201610-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201610-2"},{"reference_url":"https://security.archlinux.org/AVG-38","reference_id":"AVG-38","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-38"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2610","reference_id":"RHSA-2016:2610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2694","reference_id":"RHSA-2016:2694","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2694"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037157?format=json","purl":"pkg:deb/debian/systemd@232-25%2Bdeb9u12","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1mej-gstk-pfbs"},{"vulnerability":"VCID-2nq3-t67f-57ha"},{"vulnerability":"VCID-4dq5-84vh-u3bz"},{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-5j51-kyj4-gkag"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-71xj-3x1z-6kh4"},{"vulnerability":"VCID-7mtw-85gb-vyfz"},{"vulnerability":"VCID-7p2k-q6vr-3kf5"},{"vulnerability":"VCID-7war-ne2h-wkej"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-8sva-z329-ekcr"},{"vulnerability":"VCID-8x92-ah94-47f7"},{"vulnerability":"VCID-94hk-2ehw-bqds"},{"vulnerability":"VCID-cmbj-869t-c3e3"},{"vulnerability":"VCID-dvhg-mcz2-r3f5"},{"vulnerability":"VCID-e7km-pysq-hqe2"},{"vulnerability":"VCID-e9ng-ewvh-kqeq"},{"vulnerability":"VCID-fdkt-299k-vufa"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-mgcn-uevn-13c3"},{"vulnerability":"VCID-nuf5-cg89-8bb7"},{"vulnerability":"VCID-q4kr-rg2c-f7ad"},{"vulnerability":"VCID-sdnj-avfk-7bch"},{"vulnerability":"VCID-sn1e-9p1f-1fen"},{"vulnerability":"VCID-sn9x-3yp1-2ke4"},{"vulnerability":"VCID-t3bf-3486-wqh1"},{"vulnerability":"VCID-tv9q-bzvp-sqb5"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-vrsm-6j4m-cka4"},{"vulnerability":"VCID-w7ys-gs9d-m3f5"},{"vulnerability":"VCID-yk9j-tm66-eyev"},{"vulnerability":"VCID-z5kr-1k65-hyh3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@232-25%252Bdeb9u12"}],"aliases":["CVE-2016-7795"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gkrw-z2cb-aud5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84877?format=json","vulnerability_id":"VCID-jxun-f52c-gfg9","summary":"systemd: freeze when PID 1 receives a zero-length message over notify socket","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7796.json","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7796.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7796","reference_id":"","reference_type":"","scores":[{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59639","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59712","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59737","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59706","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59758","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59772","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59791","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59775","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59757","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59795","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59801","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59785","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59756","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59774","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59759","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59722","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.5977","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59832","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59787","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59814","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59879","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7796"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7796","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7796"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1381911","reference_id":"1381911","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1381911"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839607","reference_id":"839607","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0003","reference_id":"RHSA-2017:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0003"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037157?format=json","purl":"pkg:deb/debian/systemd@232-25%2Bdeb9u12","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1mej-gstk-pfbs"},{"vulnerability":"VCID-2nq3-t67f-57ha"},{"vulnerability":"VCID-4dq5-84vh-u3bz"},{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-5j51-kyj4-gkag"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-71xj-3x1z-6kh4"},{"vulnerability":"VCID-7mtw-85gb-vyfz"},{"vulnerability":"VCID-7p2k-q6vr-3kf5"},{"vulnerability":"VCID-7war-ne2h-wkej"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-8sva-z329-ekcr"},{"vulnerability":"VCID-8x92-ah94-47f7"},{"vulnerability":"VCID-94hk-2ehw-bqds"},{"vulnerability":"VCID-cmbj-869t-c3e3"},{"vulnerability":"VCID-dvhg-mcz2-r3f5"},{"vulnerability":"VCID-e7km-pysq-hqe2"},{"vulnerability":"VCID-e9ng-ewvh-kqeq"},{"vulnerability":"VCID-fdkt-299k-vufa"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-mgcn-uevn-13c3"},{"vulnerability":"VCID-nuf5-cg89-8bb7"},{"vulnerability":"VCID-q4kr-rg2c-f7ad"},{"vulnerability":"VCID-sdnj-avfk-7bch"},{"vulnerability":"VCID-sn1e-9p1f-1fen"},{"vulnerability":"VCID-sn9x-3yp1-2ke4"},{"vulnerability":"VCID-t3bf-3486-wqh1"},{"vulnerability":"VCID-tv9q-bzvp-sqb5"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-vrsm-6j4m-cka4"},{"vulnerability":"VCID-w7ys-gs9d-m3f5"},{"vulnerability":"VCID-yk9j-tm66-eyev"},{"vulnerability":"VCID-z5kr-1k65-hyh3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@232-25%252Bdeb9u12"}],"aliases":["CVE-2016-7796"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jxun-f52c-gfg9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60024?format=json","vulnerability_id":"VCID-mgcn-uevn-13c3","summary":"Multiple vulnerabilities have been found in systemd, the worst of\n    which may allow execution of arbitrary code.","references":[{"reference_url":"http://packetstormsecurity.com/files/152841/System-Down-A-systemd-journald-Exploit.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"http://packetstormsecurity.com/files/152841/System-Down-A-systemd-journald-Exploit.html"},{"reference_url":"https://access.redhat.com/errata/RHBA-2019:0327","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"https://access.redhat.com/errata/RHBA-2019:0327"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16865.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16865.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16865","reference_id":"","reference_type":"","scores":[{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79193","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79179","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79163","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79156","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79124","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79055","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79127","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79048","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79286","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79247","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79229","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.7923","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79213","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79109","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79123","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79098","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79091","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79067","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79081","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01222","scoring_system":"epss","scoring_elements":"0.79099","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16865"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16865","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16866","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16866"},{"reference_url":"http://seclists.org/fulldisclosure/2019/May/21","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"http://seclists.org/fulldisclosure/2019/May/21"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/01/msg00016.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2019/01/msg00016.html"},{"reference_url":"https://seclists.org/bugtraq/2019/May/25","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"https://seclists.org/bugtraq/2019/May/25"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190117-0001/","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"https://security.netapp.com/advisory/ntap-20190117-0001/"},{"reference_url":"https://www.debian.org/security/2019/dsa-4367","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"https://www.debian.org/security/2019/dsa-4367"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"reference_url":"https://www.qualys.com/2019/01/09/system-down/system-down.txt","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"https://www.qualys.com/2019/01/09/system-down/system-down.txt"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/05/10/4","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"http://www.openwall.com/lists/oss-security/2019/05/10/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2021/07/20/2","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"http://www.openwall.com/lists/oss-security/2021/07/20/2"},{"reference_url":"http://www.securityfocus.com/bid/106525","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"http://www.securityfocus.com/bid/106525"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1653861","reference_id":"1653861","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1653861"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=918848","reference_id":"918848","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=918848"},{"reference_url":"https://security.archlinux.org/ASA-201901-9","reference_id":"ASA-201901-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201901-9"},{"reference_url":"https://security.archlinux.org/AVG-845","reference_id":"AVG-845","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-845"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-16865","reference_id":"CVE-2018-16865","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-16865"},{"reference_url":"https://security.gentoo.org/glsa/201903-07","reference_id":"GLSA-201903-07","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"https://security.gentoo.org/glsa/201903-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0049","reference_id":"RHSA-2019:0049","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:0049"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0204","reference_id":"RHSA-2019:0204","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:0204"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0271","reference_id":"RHSA-2019:0271","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:0271"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0342","reference_id":"RHSA-2019:0342","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:0342"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0361","reference_id":"RHSA-2019:0361","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:0361"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2402","reference_id":"RHSA-2019:2402","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:2402"},{"reference_url":"https://usn.ubuntu.com/3855-1/","reference_id":"USN-3855-1","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:51:24Z/"}],"url":"https://usn.ubuntu.com/3855-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037157?format=json","purl":"pkg:deb/debian/systemd@232-25%2Bdeb9u12","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1mej-gstk-pfbs"},{"vulnerability":"VCID-2nq3-t67f-57ha"},{"vulnerability":"VCID-4dq5-84vh-u3bz"},{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-5j51-kyj4-gkag"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-71xj-3x1z-6kh4"},{"vulnerability":"VCID-7mtw-85gb-vyfz"},{"vulnerability":"VCID-7p2k-q6vr-3kf5"},{"vulnerability":"VCID-7war-ne2h-wkej"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-8sva-z329-ekcr"},{"vulnerability":"VCID-8x92-ah94-47f7"},{"vulnerability":"VCID-94hk-2ehw-bqds"},{"vulnerability":"VCID-cmbj-869t-c3e3"},{"vulnerability":"VCID-dvhg-mcz2-r3f5"},{"vulnerability":"VCID-e7km-pysq-hqe2"},{"vulnerability":"VCID-e9ng-ewvh-kqeq"},{"vulnerability":"VCID-fdkt-299k-vufa"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-mgcn-uevn-13c3"},{"vulnerability":"VCID-nuf5-cg89-8bb7"},{"vulnerability":"VCID-q4kr-rg2c-f7ad"},{"vulnerability":"VCID-sdnj-avfk-7bch"},{"vulnerability":"VCID-sn1e-9p1f-1fen"},{"vulnerability":"VCID-sn9x-3yp1-2ke4"},{"vulnerability":"VCID-t3bf-3486-wqh1"},{"vulnerability":"VCID-tv9q-bzvp-sqb5"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-vrsm-6j4m-cka4"},{"vulnerability":"VCID-w7ys-gs9d-m3f5"},{"vulnerability":"VCID-yk9j-tm66-eyev"},{"vulnerability":"VCID-z5kr-1k65-hyh3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@232-25%252Bdeb9u12"},{"url":"http://public2.vulnerablecode.io/api/packages/1038433?format=json","purl":"pkg:deb/debian/systemd@241-7~deb10u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2nq3-t67f-57ha"},{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-71xj-3x1z-6kh4"},{"vulnerability":"VCID-7mtw-85gb-vyfz"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-8sva-z329-ekcr"},{"vulnerability":"VCID-94hk-2ehw-bqds"},{"vulnerability":"VCID-dvhg-mcz2-r3f5"},{"vulnerability":"VCID-e9ng-ewvh-kqeq"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-sdnj-avfk-7bch"},{"vulnerability":"VCID-sn1e-9p1f-1fen"},{"vulnerability":"VCID-tv9q-bzvp-sqb5"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-w7ys-gs9d-m3f5"},{"vulnerability":"VCID-yk9j-tm66-eyev"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@241-7~deb10u8"}],"aliases":["CVE-2018-16865"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mgcn-uevn-13c3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60025?format=json","vulnerability_id":"VCID-nuf5-cg89-8bb7","summary":"Multiple vulnerabilities have been found in systemd, the worst of\n    which may allow execution of arbitrary code.","references":[{"reference_url":"http://packetstormsecurity.com/files/152841/System-Down-A-systemd-journald-Exploit.html","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:41:29Z/"}],"url":"http://packetstormsecurity.com/files/152841/System-Down-A-systemd-journald-Exploit.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16866.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16866.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16866","reference_id":"","reference_type":"","scores":[{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18882","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18974","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19109","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19162","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18878","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18956","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.1901","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19017","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.1897","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18918","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18873","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18885","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18897","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18786","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18765","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18722","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.186","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18684","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18787","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.1875","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18782","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16866"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16866","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:41:29Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16866"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16866","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16866"},{"reference_url":"http://seclists.org/fulldisclosure/2019/May/21","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:41:29Z/"}],"url":"http://seclists.org/fulldisclosure/2019/May/21"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://seclists.org/bugtraq/2019/May/25","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:41:29Z/"}],"url":"https://seclists.org/bugtraq/2019/May/25"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190117-0001/","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:41:29Z/"}],"url":"https://security.netapp.com/advisory/ntap-20190117-0001/"},{"reference_url":"https://www.debian.org/security/2019/dsa-4367","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:41:29Z/"}],"url":"https://www.debian.org/security/2019/dsa-4367"},{"reference_url":"https://www.qualys.com/2019/01/09/system-down/system-down.txt","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:41:29Z/"}],"url":"https://www.qualys.com/2019/01/09/system-down/system-down.txt"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/05/10/4","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:41:29Z/"}],"url":"http://www.openwall.com/lists/oss-security/2019/05/10/4"},{"reference_url":"http://www.securityfocus.com/bid/106527","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:41:29Z/"}],"url":"http://www.securityfocus.com/bid/106527"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1653867","reference_id":"1653867","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1653867"},{"reference_url":"https://security.archlinux.org/ASA-201901-4","reference_id":"ASA-201901-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201901-4"},{"reference_url":"https://security.archlinux.org/AVG-615","reference_id":"AVG-615","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-615"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:element_software:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_\\(structure_a\\):7_s390x:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_\\(structure_a\\):7_s390x:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_\\(structure_a\\):7_s390x:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-16866","reference_id":"CVE-2018-16866","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:N"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-16866"},{"reference_url":"https://security.gentoo.org/glsa/201903-07","reference_id":"GLSA-201903-07","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:41:29Z/"}],"url":"https://security.gentoo.org/glsa/201903-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2091","reference_id":"RHSA-2019:2091","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:41:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:2091"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3222","reference_id":"RHSA-2019:3222","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:41:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3222"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0593","reference_id":"RHSA-2020:0593","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:41:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0593"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1264","reference_id":"RHSA-2020:1264","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1264"},{"reference_url":"https://usn.ubuntu.com/3855-1/","reference_id":"USN-3855-1","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:41:29Z/"}],"url":"https://usn.ubuntu.com/3855-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037157?format=json","purl":"pkg:deb/debian/systemd@232-25%2Bdeb9u12","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1mej-gstk-pfbs"},{"vulnerability":"VCID-2nq3-t67f-57ha"},{"vulnerability":"VCID-4dq5-84vh-u3bz"},{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-5j51-kyj4-gkag"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-71xj-3x1z-6kh4"},{"vulnerability":"VCID-7mtw-85gb-vyfz"},{"vulnerability":"VCID-7p2k-q6vr-3kf5"},{"vulnerability":"VCID-7war-ne2h-wkej"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-8sva-z329-ekcr"},{"vulnerability":"VCID-8x92-ah94-47f7"},{"vulnerability":"VCID-94hk-2ehw-bqds"},{"vulnerability":"VCID-cmbj-869t-c3e3"},{"vulnerability":"VCID-dvhg-mcz2-r3f5"},{"vulnerability":"VCID-e7km-pysq-hqe2"},{"vulnerability":"VCID-e9ng-ewvh-kqeq"},{"vulnerability":"VCID-fdkt-299k-vufa"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-mgcn-uevn-13c3"},{"vulnerability":"VCID-nuf5-cg89-8bb7"},{"vulnerability":"VCID-q4kr-rg2c-f7ad"},{"vulnerability":"VCID-sdnj-avfk-7bch"},{"vulnerability":"VCID-sn1e-9p1f-1fen"},{"vulnerability":"VCID-sn9x-3yp1-2ke4"},{"vulnerability":"VCID-t3bf-3486-wqh1"},{"vulnerability":"VCID-tv9q-bzvp-sqb5"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-vrsm-6j4m-cka4"},{"vulnerability":"VCID-w7ys-gs9d-m3f5"},{"vulnerability":"VCID-yk9j-tm66-eyev"},{"vulnerability":"VCID-z5kr-1k65-hyh3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@232-25%252Bdeb9u12"},{"url":"http://public2.vulnerablecode.io/api/packages/1038433?format=json","purl":"pkg:deb/debian/systemd@241-7~deb10u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2nq3-t67f-57ha"},{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-71xj-3x1z-6kh4"},{"vulnerability":"VCID-7mtw-85gb-vyfz"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-8sva-z329-ekcr"},{"vulnerability":"VCID-94hk-2ehw-bqds"},{"vulnerability":"VCID-dvhg-mcz2-r3f5"},{"vulnerability":"VCID-e9ng-ewvh-kqeq"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-sdnj-avfk-7bch"},{"vulnerability":"VCID-sn1e-9p1f-1fen"},{"vulnerability":"VCID-tv9q-bzvp-sqb5"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-w7ys-gs9d-m3f5"},{"vulnerability":"VCID-yk9j-tm66-eyev"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@241-7~deb10u8"}],"aliases":["CVE-2018-16866"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nuf5-cg89-8bb7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60023?format=json","vulnerability_id":"VCID-sn9x-3yp1-2ke4","summary":"Multiple vulnerabilities have been found in systemd, the worst of\n    which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/errata/RHBA-2019:0327","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:03Z/"}],"url":"https://access.redhat.com/errata/RHBA-2019:0327"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16864.json","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16864.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16864","reference_id":"","reference_type":"","scores":[{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34595","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34859","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35057","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35084","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34964","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35009","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35038","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35042","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35006","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34982","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35022","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35007","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34961","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34733","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34714","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34623","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34494","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34566","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34603","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34501","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34527","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16864","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:03Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16866","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16866"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/01/msg00016.html","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:03Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2019/01/msg00016.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190117-0001/","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:03Z/"}],"url":"https://security.netapp.com/advisory/ntap-20190117-0001/"},{"reference_url":"https://www.debian.org/security/2019/dsa-4367","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:03Z/"}],"url":"https://www.debian.org/security/2019/dsa-4367"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:03Z/"}],"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"reference_url":"https://www.qualys.com/2019/01/09/system-down/system-down.txt","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:03Z/"}],"url":"https://www.qualys.com/2019/01/09/system-down/system-down.txt"},{"reference_url":"http://www.openwall.com/lists/oss-security/2021/07/20/2","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:03Z/"}],"url":"http://www.openwall.com/lists/oss-security/2021/07/20/2"},{"reference_url":"http://www.securityfocus.com/bid/106523","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:03Z/"}],"url":"http://www.securityfocus.com/bid/106523"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1653855","reference_id":"1653855","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1653855"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=918841","reference_id":"918841","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=918841"},{"reference_url":"https://security.archlinux.org/ASA-201901-9","reference_id":"ASA-201901-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201901-9"},{"reference_url":"https://security.archlinux.org/AVG-845","reference_id":"AVG-845","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-845"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-16864","reference_id":"CVE-2018-16864","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"},{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-16864"},{"reference_url":"https://security.gentoo.org/glsa/201903-07","reference_id":"GLSA-201903-07","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:03Z/"}],"url":"https://security.gentoo.org/glsa/201903-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0049","reference_id":"RHSA-2019:0049","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:03Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:0049"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0204","reference_id":"RHSA-2019:0204","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:03Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:0204"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0271","reference_id":"RHSA-2019:0271","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:03Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:0271"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0342","reference_id":"RHSA-2019:0342","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:03Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:0342"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0361","reference_id":"RHSA-2019:0361","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:03Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:0361"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2402","reference_id":"RHSA-2019:2402","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:03Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:2402"},{"reference_url":"https://usn.ubuntu.com/3855-1/","reference_id":"USN-3855-1","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:52:03Z/"}],"url":"https://usn.ubuntu.com/3855-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037157?format=json","purl":"pkg:deb/debian/systemd@232-25%2Bdeb9u12","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1mej-gstk-pfbs"},{"vulnerability":"VCID-2nq3-t67f-57ha"},{"vulnerability":"VCID-4dq5-84vh-u3bz"},{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-5j51-kyj4-gkag"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-71xj-3x1z-6kh4"},{"vulnerability":"VCID-7mtw-85gb-vyfz"},{"vulnerability":"VCID-7p2k-q6vr-3kf5"},{"vulnerability":"VCID-7war-ne2h-wkej"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-8sva-z329-ekcr"},{"vulnerability":"VCID-8x92-ah94-47f7"},{"vulnerability":"VCID-94hk-2ehw-bqds"},{"vulnerability":"VCID-cmbj-869t-c3e3"},{"vulnerability":"VCID-dvhg-mcz2-r3f5"},{"vulnerability":"VCID-e7km-pysq-hqe2"},{"vulnerability":"VCID-e9ng-ewvh-kqeq"},{"vulnerability":"VCID-fdkt-299k-vufa"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-mgcn-uevn-13c3"},{"vulnerability":"VCID-nuf5-cg89-8bb7"},{"vulnerability":"VCID-q4kr-rg2c-f7ad"},{"vulnerability":"VCID-sdnj-avfk-7bch"},{"vulnerability":"VCID-sn1e-9p1f-1fen"},{"vulnerability":"VCID-sn9x-3yp1-2ke4"},{"vulnerability":"VCID-t3bf-3486-wqh1"},{"vulnerability":"VCID-tv9q-bzvp-sqb5"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-vrsm-6j4m-cka4"},{"vulnerability":"VCID-w7ys-gs9d-m3f5"},{"vulnerability":"VCID-yk9j-tm66-eyev"},{"vulnerability":"VCID-z5kr-1k65-hyh3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@232-25%252Bdeb9u12"},{"url":"http://public2.vulnerablecode.io/api/packages/1038433?format=json","purl":"pkg:deb/debian/systemd@241-7~deb10u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2nq3-t67f-57ha"},{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-71xj-3x1z-6kh4"},{"vulnerability":"VCID-7mtw-85gb-vyfz"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-8sva-z329-ekcr"},{"vulnerability":"VCID-94hk-2ehw-bqds"},{"vulnerability":"VCID-dvhg-mcz2-r3f5"},{"vulnerability":"VCID-e9ng-ewvh-kqeq"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-sdnj-avfk-7bch"},{"vulnerability":"VCID-sn1e-9p1f-1fen"},{"vulnerability":"VCID-tv9q-bzvp-sqb5"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-w7ys-gs9d-m3f5"},{"vulnerability":"VCID-yk9j-tm66-eyev"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@241-7~deb10u8"}],"aliases":["CVE-2018-16864"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sn9x-3yp1-2ke4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60026?format=json","vulnerability_id":"VCID-vrsm-6j4m-cka4","summary":"Multiple vulnerabilities have been found in systemd, the worst of\n    which may allow execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00070.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00070.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6454.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6454.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-6454","reference_id":"","reference_type":"","scores":[{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29629","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29573","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29079","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.2914","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29154","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29078","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29098","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29695","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29746","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29565","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29628","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29665","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29668","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29623","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29592","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29566","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29521","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29405","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29291","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29225","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29565","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-6454"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6454","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6454"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/systemd/systemd/commits/master/src/libsystemd/sd-bus/bus-objects.c","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/systemd/systemd/commits/master/src/libsystemd/sd-bus/bus-objects.c"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10278","reference_id":"","reference_type":"","scores":[],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10278"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/02/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/02/msg00031.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N67IOBOTDOMVNQJ5QRU2MXLEECXPGNVJ/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N67IOBOTDOMVNQJ5QRU2MXLEECXPGNVJ/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190327-0004/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20190327-0004/"},{"reference_url":"https://www.debian.org/security/2019/dsa-4393","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2019/dsa-4393"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/02/18/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2019/02/18/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/02/19/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2019/02/19/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2021/07/20/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2021/07/20/2"},{"reference_url":"http://www.securityfocus.com/bid/107081","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/107081"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1667032","reference_id":"1667032","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1667032"},{"reference_url":"https://security.archlinux.org/ASA-201902-24","reference_id":"ASA-201902-24","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201902-24"},{"reference_url":"https://security.archlinux.org/AVG-906","reference_id":"AVG-906","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-906"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:239:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:systemd_project:systemd:239:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:239:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-6454","reference_id":"CVE-2019-6454","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:C"},{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-6454"},{"reference_url":"https://security.gentoo.org/glsa/201903-07","reference_id":"GLSA-201903-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201903-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0368","reference_id":"RHSA-2019:0368","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0368"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0457","reference_id":"RHSA-2019:0457","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0457"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0461","reference_id":"RHSA-2019:0461","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0461"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0990","reference_id":"RHSA-2019:0990","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0990"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1322","reference_id":"RHSA-2019:1322","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1322"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1502","reference_id":"RHSA-2019:1502","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2805","reference_id":"RHSA-2019:2805","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2805"},{"reference_url":"https://usn.ubuntu.com/3891-1/","reference_id":"USN-3891-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3891-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037157?format=json","purl":"pkg:deb/debian/systemd@232-25%2Bdeb9u12","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1mej-gstk-pfbs"},{"vulnerability":"VCID-2nq3-t67f-57ha"},{"vulnerability":"VCID-4dq5-84vh-u3bz"},{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-5j51-kyj4-gkag"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-71xj-3x1z-6kh4"},{"vulnerability":"VCID-7mtw-85gb-vyfz"},{"vulnerability":"VCID-7p2k-q6vr-3kf5"},{"vulnerability":"VCID-7war-ne2h-wkej"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-8sva-z329-ekcr"},{"vulnerability":"VCID-8x92-ah94-47f7"},{"vulnerability":"VCID-94hk-2ehw-bqds"},{"vulnerability":"VCID-cmbj-869t-c3e3"},{"vulnerability":"VCID-dvhg-mcz2-r3f5"},{"vulnerability":"VCID-e7km-pysq-hqe2"},{"vulnerability":"VCID-e9ng-ewvh-kqeq"},{"vulnerability":"VCID-fdkt-299k-vufa"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-mgcn-uevn-13c3"},{"vulnerability":"VCID-nuf5-cg89-8bb7"},{"vulnerability":"VCID-q4kr-rg2c-f7ad"},{"vulnerability":"VCID-sdnj-avfk-7bch"},{"vulnerability":"VCID-sn1e-9p1f-1fen"},{"vulnerability":"VCID-sn9x-3yp1-2ke4"},{"vulnerability":"VCID-t3bf-3486-wqh1"},{"vulnerability":"VCID-tv9q-bzvp-sqb5"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-vrsm-6j4m-cka4"},{"vulnerability":"VCID-w7ys-gs9d-m3f5"},{"vulnerability":"VCID-yk9j-tm66-eyev"},{"vulnerability":"VCID-z5kr-1k65-hyh3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@232-25%252Bdeb9u12"},{"url":"http://public2.vulnerablecode.io/api/packages/1038433?format=json","purl":"pkg:deb/debian/systemd@241-7~deb10u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2nq3-t67f-57ha"},{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-71xj-3x1z-6kh4"},{"vulnerability":"VCID-7mtw-85gb-vyfz"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-8sva-z329-ekcr"},{"vulnerability":"VCID-94hk-2ehw-bqds"},{"vulnerability":"VCID-dvhg-mcz2-r3f5"},{"vulnerability":"VCID-e9ng-ewvh-kqeq"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-sdnj-avfk-7bch"},{"vulnerability":"VCID-sn1e-9p1f-1fen"},{"vulnerability":"VCID-tv9q-bzvp-sqb5"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-w7ys-gs9d-m3f5"},{"vulnerability":"VCID-yk9j-tm66-eyev"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@241-7~deb10u8"}],"aliases":["CVE-2019-6454"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vrsm-6j4m-cka4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80196?format=json","vulnerability_id":"VCID-y58f-kwx7-m3ec","summary":"regression update","references":[],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037157?format=json","purl":"pkg:deb/debian/systemd@232-25%2Bdeb9u12","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1mej-gstk-pfbs"},{"vulnerability":"VCID-2nq3-t67f-57ha"},{"vulnerability":"VCID-4dq5-84vh-u3bz"},{"vulnerability":"VCID-4eyp-2xve-qugd"},{"vulnerability":"VCID-4n47-ffax-sbdu"},{"vulnerability":"VCID-552s-n3yf-fkgq"},{"vulnerability":"VCID-5j51-kyj4-gkag"},{"vulnerability":"VCID-66sa-bc5p-jqde"},{"vulnerability":"VCID-71xj-3x1z-6kh4"},{"vulnerability":"VCID-7mtw-85gb-vyfz"},{"vulnerability":"VCID-7p2k-q6vr-3kf5"},{"vulnerability":"VCID-7war-ne2h-wkej"},{"vulnerability":"VCID-86qy-wkqz-5qam"},{"vulnerability":"VCID-8sva-z329-ekcr"},{"vulnerability":"VCID-8x92-ah94-47f7"},{"vulnerability":"VCID-94hk-2ehw-bqds"},{"vulnerability":"VCID-cmbj-869t-c3e3"},{"vulnerability":"VCID-dvhg-mcz2-r3f5"},{"vulnerability":"VCID-e7km-pysq-hqe2"},{"vulnerability":"VCID-e9ng-ewvh-kqeq"},{"vulnerability":"VCID-fdkt-299k-vufa"},{"vulnerability":"VCID-fp54-ff23-vbb5"},{"vulnerability":"VCID-hwg6-vaus-cfa2"},{"vulnerability":"VCID-mgcn-uevn-13c3"},{"vulnerability":"VCID-nuf5-cg89-8bb7"},{"vulnerability":"VCID-q4kr-rg2c-f7ad"},{"vulnerability":"VCID-sdnj-avfk-7bch"},{"vulnerability":"VCID-sn1e-9p1f-1fen"},{"vulnerability":"VCID-sn9x-3yp1-2ke4"},{"vulnerability":"VCID-t3bf-3486-wqh1"},{"vulnerability":"VCID-tv9q-bzvp-sqb5"},{"vulnerability":"VCID-vprj-j7u6-zbe7"},{"vulnerability":"VCID-vrsm-6j4m-cka4"},{"vulnerability":"VCID-w7ys-gs9d-m3f5"},{"vulnerability":"VCID-yk9j-tm66-eyev"},{"vulnerability":"VCID-z5kr-1k65-hyh3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@232-25%252Bdeb9u12"}],"aliases":["DSA-4367-2 systemd"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y58f-kwx7-m3ec"}],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@232-25%252Bdeb9u12"}