{"url":"http://public2.vulnerablecode.io/api/packages/103790?format=json","purl":"pkg:rpm/redhat/kernel@3.10.0-693.81.1?arch=el7","type":"rpm","namespace":"redhat","name":"kernel","version":"3.10.0-693.81.1","qualifiers":{"arch":"el7"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81762?format=json","vulnerability_id":"VCID-2ed6-g4ep-yfh1","summary":"kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19447.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19447.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19447","reference_id":"","reference_type":"","scores":[{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.82153","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.82166","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.82187","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.82183","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.82209","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.82217","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.82236","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.82228","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.82223","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.82259","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.8226","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.82282","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.82293","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01689","scoring_system":"epss","scoring_elements":"0.82298","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19447"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19447","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19447"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1781679","reference_id":"1781679","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1781679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2104","reference_id":"RHSA-2020:2104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4060","reference_id":"RHSA-2020:4060","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4060"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4062","reference_id":"RHSA-2020:4062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4062"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4431","reference_id":"RHSA-2020:4431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4609","reference_id":"RHSA-2020:4609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5206","reference_id":"RHSA-2020:5206","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5206"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5430","reference_id":"RHSA-2020:5430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5656","reference_id":"RHSA-2020:5656","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5656"}],"fixed_packages":[],"aliases":["CVE-2019-19447"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2ed6-g4ep-yfh1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82248?format=json","vulnerability_id":"VCID-5zsw-fkhr-3ffj","summary":"kernel: out of bounds write in function i2c_smbus_xfer_emulated in drivers/i2c/i2c-core-smbus.c","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18551.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18551.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-18551","reference_id":"","reference_type":"","scores":[{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32749","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32385","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32734","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32583","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32467","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.3288","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32915","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32737","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32784","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32811","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32812","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32775","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32748","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32789","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32765","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-18551"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.15","reference_id":"","reference_type":"","scores":[],"url":"https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.15"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18551","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18551"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89c6efa61f5709327ecfa24bff18e57a4e80c7fa","reference_id":"","reference_type":"","scores":[],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89c6efa61f5709327ecfa24bff18e57a4e80c7fa"},{"reference_url":"https://support.f5.com/csp/article/K48073202?utm_source=f5support&amp%3Butm_medium=RSS","reference_id":"","reference_type":"","scores":[],"url":"https://support.f5.com/csp/article/K48073202?utm_source=f5support&amp%3Butm_medium=RSS"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1757368","reference_id":"1757368","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1757368"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-18551","reference_id":"CVE-2017-18551","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"},{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-18551"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2104","reference_id":"RHSA-2020:2104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4060","reference_id":"RHSA-2020:4060","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4060"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4062","reference_id":"RHSA-2020:4062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4062"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5206","reference_id":"RHSA-2020:5206","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5206"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5430","reference_id":"RHSA-2020:5430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5656","reference_id":"RHSA-2020:5656","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5656"}],"fixed_packages":[],"aliases":["CVE-2017-18551"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5zsw-fkhr-3ffj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81466?format=json","vulnerability_id":"VCID-cmq5-eh24-zygx","summary":"kernel: out-of-bounds write via crafted keycode table","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20636.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20636.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-20636","reference_id":"","reference_type":"","scores":[{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29713","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29759","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29806","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29624","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29686","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29723","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29726","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29682","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29631","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29649","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29626","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29582","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29502","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29388","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29324","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-20636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20636","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20636"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1824059","reference_id":"1824059","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1824059"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2854","reference_id":"RHSA-2020:2854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4060","reference_id":"RHSA-2020:4060","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4060"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4062","reference_id":"RHSA-2020:4062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4062"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4431","reference_id":"RHSA-2020:4431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4609","reference_id":"RHSA-2020:4609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5430","reference_id":"RHSA-2020:5430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5656","reference_id":"RHSA-2020:5656","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5656"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0019","reference_id":"RHSA-2021:0019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0019"}],"fixed_packages":[],"aliases":["CVE-2019-20636"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cmq5-eh24-zygx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82141?format=json","vulnerability_id":"VCID-feqr-yruq-pfhh","summary":"kernel: out of bounds write in i2c driver leads to local escalation of privilege","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9454.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9454.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9454","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05644","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05935","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0589","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05926","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05678","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05719","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05712","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05752","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05778","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05756","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05748","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05743","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05698","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05708","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05859","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9454"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9454","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9454"},{"reference_url":"https://source.android.com/security/bulletin/pixel/2019-09-01","reference_id":"","reference_type":"","scores":[],"url":"https://source.android.com/security/bulletin/pixel/2019-09-01"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1818818","reference_id":"1818818","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1818818"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9454","reference_id":"CVE-2019-9454","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"},{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9454"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2104","reference_id":"RHSA-2020:2104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4060","reference_id":"RHSA-2020:4060","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4060"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4062","reference_id":"RHSA-2020:4062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4062"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5206","reference_id":"RHSA-2020:5206","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5206"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5430","reference_id":"RHSA-2020:5430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5656","reference_id":"RHSA-2020:5656","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5656"}],"fixed_packages":[],"aliases":["CVE-2019-9454"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-feqr-yruq-pfhh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79298?format=json","vulnerability_id":"VCID-wjxm-be93-pbeg","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12770.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12770.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12770","reference_id":"","reference_type":"","scores":[{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12932","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.13023","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.13074","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12875","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12953","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.13004","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12965","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12929","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12885","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12787","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1279","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1289","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12913","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12878","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12772","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12770"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3016","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12768","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12768"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1834845","reference_id":"1834845","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1834845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4060","reference_id":"RHSA-2020:4060","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4060"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4062","reference_id":"RHSA-2020:4062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4062"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4431","reference_id":"RHSA-2020:4431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4609","reference_id":"RHSA-2020:4609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5206","reference_id":"RHSA-2020:5206","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5206"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5430","reference_id":"RHSA-2020:5430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5656","reference_id":"RHSA-2020:5656","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5656"},{"reference_url":"https://usn.ubuntu.com/4411-1/","reference_id":"USN-4411-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4411-1/"},{"reference_url":"https://usn.ubuntu.com/4412-1/","reference_id":"USN-4412-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4412-1/"},{"reference_url":"https://usn.ubuntu.com/4413-1/","reference_id":"USN-4413-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4413-1/"},{"reference_url":"https://usn.ubuntu.com/4414-1/","reference_id":"USN-4414-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4414-1/"},{"reference_url":"https://usn.ubuntu.com/4419-1/","reference_id":"USN-4419-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4419-1/"}],"fixed_packages":[],"aliases":["CVE-2020-12770"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wjxm-be93-pbeg"}],"fixing_vulnerabilities":[],"risk_score":"3.5","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@3.10.0-693.81.1%3Farch=el7"}