Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/1037972?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/1037972?format=api", "purl": "pkg:deb/debian/golang-1.11@1.11.6-1%2Bdeb10u4", "type": "deb", "namespace": "debian", "name": "golang-1.11", "version": "1.11.6-1+deb10u4", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36618?format=api", "vulnerability_id": "VCID-7ahs-f1qh-g7an", "summary": "Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3114.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3114.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3114", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11299", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.114", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11439", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11498", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11286", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11368", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11432", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11426", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30561", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.3048", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30547", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30978", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31008", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30991", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30957", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30798", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.3068", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30598", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30456", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30525", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30534", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30458", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3114" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7919", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7919" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3114", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3114" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918750", "reference_id": "1918750", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918750" }, { "reference_url": "https://security.archlinux.org/ASA-202101-27", "reference_id": "ASA-202101-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202101-27" }, { "reference_url": "https://security.archlinux.org/AVG-1481", "reference_id": "AVG-1481", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1481" }, { "reference_url": "https://security.gentoo.org/glsa/202208-02", "reference_id": "GLSA-202208-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0957", "reference_id": "RHSA-2021:0957", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0957" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0958", "reference_id": "RHSA-2021:0958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1006", "reference_id": "RHSA-2021:1006", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1006" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1338", "reference_id": "RHSA-2021:1338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1338" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1339", "reference_id": "RHSA-2021:1339", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1339" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1366", "reference_id": "RHSA-2021:1366", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1366" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1551", "reference_id": "RHSA-2021:1551", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1551" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1746", "reference_id": "RHSA-2021:1746", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1746" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2021", "reference_id": "RHSA-2021:2021", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2021" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2041", "reference_id": "RHSA-2021:2041", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2041" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2093", "reference_id": "RHSA-2021:2093", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2093" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2095", "reference_id": "RHSA-2021:2095", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2095" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2437", "reference_id": "RHSA-2021:2437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2438", "reference_id": "RHSA-2021:2438", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2438" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2532", "reference_id": "RHSA-2021:2532", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2532" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2543", "reference_id": "RHSA-2021:2543", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2543" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2920", "reference_id": "RHSA-2021:2920", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2920" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3119", "reference_id": "RHSA-2021:3119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3119" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3748", "reference_id": "RHSA-2021:3748", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3748" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4103", "reference_id": "RHSA-2021:4103", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4103" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4226", "reference_id": "RHSA-2021:4226", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4226" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0308", "reference_id": "RHSA-2022:0308", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0308" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037972?format=api", "purl": "pkg:deb/debian/golang-1.11@1.11.6-1%2Bdeb10u4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.11@1.11.6-1%252Bdeb10u4" } ], "aliases": [ "CVE-2021-3114" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7ahs-f1qh-g7an" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36458?format=api", "vulnerability_id": "VCID-dwge-3up7-yyaq", "summary": "Withdrawn Advisory: Infinite loop in xz\n### Withdrawn Advisory\nThis advisory has been withdrawn because alerts cannot be issued for the Go standard library at this time.\n\n### Original Description\nGo before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16845.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16845.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-16845", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.34824", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.3507", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.3527", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35298", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35179", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35224", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35249", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35253", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35218", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35194", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35232", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.3517", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.34935", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.34916", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.34826", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.34698", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.34771", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.34808", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.34713", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.34738", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.34806", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-16845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7919", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7919" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3114", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3114" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b" }, { "reference_url": "https://github.com/ulikunitz/xz/issues/35", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/ulikunitz/xz/issues/35" }, { "reference_url": "https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo" }, { "reference_url": "https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20200924-0002", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20200924-0002" }, { "reference_url": "https://www.debian.org/security/2021/dsa-4848", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.debian.org/security/2021/dsa-4848" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuApr2021.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099", "reference_id": "1867099", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3665", "reference_id": "RHSA-2020:3665", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3665" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4201", "reference_id": "RHSA-2020:4201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4201" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4214", "reference_id": "RHSA-2020:4214", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4214" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4297", "reference_id": "RHSA-2020:4297", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4297" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5118", "reference_id": "RHSA-2020:5118", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5118" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5119", "reference_id": "RHSA-2020:5119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5119" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5159", "reference_id": "RHSA-2020:5159", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5159" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5605", "reference_id": "RHSA-2020:5605", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5605" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5606", "reference_id": "RHSA-2020:5606", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5606" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5649", "reference_id": "RHSA-2020:5649", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5649" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0072", "reference_id": "RHSA-2021:0072", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0072" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0172", "reference_id": "RHSA-2021:0172", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0172" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0713", "reference_id": "RHSA-2021:0713", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0713" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0956", "reference_id": "RHSA-2021:0956", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0956" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1016", "reference_id": "RHSA-2021:1016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1016" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1366", "reference_id": "RHSA-2021:1366", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1366" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1515", "reference_id": "RHSA-2021:1515", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2122", "reference_id": "RHSA-2021:2122", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2122" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4103", "reference_id": "RHSA-2021:4103", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4103" }, { "reference_url": "https://usn.ubuntu.com/5725-1/", "reference_id": "USN-5725-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5725-1/" }, { "reference_url": "https://usn.ubuntu.com/5725-2/", "reference_id": "USN-5725-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5725-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037972?format=api", "purl": "pkg:deb/debian/golang-1.11@1.11.6-1%2Bdeb10u4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.11@1.11.6-1%252Bdeb10u4" } ], "aliases": [ "CVE-2020-16845", "GHSA-q6gq-997w-f55g" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dwge-3up7-yyaq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46339?format=api", "vulnerability_id": "VCID-ry9q-vr9h-cbg2", "summary": "Helm uses crypto package vulnerable to panic from malformed X.509 certificate\nThe Helm core maintainers have identified a high severity security vulnerability in Go's `crypto` package affecting all versions prior to Helm 2.16.8 and Helm 3.1.0.\n\nThanks to @ravin9249 for identifying the vulnerability.\n\n### Impact\n\nGo before 1.12.16 and 1.13.x before 1.13.7 (and the `crypto/cryptobyte` package before 0.0.0-20200124225646-8b5121be2f68 for Go) allows attacks on clients resulting in a panic via a malformed X.509 certificate. This may allow a remote attacker to cause a denial of service.\n\n### Patches\n\nA patch to compile Helm against Go 1.14.4 has been provided for Helm 2 and is available in Helm 2.16.8. Helm 3.1.0 and newer are compiled against Go 1.13.7+.\n\n### Workarounds\n\nNo workaround is available. Users are urged to upgrade.\n\n### References\n\n- https://nvd.nist.gov/vuln/detail/CVE-2020-7919\n- https://github.com/helm/helm/pull/8288\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n\n* Open an issue in [the Helm repository](https://github.com/helm/helm/issues)\n* For security-specific issues, email us at <cncf-helm-security@lists.cncf.io>", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7919.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7919.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-7919", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.71072", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.71062", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.71008", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70981", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70803", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70855", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70811", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70836", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70818", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.71015", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70978", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70939", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70957", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70958", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70948", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70894", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70914", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70908", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70862", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70877", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70893", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.7087", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-7919" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7919", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7919" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3114", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3114" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/helm/helm", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/helm/helm" }, { "reference_url": "https://github.com/helm/helm/security/advisories/GHSA-cjjc-xp8v-855w", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/helm/helm/security/advisories/GHSA-cjjc-xp8v-855w" }, { "reference_url": "https://go.dev/cl/216677", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://go.dev/cl/216677" }, { "reference_url": "https://go.dev/cl/216680", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://go.dev/cl/216680" }, { "reference_url": "https://go.dev/issue/36837", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://go.dev/issue/36837" }, { "reference_url": "https://go.googlesource.com/go/+/b13ce14c4a6aa59b7b041ad2b6eed2d23e15b574", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://go.googlesource.com/go/+/b13ce14c4a6aa59b7b041ad2b6eed2d23e15b574" }, { "reference_url": "https://groups.google.com/forum/#%21forum/golang-announce", "reference_id": "", "reference_type": "", "scores": [], "url": "https://groups.google.com/forum/#%21forum/golang-announce" }, { "reference_url": "https://groups.google.com/forum/#%21topic/golang-announce/Hsw4mHYc470", "reference_id": "", "reference_type": "", "scores": [], "url": "https://groups.google.com/forum/#%21topic/golang-announce/Hsw4mHYc470" }, { "reference_url": "https://groups.google.com/forum/#%21topic/golang-announce/-sdUB4VEQkA", "reference_id": "", "reference_type": "", "scores": [], "url": "https://groups.google.com/forum/#%21topic/golang-announce/-sdUB4VEQkA" }, { "reference_url": "https://groups.google.com/forum/#!forum/golang-announce", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://groups.google.com/forum/#!forum/golang-announce" }, { "reference_url": "https://groups.google.com/forum/#!topic/golang-announce/Hsw4mHYc470", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://groups.google.com/forum/#!topic/golang-announce/Hsw4mHYc470" }, { "reference_url": "https://groups.google.com/forum/#!topic/golang-announce/-sdUB4VEQkA", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://groups.google.com/forum/#!topic/golang-announce/-sdUB4VEQkA" }, { "reference_url": "https://groups.google.com/g/golang-announce/c/Hsw4mHYc470", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://groups.google.com/g/golang-announce/c/Hsw4mHYc470" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S43VLYRURELDWX4D5RFOYBNFGO6CGBBC/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S43VLYRURELDWX4D5RFOYBNFGO6CGBBC/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S43VLYRURELDWX4D5RFOYBNFGO6CGBBC", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S43VLYRURELDWX4D5RFOYBNFGO6CGBBC" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7919", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:C" }, { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7919" }, { "reference_url": "https://pkg.go.dev/vuln/GO-2022-0229", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://pkg.go.dev/vuln/GO-2022-0229" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20200327-0001", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20200327-0001" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20200327-0001/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20200327-0001/" }, { "reference_url": "https://www.debian.org/security/2021/dsa-4848", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.debian.org/security/2021/dsa-4848" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuApr2021.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1808041", "reference_id": "1808041", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1808041" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_insights_telegraf:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:cloud_insights_telegraf:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_insights_telegraf:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037972?format=api", "purl": "pkg:deb/debian/golang-1.11@1.11.6-1%2Bdeb10u4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.11@1.11.6-1%252Bdeb10u4" } ], "aliases": [ "CVE-2020-7919", "GHSA-cjjc-xp8v-855w" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ry9q-vr9h-cbg2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81088?format=api", "vulnerability_id": "VCID-w9qm-pwnh-4ydj", "summary": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15586.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15586.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15586", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69813", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69826", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69841", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69817", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69866", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69882", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69904", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69889", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69874", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69916", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69925", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69906", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69958", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69967", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69969", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69945", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.69987", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.70017", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.70014", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.70063", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00614", "scoring_system": "epss", "scoring_elements": "0.70073", "published_at": "2026-05-15T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7919", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7919" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3114", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3114" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953", "reference_id": "1856953", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3665", "reference_id": "RHSA-2020:3665", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3665" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4201", "reference_id": "RHSA-2020:4201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4201" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4214", "reference_id": "RHSA-2020:4214", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4214" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4297", "reference_id": "RHSA-2020:4297", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4297" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5118", "reference_id": "RHSA-2020:5118", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5118" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5119", "reference_id": "RHSA-2020:5119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5119" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5605", "reference_id": "RHSA-2020:5605", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5605" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5606", "reference_id": "RHSA-2020:5606", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5606" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5649", "reference_id": "RHSA-2020:5649", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5649" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0072", "reference_id": "RHSA-2021:0072", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0072" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0172", "reference_id": "RHSA-2021:0172", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0172" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0713", "reference_id": "RHSA-2021:0713", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0713" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0956", "reference_id": "RHSA-2021:0956", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0956" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1016", "reference_id": "RHSA-2021:1016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1016" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1366", "reference_id": "RHSA-2021:1366", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1366" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1515", "reference_id": "RHSA-2021:1515", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2122", "reference_id": "RHSA-2021:2122", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2122" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4103", "reference_id": "RHSA-2021:4103", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4103" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037972?format=api", "purl": "pkg:deb/debian/golang-1.11@1.11.6-1%2Bdeb10u4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.11@1.11.6-1%252Bdeb10u4" } ], "aliases": [ "CVE-2020-15586" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w9qm-pwnh-4ydj" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-1.11@1.11.6-1%252Bdeb10u4" }