{"url":"http://public2.vulnerablecode.io/api/packages/106145?format=json","purl":"pkg:rpm/redhat/kernel@3.10.0-862.46.1?arch=el7","type":"rpm","namespace":"redhat","name":"kernel","version":"3.10.0-862.46.1","qualifiers":{"arch":"el7"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82558?format=json","vulnerability_id":"VCID-du8n-633p-7fba","summary":"kernel: use-after-free in drivers/char/ipmi/ipmi_si_intf.c, ipmi_si_mem_io.c, ipmi_si_port_io.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11811.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11811.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11811","reference_id":"","reference_type":"","scores":[{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20764","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20824","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20821","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20788","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20691","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20924","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21005","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21065","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21081","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21038","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20986","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20975","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20954","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21406","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.2146","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.2125","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11811","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11811"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1709180","reference_id":"1709180","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1709180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1873","reference_id":"RHSA-2019:1873","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1873"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1891","reference_id":"RHSA-2019:1891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1891"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1959","reference_id":"RHSA-2019:1959","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1959"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1971","reference_id":"RHSA-2019:1971","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1971"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4057","reference_id":"RHSA-2019:4057","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4057"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4058","reference_id":"RHSA-2019:4058","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4058"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0036","reference_id":"RHSA-2020:0036","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0036"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2854","reference_id":"RHSA-2020:2854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2854"}],"fixed_packages":[],"aliases":["CVE-2019-11811"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-du8n-633p-7fba"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84589?format=json","vulnerability_id":"VCID-e6h3-w8qc-xufh","summary":"kernel: Handling of might_cancel queueing is not properly pretected against race","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10661.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10661.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-10661","reference_id":"","reference_type":"","scores":[{"value":"0.25699","scoring_system":"epss","scoring_elements":"0.96279","published_at":"2026-05-07T12:55:00Z"},{"value":"0.25699","scoring_system":"epss","scoring_elements":"0.96257","published_at":"2026-04-21T12:55:00Z"},{"value":"0.25699","scoring_system":"epss","scoring_elements":"0.96258","published_at":"2026-04-24T12:55:00Z"},{"value":"0.25699","scoring_system":"epss","scoring_elements":"0.9626","published_at":"2026-04-26T12:55:00Z"},{"value":"0.25699","scoring_system":"epss","scoring_elements":"0.96262","published_at":"2026-04-29T12:55:00Z"},{"value":"0.25699","scoring_system":"epss","scoring_elements":"0.96272","published_at":"2026-05-05T12:55:00Z"},{"value":"0.30004","scoring_system":"epss","scoring_elements":"0.96637","published_at":"2026-04-07T12:55:00Z"},{"value":"0.30004","scoring_system":"epss","scoring_elements":"0.96647","published_at":"2026-04-09T12:55:00Z"},{"value":"0.30004","scoring_system":"epss","scoring_elements":"0.96649","published_at":"2026-04-11T12:55:00Z"},{"value":"0.30004","scoring_system":"epss","scoring_elements":"0.9665","published_at":"2026-04-12T12:55:00Z"},{"value":"0.30004","scoring_system":"epss","scoring_elements":"0.96652","published_at":"2026-04-13T12:55:00Z"},{"value":"0.30004","scoring_system":"epss","scoring_elements":"0.96659","published_at":"2026-04-16T12:55:00Z"},{"value":"0.30004","scoring_system":"epss","scoring_elements":"0.96663","published_at":"2026-04-18T12:55:00Z"},{"value":"0.30004","scoring_system":"epss","scoring_elements":"0.9662","published_at":"2026-04-01T12:55:00Z"},{"value":"0.30004","scoring_system":"epss","scoring_elements":"0.96634","published_at":"2026-04-04T12:55:00Z"},{"value":"0.30004","scoring_system":"epss","scoring_elements":"0.96645","published_at":"2026-04-08T12:55:00Z"},{"value":"0.30004","scoring_system":"epss","scoring_elements":"0.96629","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-10661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10661"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:C/A:C"},{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1481136","reference_id":"1481136","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1481136"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/43345.c","reference_id":"CVE-2017-10661","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/43345.c"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3083","reference_id":"RHSA-2018:3083","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3083"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3096","reference_id":"RHSA-2018:3096","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3096"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4057","reference_id":"RHSA-2019:4057","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4057"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4058","reference_id":"RHSA-2019:4058","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4058"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0036","reference_id":"RHSA-2020:0036","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0036"},{"reference_url":"https://usn.ubuntu.com/3470-1/","reference_id":"USN-3470-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3470-1/"},{"reference_url":"https://usn.ubuntu.com/3470-2/","reference_id":"USN-3470-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3470-2/"}],"fixed_packages":[],"aliases":["CVE-2017-10661"],"risk_score":9.6,"exploitability":"2.0","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e6h3-w8qc-xufh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63436?format=json","vulnerability_id":"VCID-es33-k15y-7qa6","summary":"security update","references":[{"reference_url":"http://lists.alioth.debian.org/pipermail/secure-testing-commits/2017-December/059967.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.alioth.debian.org/pipermail/secure-testing-commits/2017-December/059967.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-0861.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-0861.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-0861","reference_id":"","reference_type":"","scores":[{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24655","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24399","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24489","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24448","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24321","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24731","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.2477","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24543","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24614","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24661","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24677","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24636","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.2458","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24592","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24583","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24559","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24503","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-0861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=362bca57f5d78220f8b5907b875961af9436e229","reference_id":"","reference_type":"","scores":[],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=362bca57f5d78220f8b5907b875961af9436e229"},{"reference_url":"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0","reference_id":"","reference_type":"","scores":[],"url":"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html"},{"reference_url":"https://security-tracker.debian.org/tracker/CVE-2017-0861","reference_id":"","reference_type":"","scores":[],"url":"https://security-tracker.debian.org/tracker/CVE-2017-0861"},{"reference_url":"https://source.android.com/security/bulletin/pixel/2017-11-01","reference_id":"","reference_type":"","scores":[],"url":"https://source.android.com/security/bulletin/pixel/2017-11-01"},{"reference_url":"https://www.debian.org/security/2018/dsa-4187","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4187"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"reference_url":"http://www.securityfocus.com/bid/102329","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/102329"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1563994","reference_id":"1563994","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1563994"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-0861","reference_id":"CVE-2017-0861","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-0861"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2390","reference_id":"RHSA-2018:2390","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2390"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3083","reference_id":"RHSA-2018:3083","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3083"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3096","reference_id":"RHSA-2018:3096","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3096"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0036","reference_id":"RHSA-2020:0036","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0036"},{"reference_url":"https://usn.ubuntu.com/3583-1/","reference_id":"USN-3583-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3583-1/"},{"reference_url":"https://usn.ubuntu.com/3583-2/","reference_id":"USN-3583-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3583-2/"},{"reference_url":"https://usn.ubuntu.com/3617-1/","reference_id":"USN-3617-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3617-1/"},{"reference_url":"https://usn.ubuntu.com/3617-2/","reference_id":"USN-3617-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3617-2/"},{"reference_url":"https://usn.ubuntu.com/3617-3/","reference_id":"USN-3617-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3617-3/"},{"reference_url":"https://usn.ubuntu.com/3619-1/","reference_id":"USN-3619-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3619-1/"},{"reference_url":"https://usn.ubuntu.com/3619-2/","reference_id":"USN-3619-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3619-2/"},{"reference_url":"https://usn.ubuntu.com/3632-1/","reference_id":"USN-3632-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3632-1/"}],"fixed_packages":[],"aliases":["CVE-2017-0861"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-es33-k15y-7qa6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83409?format=json","vulnerability_id":"VCID-nytu-b95a-f7ap","summary":"kernel: kvm: guest userspace to guest kernel write","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10853.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10853.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10853","reference_id":"","reference_type":"","scores":[{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08526","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08553","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08606","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08524","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08597","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08621","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08619","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08596","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08584","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08474","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08461","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.0861","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08622","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08575","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08581","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08519","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08662","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10853"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10853","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10853"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1589890","reference_id":"1589890","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1589890"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2029","reference_id":"RHSA-2019:2029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2043","reference_id":"RHSA-2019:2043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2043"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0036","reference_id":"RHSA-2020:0036","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0036"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0103","reference_id":"RHSA-2020:0103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0179","reference_id":"RHSA-2020:0179","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0179"},{"reference_url":"https://usn.ubuntu.com/3777-1/","reference_id":"USN-3777-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3777-1/"},{"reference_url":"https://usn.ubuntu.com/3777-2/","reference_id":"USN-3777-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3777-2/"}],"fixed_packages":[],"aliases":["CVE-2018-10853"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nytu-b95a-f7ap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82557?format=json","vulnerability_id":"VCID-pqhu-q25g-nuc7","summary":"kernel: a NULL pointer dereference in drivers/scsi/megaraid/megaraid_sas_base.c leading to DoS","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11810.json","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11810.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11810","reference_id":"","reference_type":"","scores":[{"value":"0.0184","scoring_system":"epss","scoring_elements":"0.8289","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0184","scoring_system":"epss","scoring_elements":"0.82906","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0184","scoring_system":"epss","scoring_elements":"0.82919","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0184","scoring_system":"epss","scoring_elements":"0.82915","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0184","scoring_system":"epss","scoring_elements":"0.8294","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0184","scoring_system":"epss","scoring_elements":"0.82947","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0184","scoring_system":"epss","scoring_elements":"0.82963","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0184","scoring_system":"epss","scoring_elements":"0.82958","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0184","scoring_system":"epss","scoring_elements":"0.82954","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0184","scoring_system":"epss","scoring_elements":"0.82992","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0184","scoring_system":"epss","scoring_elements":"0.82996","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0184","scoring_system":"epss","scoring_elements":"0.83018","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0184","scoring_system":"epss","scoring_elements":"0.83026","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0184","scoring_system":"epss","scoring_elements":"0.83032","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0184","scoring_system":"epss","scoring_elements":"0.83054","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0184","scoring_system":"epss","scoring_elements":"0.83075","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11810"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11810","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11810"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1709164","reference_id":"1709164","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1709164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1959","reference_id":"RHSA-2019:1959","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1959"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1971","reference_id":"RHSA-2019:1971","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1971"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2029","reference_id":"RHSA-2019:2029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2043","reference_id":"RHSA-2019:2043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2043"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2736","reference_id":"RHSA-2019:2736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2837","reference_id":"RHSA-2019:2837","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2837"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3217","reference_id":"RHSA-2019:3217","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3217"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0036","reference_id":"RHSA-2020:0036","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0036"},{"reference_url":"https://usn.ubuntu.com/4005-1/","reference_id":"USN-4005-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4005-1/"},{"reference_url":"https://usn.ubuntu.com/4008-1/","reference_id":"USN-4008-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4008-1/"},{"reference_url":"https://usn.ubuntu.com/4008-3/","reference_id":"USN-4008-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4008-3/"},{"reference_url":"https://usn.ubuntu.com/4115-1/","reference_id":"USN-4115-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4115-1/"},{"reference_url":"https://usn.ubuntu.com/4118-1/","reference_id":"USN-4118-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4118-1/"}],"fixed_packages":[],"aliases":["CVE-2019-11810"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pqhu-q25g-nuc7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83049?format=json","vulnerability_id":"VCID-t1jd-qqks-4qam","summary":"kernel: TLB flush happens too late on mremap","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18281.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18281.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-18281","reference_id":"","reference_type":"","scores":[{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.6196","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62031","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62062","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62032","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62082","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62099","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62119","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62109","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62088","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62132","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62137","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62121","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62135","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62128","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62074","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62124","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-18281"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18281","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18281"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1645121","reference_id":"1645121","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1645121"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0831","reference_id":"RHSA-2019:0831","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0831"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2029","reference_id":"RHSA-2019:2029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2043","reference_id":"RHSA-2019:2043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2043"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0036","reference_id":"RHSA-2020:0036","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0036"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0100","reference_id":"RHSA-2020:0100","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0100"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0103","reference_id":"RHSA-2020:0103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0179","reference_id":"RHSA-2020:0179","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0179"},{"reference_url":"https://usn.ubuntu.com/3832-1/","reference_id":"USN-3832-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3832-1/"},{"reference_url":"https://usn.ubuntu.com/3835-1/","reference_id":"USN-3835-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3835-1/"},{"reference_url":"https://usn.ubuntu.com/3871-1/","reference_id":"USN-3871-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3871-1/"},{"reference_url":"https://usn.ubuntu.com/3871-3/","reference_id":"USN-3871-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3871-3/"},{"reference_url":"https://usn.ubuntu.com/3871-4/","reference_id":"USN-3871-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3871-4/"},{"reference_url":"https://usn.ubuntu.com/3871-5/","reference_id":"USN-3871-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3871-5/"},{"reference_url":"https://usn.ubuntu.com/3880-1/","reference_id":"USN-3880-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3880-1/"},{"reference_url":"https://usn.ubuntu.com/3880-2/","reference_id":"USN-3880-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3880-2/"}],"fixed_packages":[],"aliases":["CVE-2018-18281"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t1jd-qqks-4qam"}],"fixing_vulnerabilities":[],"risk_score":"9.6","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@3.10.0-862.46.1%3Farch=el7"}