{"url":"http://public2.vulnerablecode.io/api/packages/478571?format=json","purl":"pkg:apk/alpine/php7@7.2.16-r0?arch=ppc64le&distroversion=v3.13&reponame=community","type":"apk","namespace":"alpine","name":"php7","version":"7.2.16-r0","qualifiers":{"arch":"ppc64le","distroversion":"v3.13","reponame":"community"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"7.2.17-r0","latest_non_vulnerable_version":"7.4.26-r0","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79686?format=json","vulnerability_id":"VCID-1ap1-zugk-gbas","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9639.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9639.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9639","reference_id":"","reference_type":"","scores":[{"value":"0.14536","scoring_system":"epss","scoring_elements":"0.9442","published_at":"2026-04-01T12:55:00Z"},{"value":"0.14536","scoring_system":"epss","scoring_elements":"0.94479","published_at":"2026-04-29T12:55:00Z"},{"value":"0.14536","scoring_system":"epss","scoring_elements":"0.94472","published_at":"2026-04-16T12:55:00Z"},{"value":"0.14536","scoring_system":"epss","scoring_elements":"0.94476","published_at":"2026-04-18T12:55:00Z"},{"value":"0.14536","scoring_system":"epss","scoring_elements":"0.9448","published_at":"2026-04-24T12:55:00Z"},{"value":"0.14536","scoring_system":"epss","scoring_elements":"0.94427","published_at":"2026-04-02T12:55:00Z"},{"value":"0.14536","scoring_system":"epss","scoring_elements":"0.94438","published_at":"2026-04-04T12:55:00Z"},{"value":"0.14536","scoring_system":"epss","scoring_elements":"0.9444","published_at":"2026-04-07T12:55:00Z"},{"value":"0.14536","scoring_system":"epss","scoring_elements":"0.9445","published_at":"2026-04-08T12:55:00Z"},{"value":"0.14536","scoring_system":"epss","scoring_elements":"0.94453","published_at":"2026-04-09T12:55:00Z"},{"value":"0.14536","scoring_system":"epss","scoring_elements":"0.94456","published_at":"2026-04-11T12:55:00Z"},{"value":"0.14536","scoring_system":"epss","scoring_elements":"0.94458","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9639"},{"reference_url":"https://bugs.php.net/bug.php?id=77659","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.php.net/bug.php?id=77659"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9637"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9638","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9638"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9639","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9639"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9675"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190502-0007/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20190502-0007/"},{"reference_url":"https://www.debian.org/security/2019/dsa-4403","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2019/dsa-4403"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1688934","reference_id":"1688934","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1688934"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9639","reference_id":"CVE-2019-9639","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9639"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2519","reference_id":"RHSA-2019:2519","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2519"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3299","reference_id":"RHSA-2019:3299","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3299"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1624","reference_id":"RHSA-2020:1624","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1624"},{"reference_url":"https://usn.ubuntu.com/3922-1/","reference_id":"USN-3922-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3922-1/"},{"reference_url":"https://usn.ubuntu.com/3922-2/","reference_id":"USN-3922-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3922-2/"},{"reference_url":"https://usn.ubuntu.com/3922-3/","reference_id":"USN-3922-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3922-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/478571?format=json","purl":"pkg:apk/alpine/php7@7.2.16-r0?arch=ppc64le&distroversion=v3.13&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.16-r0%3Farch=ppc64le&distroversion=v3.13&reponame=community"}],"aliases":["CVE-2019-9639"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1ap1-zugk-gbas"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79684?format=json","vulnerability_id":"VCID-2frx-71st-5qar","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9638.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9638.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9638","reference_id":"","reference_type":"","scores":[{"value":"0.15914","scoring_system":"epss","scoring_elements":"0.94722","published_at":"2026-04-01T12:55:00Z"},{"value":"0.15914","scoring_system":"epss","scoring_elements":"0.94775","published_at":"2026-04-29T12:55:00Z"},{"value":"0.15914","scoring_system":"epss","scoring_elements":"0.94769","published_at":"2026-04-18T12:55:00Z"},{"value":"0.15914","scoring_system":"epss","scoring_elements":"0.94773","published_at":"2026-04-24T12:55:00Z"},{"value":"0.15914","scoring_system":"epss","scoring_elements":"0.94774","published_at":"2026-04-26T12:55:00Z"},{"value":"0.15914","scoring_system":"epss","scoring_elements":"0.94731","published_at":"2026-04-02T12:55:00Z"},{"value":"0.15914","scoring_system":"epss","scoring_elements":"0.94735","published_at":"2026-04-04T12:55:00Z"},{"value":"0.15914","scoring_system":"epss","scoring_elements":"0.94736","published_at":"2026-04-07T12:55:00Z"},{"value":"0.15914","scoring_system":"epss","scoring_elements":"0.94745","published_at":"2026-04-08T12:55:00Z"},{"value":"0.15914","scoring_system":"epss","scoring_elements":"0.9475","published_at":"2026-04-09T12:55:00Z"},{"value":"0.15914","scoring_system":"epss","scoring_elements":"0.94754","published_at":"2026-04-11T12:55:00Z"},{"value":"0.15914","scoring_system":"epss","scoring_elements":"0.94758","published_at":"2026-04-13T12:55:00Z"},{"value":"0.15914","scoring_system":"epss","scoring_elements":"0.94767","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9638"},{"reference_url":"https://bugs.php.net/bug.php?id=77563","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.php.net/bug.php?id=77563"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9637"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9638","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9638"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9639","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9639"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9675"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190502-0007/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20190502-0007/"},{"reference_url":"https://www.debian.org/security/2019/dsa-4403","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2019/dsa-4403"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1688922","reference_id":"1688922","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1688922"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9638","reference_id":"CVE-2019-9638","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9638"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2519","reference_id":"RHSA-2019:2519","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2519"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3299","reference_id":"RHSA-2019:3299","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3299"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1624","reference_id":"RHSA-2020:1624","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1624"},{"reference_url":"https://usn.ubuntu.com/3922-1/","reference_id":"USN-3922-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3922-1/"},{"reference_url":"https://usn.ubuntu.com/3922-2/","reference_id":"USN-3922-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3922-2/"},{"reference_url":"https://usn.ubuntu.com/3922-3/","reference_id":"USN-3922-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3922-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/478571?format=json","purl":"pkg:apk/alpine/php7@7.2.16-r0?arch=ppc64le&distroversion=v3.13&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.16-r0%3Farch=ppc64le&distroversion=v3.13&reponame=community"}],"aliases":["CVE-2019-9638"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2frx-71st-5qar"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79688?format=json","vulnerability_id":"VCID-psz8-fjxf-xuge","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9641.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9641.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9641","reference_id":"","reference_type":"","scores":[{"value":"0.52083","scoring_system":"epss","scoring_elements":"0.97893","published_at":"2026-04-01T12:55:00Z"},{"value":"0.52083","scoring_system":"epss","scoring_elements":"0.97929","published_at":"2026-04-29T12:55:00Z"},{"value":"0.52083","scoring_system":"epss","scoring_elements":"0.97924","published_at":"2026-04-26T12:55:00Z"},{"value":"0.52083","scoring_system":"epss","scoring_elements":"0.97925","published_at":"2026-04-18T12:55:00Z"},{"value":"0.52083","scoring_system":"epss","scoring_elements":"0.97922","published_at":"2026-04-24T12:55:00Z"},{"value":"0.52083","scoring_system":"epss","scoring_elements":"0.97899","published_at":"2026-04-02T12:55:00Z"},{"value":"0.52083","scoring_system":"epss","scoring_elements":"0.97901","published_at":"2026-04-04T12:55:00Z"},{"value":"0.52083","scoring_system":"epss","scoring_elements":"0.97904","published_at":"2026-04-07T12:55:00Z"},{"value":"0.52083","scoring_system":"epss","scoring_elements":"0.97908","published_at":"2026-04-08T12:55:00Z"},{"value":"0.52083","scoring_system":"epss","scoring_elements":"0.97911","published_at":"2026-04-09T12:55:00Z"},{"value":"0.52083","scoring_system":"epss","scoring_elements":"0.97914","published_at":"2026-04-11T12:55:00Z"},{"value":"0.52083","scoring_system":"epss","scoring_elements":"0.97915","published_at":"2026-04-12T12:55:00Z"},{"value":"0.52083","scoring_system":"epss","scoring_elements":"0.97917","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9641"},{"reference_url":"https://bugs.php.net/bug.php?id=77509","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.php.net/bug.php?id=77509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9637"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9638","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9638"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9639","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9639"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9675"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190502-0007/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20190502-0007/"},{"reference_url":"https://www.debian.org/security/2019/dsa-4403","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2019/dsa-4403"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1688943","reference_id":"1688943","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1688943"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9641","reference_id":"CVE-2019-9641","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9641"},{"reference_url":"https://usn.ubuntu.com/3922-1/","reference_id":"USN-3922-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3922-1/"},{"reference_url":"https://usn.ubuntu.com/3922-2/","reference_id":"USN-3922-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3922-2/"},{"reference_url":"https://usn.ubuntu.com/3922-3/","reference_id":"USN-3922-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3922-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/478571?format=json","purl":"pkg:apk/alpine/php7@7.2.16-r0?arch=ppc64le&distroversion=v3.13&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.16-r0%3Farch=ppc64le&distroversion=v3.13&reponame=community"}],"aliases":["CVE-2019-9641"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-psz8-fjxf-xuge"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79683?format=json","vulnerability_id":"VCID-rjc8-9tfv-sfdk","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9637.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9637.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9637","reference_id":"","reference_type":"","scores":[{"value":"0.0987","scoring_system":"epss","scoring_elements":"0.92962","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0987","scoring_system":"epss","scoring_elements":"0.93012","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0987","scoring_system":"epss","scoring_elements":"0.93011","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0987","scoring_system":"epss","scoring_elements":"0.93017","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0987","scoring_system":"epss","scoring_elements":"0.93016","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0987","scoring_system":"epss","scoring_elements":"0.92971","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0987","scoring_system":"epss","scoring_elements":"0.92975","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0987","scoring_system":"epss","scoring_elements":"0.92974","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0987","scoring_system":"epss","scoring_elements":"0.92982","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0987","scoring_system":"epss","scoring_elements":"0.92987","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0987","scoring_system":"epss","scoring_elements":"0.92992","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0987","scoring_system":"epss","scoring_elements":"0.9299","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0987","scoring_system":"epss","scoring_elements":"0.92991","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0987","scoring_system":"epss","scoring_elements":"0.93001","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0987","scoring_system":"epss","scoring_elements":"0.93004","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9637"},{"reference_url":"https://bugs.php.net/bug.php?id=77630","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.php.net/bug.php?id=77630"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9637"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9638","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9638"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9639","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9639"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9675"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190502-0007/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20190502-0007/"},{"reference_url":"https://support.f5.com/csp/article/K53825211","reference_id":"","reference_type":"","scores":[],"url":"https://support.f5.com/csp/article/K53825211"},{"reference_url":"https://www.debian.org/security/2019/dsa-4403","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2019/dsa-4403"},{"reference_url":"https://www.tenable.com/security/tns-2019-07","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2019-07"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1688897","reference_id":"1688897","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1688897"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9637","reference_id":"CVE-2019-9637","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9637"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2519","reference_id":"RHSA-2019:2519","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2519"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3299","reference_id":"RHSA-2019:3299","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3299"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1624","reference_id":"RHSA-2020:1624","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1624"},{"reference_url":"https://usn.ubuntu.com/3922-1/","reference_id":"USN-3922-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3922-1/"},{"reference_url":"https://usn.ubuntu.com/3922-2/","reference_id":"USN-3922-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3922-2/"},{"reference_url":"https://usn.ubuntu.com/3922-3/","reference_id":"USN-3922-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3922-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/478571?format=json","purl":"pkg:apk/alpine/php7@7.2.16-r0?arch=ppc64le&distroversion=v3.13&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.16-r0%3Farch=ppc64le&distroversion=v3.13&reponame=community"}],"aliases":["CVE-2019-9637"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rjc8-9tfv-sfdk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79687?format=json","vulnerability_id":"VCID-vh94-jp2p-zygp","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9640.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9640.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9640","reference_id":"","reference_type":"","scores":[{"value":"0.16236","scoring_system":"epss","scoring_elements":"0.94783","published_at":"2026-04-01T12:55:00Z"},{"value":"0.16236","scoring_system":"epss","scoring_elements":"0.94836","published_at":"2026-04-29T12:55:00Z"},{"value":"0.16236","scoring_system":"epss","scoring_elements":"0.94832","published_at":"2026-04-21T12:55:00Z"},{"value":"0.16236","scoring_system":"epss","scoring_elements":"0.94834","published_at":"2026-04-24T12:55:00Z"},{"value":"0.16236","scoring_system":"epss","scoring_elements":"0.94835","published_at":"2026-04-26T12:55:00Z"},{"value":"0.16236","scoring_system":"epss","scoring_elements":"0.94793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.16236","scoring_system":"epss","scoring_elements":"0.94796","published_at":"2026-04-04T12:55:00Z"},{"value":"0.16236","scoring_system":"epss","scoring_elements":"0.94797","published_at":"2026-04-07T12:55:00Z"},{"value":"0.16236","scoring_system":"epss","scoring_elements":"0.94807","published_at":"2026-04-08T12:55:00Z"},{"value":"0.16236","scoring_system":"epss","scoring_elements":"0.94811","published_at":"2026-04-09T12:55:00Z"},{"value":"0.16236","scoring_system":"epss","scoring_elements":"0.94815","published_at":"2026-04-11T12:55:00Z"},{"value":"0.16236","scoring_system":"epss","scoring_elements":"0.94818","published_at":"2026-04-12T12:55:00Z"},{"value":"0.16236","scoring_system":"epss","scoring_elements":"0.94819","published_at":"2026-04-13T12:55:00Z"},{"value":"0.16236","scoring_system":"epss","scoring_elements":"0.94826","published_at":"2026-04-16T12:55:00Z"},{"value":"0.16236","scoring_system":"epss","scoring_elements":"0.94829","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9640"},{"reference_url":"https://bugs.php.net/bug.php?id=77540","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.php.net/bug.php?id=77540"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9637"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9638","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9638"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9639","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9639"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9675"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190502-0007/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20190502-0007/"},{"reference_url":"https://www.debian.org/security/2019/dsa-4403","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2019/dsa-4403"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1688939","reference_id":"1688939","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1688939"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9640","reference_id":"CVE-2019-9640","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9640"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2519","reference_id":"RHSA-2019:2519","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2519"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3299","reference_id":"RHSA-2019:3299","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3299"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1624","reference_id":"RHSA-2020:1624","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1624"},{"reference_url":"https://usn.ubuntu.com/3922-1/","reference_id":"USN-3922-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3922-1/"},{"reference_url":"https://usn.ubuntu.com/3922-2/","reference_id":"USN-3922-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3922-2/"},{"reference_url":"https://usn.ubuntu.com/3922-3/","reference_id":"USN-3922-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3922-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/478571?format=json","purl":"pkg:apk/alpine/php7@7.2.16-r0?arch=ppc64le&distroversion=v3.13&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.16-r0%3Farch=ppc64le&distroversion=v3.13&reponame=community"}],"aliases":["CVE-2019-9640"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vh94-jp2p-zygp"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.16-r0%3Farch=ppc64le&distroversion=v3.13&reponame=community"}