{"url":"http://public2.vulnerablecode.io/api/packages/936986?format=json","purl":"pkg:deb/debian/python3.9@3.9.1~rc1-1?distro=bullseye","type":"deb","namespace":"debian","name":"python3.9","version":"3.9.1~rc1-1","qualifiers":{"distro":"bullseye"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"3.9.1-3","latest_non_vulnerable_version":"3.9.2-1+deb11u6","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78162?format=json","vulnerability_id":"VCID-2czu-wy37-qugf","summary":"python: constant-time-defeating optimisations issue in the compare_digest function in Lib/hmac.p","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48566.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48566.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48566","reference_id":"","reference_type":"","scores":[{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25344","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25276","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.2714","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26967","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26931","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26883","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26875","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26811","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27176","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26968","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27036","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27081","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27085","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.2704","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26984","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26992","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48566"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238753","reference_id":"2238753","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238753"},{"reference_url":"https://bugs.python.org/issue40791","reference_id":"issue40791","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T14:08:27Z/"}],"url":"https://bugs.python.org/issue40791"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T14:08:27Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html","reference_id":"msg00022.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T14:08:27Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20231006-0013/","reference_id":"ntap-20231006-0013","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T14:08:27Z/"}],"url":"https://security.netapp.com/advisory/ntap-20231006-0013/"},{"reference_url":"https://usn.ubuntu.com/6400-1/","reference_id":"USN-6400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6400-1/"},{"reference_url":"https://usn.ubuntu.com/6891-1/","reference_id":"USN-6891-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6891-1/"},{"reference_url":"https://usn.ubuntu.com/7180-1/","reference_id":"USN-7180-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7180-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/936986?format=json","purl":"pkg:deb/debian/python3.9@3.9.1~rc1-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/python3.9@3.9.1~rc1-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/936982?format=json","purl":"pkg:deb/debian/python3.9@3.9.2-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/python3.9@3.9.2-1%3Fdistro=bullseye"}],"aliases":["CVE-2022-48566"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2czu-wy37-qugf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78163?format=json","vulnerability_id":"VCID-4q79-666d-rygx","summary":"python: XML External Entity in XML processing plistlib module","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48565.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48565.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48565","reference_id":"","reference_type":"","scores":[{"value":"0.07274","scoring_system":"epss","scoring_elements":"0.91625","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07274","scoring_system":"epss","scoring_elements":"0.917","published_at":"2026-05-07T12:55:00Z"},{"value":"0.07274","scoring_system":"epss","scoring_elements":"0.9166","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07274","scoring_system":"epss","scoring_elements":"0.91681","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07274","scoring_system":"epss","scoring_elements":"0.91673","published_at":"2026-04-18T12:55:00Z"},{"value":"0.07274","scoring_system":"epss","scoring_elements":"0.91674","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07274","scoring_system":"epss","scoring_elements":"0.9168","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07274","scoring_system":"epss","scoring_elements":"0.91678","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07274","scoring_system":"epss","scoring_elements":"0.91676","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07274","scoring_system":"epss","scoring_elements":"0.91688","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07274","scoring_system":"epss","scoring_elements":"0.91631","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07274","scoring_system":"epss","scoring_elements":"0.91639","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07274","scoring_system":"epss","scoring_elements":"0.91651","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07274","scoring_system":"epss","scoring_elements":"0.91657","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07274","scoring_system":"epss","scoring_elements":"0.91661","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07274","scoring_system":"epss","scoring_elements":"0.91663","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48565"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2240059","reference_id":"2240059","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2240059"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AFHYAGWBFBNUGWU6XWKBHTCV5NH77MB7/","reference_id":"AFHYAGWBFBNUGWU6XWKBHTCV5NH77MB7","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2024-10-03T17:41:12Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AFHYAGWBFBNUGWU6XWKBHTCV5NH77MB7/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BAYWJD576JUKLHCWKDLMJSUGTRDKPF3M/","reference_id":"BAYWJD576JUKLHCWKDLMJSUGTRDKPF3M","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2024-10-03T17:41:12Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BAYWJD576JUKLHCWKDLMJSUGTRDKPF3M/"},{"reference_url":"https://bugs.python.org/issue42051","reference_id":"issue42051","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2024-10-03T17:41:12Z/"}],"url":"https://bugs.python.org/issue42051"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KZRZRJHWLZ7MOJNPQBWGJVXMVYDC5BRA/","reference_id":"KZRZRJHWLZ7MOJNPQBWGJVXMVYDC5BRA","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2024-10-03T17:41:12Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KZRZRJHWLZ7MOJNPQBWGJVXMVYDC5BRA/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2024-10-03T17:41:12Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html","reference_id":"msg00022.html","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2024-10-03T17:41:12Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20231006-0007/","reference_id":"ntap-20231006-0007","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2024-10-03T17:41:12Z/"}],"url":"https://security.netapp.com/advisory/ntap-20231006-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2987","reference_id":"RHSA-2024:2987","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2987"},{"reference_url":"https://usn.ubuntu.com/6354-1/","reference_id":"USN-6354-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6354-1/"},{"reference_url":"https://usn.ubuntu.com/6891-1/","reference_id":"USN-6891-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6891-1/"},{"reference_url":"https://usn.ubuntu.com/7180-1/","reference_id":"USN-7180-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7180-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/936986?format=json","purl":"pkg:deb/debian/python3.9@3.9.1~rc1-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/python3.9@3.9.1~rc1-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/936982?format=json","purl":"pkg:deb/debian/python3.9@3.9.2-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/python3.9@3.9.2-1%3Fdistro=bullseye"}],"aliases":["CVE-2022-48565"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4q79-666d-rygx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78164?format=json","vulnerability_id":"VCID-7nj2-94zp-d3bp","summary":"python: DoS when processing malformed Apple Property List files in binary format","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48564.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48564.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48564","reference_id":"","reference_type":"","scores":[{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27213","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.2725","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27044","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27113","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27159","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27165","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27121","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27064","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.26962","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.26955","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.2689","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27072","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27046","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27008","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.2841","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28467","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48564"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48564","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48564"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2249750","reference_id":"2249750","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2249750"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0114","reference_id":"RHSA-2024:0114","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0114"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0430","reference_id":"RHSA-2024:0430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0586","reference_id":"RHSA-2024:0586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0586"},{"reference_url":"https://usn.ubuntu.com/6513-1/","reference_id":"USN-6513-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6513-1/"},{"reference_url":"https://usn.ubuntu.com/6891-1/","reference_id":"USN-6891-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6891-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/936986?format=json","purl":"pkg:deb/debian/python3.9@3.9.1~rc1-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/python3.9@3.9.1~rc1-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/936982?format=json","purl":"pkg:deb/debian/python3.9@3.9.2-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/python3.9@3.9.2-1%3Fdistro=bullseye"}],"aliases":["CVE-2022-48564"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7nj2-94zp-d3bp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31956?format=json","vulnerability_id":"VCID-8a7h-5rn5-gubx","summary":"A vulnerability has been discovered in GNAT Ada Suite which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27619.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27619.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27619","reference_id":"","reference_type":"","scores":[{"value":"0.0063","scoring_system":"epss","scoring_elements":"0.70288","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0063","scoring_system":"epss","scoring_elements":"0.70306","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0063","scoring_system":"epss","scoring_elements":"0.70359","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0063","scoring_system":"epss","scoring_elements":"0.70368","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0063","scoring_system":"epss","scoring_elements":"0.70366","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0063","scoring_system":"epss","scoring_elements":"0.70224","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0063","scoring_system":"epss","scoring_elements":"0.7024","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0063","scoring_system":"epss","scoring_elements":"0.70217","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0063","scoring_system":"epss","scoring_elements":"0.70264","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0063","scoring_system":"epss","scoring_elements":"0.70279","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0063","scoring_system":"epss","scoring_elements":"0.70302","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0063","scoring_system":"epss","scoring_elements":"0.70275","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0063","scoring_system":"epss","scoring_elements":"0.70316","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0063","scoring_system":"epss","scoring_elements":"0.70325","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.7165","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.75047","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.75021","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27619"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1889886","reference_id":"1889886","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1889886"},{"reference_url":"https://security.gentoo.org/glsa/202402-04","reference_id":"GLSA-202402-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-04"},{"reference_url":"https://security.gentoo.org/glsa/202409-12","reference_id":"GLSA-202409-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1633","reference_id":"RHSA-2021:1633","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1633"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3252","reference_id":"RHSA-2021:3252","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3252"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4151","reference_id":"RHSA-2021:4151","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4151"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4162","reference_id":"RHSA-2021:4162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4162"},{"reference_url":"https://usn.ubuntu.com/4754-1/","reference_id":"USN-4754-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4754-1/"},{"reference_url":"https://usn.ubuntu.com/4754-3/","reference_id":"USN-4754-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4754-3/"},{"reference_url":"https://usn.ubuntu.com/6891-1/","reference_id":"USN-6891-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6891-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/936986?format=json","purl":"pkg:deb/debian/python3.9@3.9.1~rc1-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/python3.9@3.9.1~rc1-1%3Fdistro=bullseye"},{"url":"http://public2.vulnerablecode.io/api/packages/936982?format=json","purl":"pkg:deb/debian/python3.9@3.9.2-1?distro=bullseye","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/python3.9@3.9.2-1%3Fdistro=bullseye"}],"aliases":["CVE-2020-27619"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8a7h-5rn5-gubx"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/python3.9@3.9.1~rc1-1%3Fdistro=bullseye"}