Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@4.18.0-147?arch=el8
Typerpm
Namespaceredhat
Namekernel
Version4.18.0-147
Qualifiers
arch el8
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-23y9-s6wr-c7dn
vulnerability_id VCID-23y9-s6wr-c7dn
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10207.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10207.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10207
reference_id
reference_type
scores
0
value 0.00703
scoring_system epss
scoring_elements 0.7202
published_at 2026-04-01T12:55:00Z
1
value 0.00703
scoring_system epss
scoring_elements 0.72143
published_at 2026-04-29T12:55:00Z
2
value 0.00703
scoring_system epss
scoring_elements 0.72112
published_at 2026-04-18T12:55:00Z
3
value 0.00703
scoring_system epss
scoring_elements 0.72097
published_at 2026-04-21T12:55:00Z
4
value 0.00703
scoring_system epss
scoring_elements 0.7214
published_at 2026-04-24T12:55:00Z
5
value 0.00703
scoring_system epss
scoring_elements 0.72149
published_at 2026-04-26T12:55:00Z
6
value 0.00703
scoring_system epss
scoring_elements 0.72026
published_at 2026-04-02T12:55:00Z
7
value 0.00703
scoring_system epss
scoring_elements 0.72047
published_at 2026-04-04T12:55:00Z
8
value 0.00703
scoring_system epss
scoring_elements 0.72023
published_at 2026-04-07T12:55:00Z
9
value 0.00703
scoring_system epss
scoring_elements 0.7206
published_at 2026-04-08T12:55:00Z
10
value 0.00703
scoring_system epss
scoring_elements 0.72072
published_at 2026-04-09T12:55:00Z
11
value 0.00703
scoring_system epss
scoring_elements 0.72095
published_at 2026-04-11T12:55:00Z
12
value 0.00703
scoring_system epss
scoring_elements 0.72078
published_at 2026-04-12T12:55:00Z
13
value 0.00703
scoring_system epss
scoring_elements 0.72062
published_at 2026-04-13T12:55:00Z
14
value 0.00703
scoring_system epss
scoring_elements 0.72104
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10207
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10207
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10207
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8553
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18509
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20856
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5995
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10639
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10639
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12817
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12984
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13233
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13233
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15239
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15239
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1999
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3882
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3900
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://security.netapp.com/advisory/ntap-20200103-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20200103-0001/
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1733874
reference_id 1733874
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1733874
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-10207
reference_id CVE-2019-10207
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
1
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
2
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-10207
28
reference_url https://access.redhat.com/errata/RHSA-2019:3309
reference_id RHSA-2019:3309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3309
29
reference_url https://access.redhat.com/errata/RHSA-2019:3517
reference_id RHSA-2019:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3517
30
reference_url https://access.redhat.com/errata/RHSA-2020:1016
reference_id RHSA-2020:1016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1016
31
reference_url https://access.redhat.com/errata/RHSA-2020:1070
reference_id RHSA-2020:1070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1070
32
reference_url https://usn.ubuntu.com/4115-1/
reference_id USN-4115-1
reference_type
scores
url https://usn.ubuntu.com/4115-1/
33
reference_url https://usn.ubuntu.com/4118-1/
reference_id USN-4118-1
reference_type
scores
url https://usn.ubuntu.com/4118-1/
34
reference_url https://usn.ubuntu.com/4145-1/
reference_id USN-4145-1
reference_type
scores
url https://usn.ubuntu.com/4145-1/
35
reference_url https://usn.ubuntu.com/4147-1/
reference_id USN-4147-1
reference_type
scores
url https://usn.ubuntu.com/4147-1/
fixed_packages
aliases CVE-2019-10207
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-23y9-s6wr-c7dn
1
url VCID-2z4g-vpch-c7hj
vulnerability_id VCID-2z4g-vpch-c7hj
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10638.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10638.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10638
reference_id
reference_type
scores
0
value 0.0076
scoring_system epss
scoring_elements 0.73289
published_at 2026-04-01T12:55:00Z
1
value 0.0076
scoring_system epss
scoring_elements 0.73299
published_at 2026-04-02T12:55:00Z
2
value 0.0076
scoring_system epss
scoring_elements 0.73323
published_at 2026-04-04T12:55:00Z
3
value 0.0076
scoring_system epss
scoring_elements 0.73295
published_at 2026-04-07T12:55:00Z
4
value 0.0076
scoring_system epss
scoring_elements 0.73331
published_at 2026-04-08T12:55:00Z
5
value 0.0076
scoring_system epss
scoring_elements 0.73344
published_at 2026-04-09T12:55:00Z
6
value 0.0076
scoring_system epss
scoring_elements 0.73368
published_at 2026-04-11T12:55:00Z
7
value 0.0076
scoring_system epss
scoring_elements 0.73348
published_at 2026-04-12T12:55:00Z
8
value 0.0076
scoring_system epss
scoring_elements 0.7334
published_at 2026-04-13T12:55:00Z
9
value 0.0076
scoring_system epss
scoring_elements 0.73383
published_at 2026-04-16T12:55:00Z
10
value 0.0076
scoring_system epss
scoring_elements 0.73391
published_at 2026-04-18T12:55:00Z
11
value 0.0076
scoring_system epss
scoring_elements 0.73385
published_at 2026-04-21T12:55:00Z
12
value 0.0076
scoring_system epss
scoring_elements 0.73418
published_at 2026-04-24T12:55:00Z
13
value 0.0076
scoring_system epss
scoring_elements 0.7343
published_at 2026-04-26T12:55:00Z
14
value 0.0076
scoring_system epss
scoring_elements 0.73429
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10638
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8553
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18509
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20856
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5995
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10639
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10639
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12817
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12984
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13233
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13233
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15239
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15239
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1999
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3882
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3900
22
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1729931
reference_id 1729931
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1729931
24
reference_url https://access.redhat.com/errata/RHSA-2019:3309
reference_id RHSA-2019:3309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3309
25
reference_url https://access.redhat.com/errata/RHSA-2019:3517
reference_id RHSA-2019:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3517
26
reference_url https://access.redhat.com/errata/RHSA-2020:1016
reference_id RHSA-2020:1016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1016
27
reference_url https://access.redhat.com/errata/RHSA-2020:1070
reference_id RHSA-2020:1070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1070
28
reference_url https://usn.ubuntu.com/4114-1/
reference_id USN-4114-1
reference_type
scores
url https://usn.ubuntu.com/4114-1/
29
reference_url https://usn.ubuntu.com/4115-1/
reference_id USN-4115-1
reference_type
scores
url https://usn.ubuntu.com/4115-1/
30
reference_url https://usn.ubuntu.com/4116-1/
reference_id USN-4116-1
reference_type
scores
url https://usn.ubuntu.com/4116-1/
31
reference_url https://usn.ubuntu.com/4117-1/
reference_id USN-4117-1
reference_type
scores
url https://usn.ubuntu.com/4117-1/
32
reference_url https://usn.ubuntu.com/4118-1/
reference_id USN-4118-1
reference_type
scores
url https://usn.ubuntu.com/4118-1/
fixed_packages
aliases CVE-2019-10638
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2z4g-vpch-c7hj
2
url VCID-38kt-fvjx-p3f2
vulnerability_id VCID-38kt-fvjx-p3f2
summary kernel: out-of-bounds in function build_audio_procunit in sound/usb/mixer.c
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15927.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15927.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-15927
reference_id
reference_type
scores
0
value 0.0012
scoring_system epss
scoring_elements 0.30949
published_at 2026-04-01T12:55:00Z
1
value 0.0012
scoring_system epss
scoring_elements 0.3056
published_at 2026-04-29T12:55:00Z
2
value 0.0012
scoring_system epss
scoring_elements 0.30921
published_at 2026-04-21T12:55:00Z
3
value 0.0012
scoring_system epss
scoring_elements 0.30759
published_at 2026-04-24T12:55:00Z
4
value 0.0012
scoring_system epss
scoring_elements 0.30642
published_at 2026-04-26T12:55:00Z
5
value 0.0012
scoring_system epss
scoring_elements 0.31077
published_at 2026-04-02T12:55:00Z
6
value 0.0012
scoring_system epss
scoring_elements 0.31123
published_at 2026-04-04T12:55:00Z
7
value 0.0012
scoring_system epss
scoring_elements 0.30939
published_at 2026-04-07T12:55:00Z
8
value 0.0012
scoring_system epss
scoring_elements 0.30997
published_at 2026-04-08T12:55:00Z
9
value 0.0012
scoring_system epss
scoring_elements 0.31026
published_at 2026-04-09T12:55:00Z
10
value 0.0012
scoring_system epss
scoring_elements 0.31033
published_at 2026-04-11T12:55:00Z
11
value 0.0012
scoring_system epss
scoring_elements 0.30989
published_at 2026-04-12T12:55:00Z
12
value 0.0012
scoring_system epss
scoring_elements 0.30944
published_at 2026-04-13T12:55:00Z
13
value 0.0012
scoring_system epss
scoring_elements 0.30975
published_at 2026-04-16T12:55:00Z
14
value 0.0012
scoring_system epss
scoring_elements 0.30956
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-15927
4
reference_url https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.2
reference_id
reference_type
scores
url https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.2
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15927
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f4351a199cc120ff9d59e06d02e8657d08e6cc46
reference_id
reference_type
scores
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f4351a199cc120ff9d59e06d02e8657d08e6cc46
8
reference_url https://security.netapp.com/advisory/ntap-20191004-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20191004-0001/
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1759059
reference_id 1759059
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1759059
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-15927
reference_id CVE-2019-15927
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-15927
12
reference_url https://access.redhat.com/errata/RHSA-2019:2029
reference_id RHSA-2019:2029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2029
13
reference_url https://access.redhat.com/errata/RHSA-2019:3517
reference_id RHSA-2019:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3517
fixed_packages
aliases CVE-2019-15927
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-38kt-fvjx-p3f2
3
url VCID-3b12-3r7h-e7eb
vulnerability_id VCID-3b12-3r7h-e7eb
summary kernel: use-after-free information leak in SMB2_read
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15920.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15920.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-15920
reference_id
reference_type
scores
0
value 0.00548
scoring_system epss
scoring_elements 0.67841
published_at 2026-04-01T12:55:00Z
1
value 0.00548
scoring_system epss
scoring_elements 0.67992
published_at 2026-04-29T12:55:00Z
2
value 0.00548
scoring_system epss
scoring_elements 0.67934
published_at 2026-04-21T12:55:00Z
3
value 0.00548
scoring_system epss
scoring_elements 0.67979
published_at 2026-04-24T12:55:00Z
4
value 0.00548
scoring_system epss
scoring_elements 0.67987
published_at 2026-04-26T12:55:00Z
5
value 0.00548
scoring_system epss
scoring_elements 0.67864
published_at 2026-04-02T12:55:00Z
6
value 0.00548
scoring_system epss
scoring_elements 0.67883
published_at 2026-04-04T12:55:00Z
7
value 0.00548
scoring_system epss
scoring_elements 0.67863
published_at 2026-04-07T12:55:00Z
8
value 0.00548
scoring_system epss
scoring_elements 0.67914
published_at 2026-04-08T12:55:00Z
9
value 0.00548
scoring_system epss
scoring_elements 0.67927
published_at 2026-04-09T12:55:00Z
10
value 0.00548
scoring_system epss
scoring_elements 0.67951
published_at 2026-04-11T12:55:00Z
11
value 0.00548
scoring_system epss
scoring_elements 0.67938
published_at 2026-04-12T12:55:00Z
12
value 0.00548
scoring_system epss
scoring_elements 0.67902
published_at 2026-04-13T12:55:00Z
13
value 0.00548
scoring_system epss
scoring_elements 0.67939
published_at 2026-04-16T12:55:00Z
14
value 0.00548
scoring_system epss
scoring_elements 0.67953
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-15920
4
reference_url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.10
reference_id
reference_type
scores
url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.10
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15920
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15920
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://github.com/torvalds/linux/commit/088aaf17aa79300cab14dbee2569c58cfafd7d6e
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/088aaf17aa79300cab14dbee2569c58cfafd7d6e
8
reference_url https://security.netapp.com/advisory/ntap-20191004-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20191004-0001/
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1760864
reference_id 1760864
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1760864
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-15920
reference_id CVE-2019-15920
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:N/A:N
1
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-15920
14
reference_url https://access.redhat.com/errata/RHSA-2019:3517
reference_id RHSA-2019:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3517
fixed_packages
aliases CVE-2019-15920
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3b12-3r7h-e7eb
4
url VCID-3fb7-pd8k-63e5
vulnerability_id VCID-3fb7-pd8k-63e5
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20811.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20811.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-20811
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.07868
published_at 2026-04-01T12:55:00Z
1
value 0.00028
scoring_system epss
scoring_elements 0.07966
published_at 2026-04-02T12:55:00Z
2
value 0.00028
scoring_system epss
scoring_elements 0.08012
published_at 2026-04-04T12:55:00Z
3
value 0.00028
scoring_system epss
scoring_elements 0.07971
published_at 2026-04-07T12:55:00Z
4
value 0.00028
scoring_system epss
scoring_elements 0.08031
published_at 2026-04-08T12:55:00Z
5
value 0.00028
scoring_system epss
scoring_elements 0.0805
published_at 2026-04-09T12:55:00Z
6
value 0.00028
scoring_system epss
scoring_elements 0.08033
published_at 2026-04-11T12:55:00Z
7
value 0.00028
scoring_system epss
scoring_elements 0.08014
published_at 2026-04-12T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08266
published_at 2026-04-29T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.08318
published_at 2026-04-13T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08215
published_at 2026-04-16T12:55:00Z
11
value 0.00029
scoring_system epss
scoring_elements 0.08202
published_at 2026-04-18T12:55:00Z
12
value 0.00029
scoring_system epss
scoring_elements 0.08365
published_at 2026-04-21T12:55:00Z
13
value 0.00029
scoring_system epss
scoring_elements 0.08337
published_at 2026-04-24T12:55:00Z
14
value 0.00029
scoring_system epss
scoring_elements 0.08297
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-20811
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
33
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1846439
reference_id 1846439
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1846439
35
reference_url https://access.redhat.com/errata/RHSA-2019:3517
reference_id RHSA-2019:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3517
36
reference_url https://access.redhat.com/errata/RHSA-2020:5023
reference_id RHSA-2020:5023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5023
37
reference_url https://access.redhat.com/errata/RHSA-2020:5026
reference_id RHSA-2020:5026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5026
38
reference_url https://usn.ubuntu.com/4527-1/
reference_id USN-4527-1
reference_type
scores
url https://usn.ubuntu.com/4527-1/
fixed_packages
aliases CVE-2019-20811
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3fb7-pd8k-63e5
5
url VCID-3nht-abdm-sbex
vulnerability_id VCID-3nht-abdm-sbex
summary kernel: use-after-free read in napi_gro_frags() in the Linux kernel
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10720.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10720.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-10720
reference_id
reference_type
scores
0
value 0.00129
scoring_system epss
scoring_elements 0.32309
published_at 2026-04-01T12:55:00Z
1
value 0.00129
scoring_system epss
scoring_elements 0.3246
published_at 2026-04-02T12:55:00Z
2
value 0.00129
scoring_system epss
scoring_elements 0.32495
published_at 2026-04-04T12:55:00Z
3
value 0.00129
scoring_system epss
scoring_elements 0.32318
published_at 2026-04-21T12:55:00Z
4
value 0.00129
scoring_system epss
scoring_elements 0.32367
published_at 2026-04-08T12:55:00Z
5
value 0.00129
scoring_system epss
scoring_elements 0.32395
published_at 2026-04-09T12:55:00Z
6
value 0.00129
scoring_system epss
scoring_elements 0.32396
published_at 2026-04-11T12:55:00Z
7
value 0.00129
scoring_system epss
scoring_elements 0.32359
published_at 2026-04-12T12:55:00Z
8
value 0.00129
scoring_system epss
scoring_elements 0.32332
published_at 2026-04-13T12:55:00Z
9
value 0.00129
scoring_system epss
scoring_elements 0.32368
published_at 2026-04-16T12:55:00Z
10
value 0.00129
scoring_system epss
scoring_elements 0.32345
published_at 2026-04-18T12:55:00Z
11
value 0.00129
scoring_system epss
scoring_elements 0.32143
published_at 2026-04-24T12:55:00Z
12
value 0.00129
scoring_system epss
scoring_elements 0.32022
published_at 2026-04-26T12:55:00Z
13
value 0.00129
scoring_system epss
scoring_elements 0.31938
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-10720
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10720
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1781204
reference_id 1781204
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1781204
5
reference_url https://access.redhat.com/errata/RHSA-2019:3309
reference_id RHSA-2019:3309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3309
6
reference_url https://access.redhat.com/errata/RHSA-2019:3517
reference_id RHSA-2019:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3517
7
reference_url https://access.redhat.com/errata/RHSA-2020:2854
reference_id RHSA-2020:2854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2854
fixed_packages
aliases CVE-2020-10720
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3nht-abdm-sbex
6
url VCID-3trr-t25v-3fd8
vulnerability_id VCID-3trr-t25v-3fd8
summary Kernel: KVM: leak of uninitialized stack contents to guest
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00042.html
1
reference_url http://packetstormsecurity.com/files/151712/KVM-kvm_inject_page_fault-Uninitialized-Memory-Leak.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/151712/KVM-kvm_inject_page_fault-Uninitialized-Memory-Leak.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7222.json
reference_id
reference_type
scores
0
value 2.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7222.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-7222
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.12887
published_at 2026-04-01T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12719
published_at 2026-04-29T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.12747
published_at 2026-04-18T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12846
published_at 2026-04-21T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12866
published_at 2026-04-24T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.12829
published_at 2026-04-26T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.12983
published_at 2026-04-02T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.13032
published_at 2026-04-04T12:55:00Z
8
value 0.00042
scoring_system epss
scoring_elements 0.12833
published_at 2026-04-07T12:55:00Z
9
value 0.00042
scoring_system epss
scoring_elements 0.12911
published_at 2026-04-08T12:55:00Z
10
value 0.00042
scoring_system epss
scoring_elements 0.12963
published_at 2026-04-09T12:55:00Z
11
value 0.00042
scoring_system epss
scoring_elements 0.12922
published_at 2026-04-11T12:55:00Z
12
value 0.00042
scoring_system epss
scoring_elements 0.12886
published_at 2026-04-12T12:55:00Z
13
value 0.00042
scoring_system epss
scoring_elements 0.12841
published_at 2026-04-13T12:55:00Z
14
value 0.00042
scoring_system epss
scoring_elements 0.12743
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-7222
4
reference_url https://bugs.chromium.org/p/project-zero/issues/detail?id=1759
reference_id
reference_type
scores
url https://bugs.chromium.org/p/project-zero/issues/detail?id=1759
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7222
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://github.com/torvalds/linux/commits/master/arch/x86/kvm
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commits/master/arch/x86/kvm
8
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=353c0956a618a07ba4bbe7ad00ff29fe70e8412a
reference_id
reference_type
scores
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=353c0956a618a07ba4bbe7ad00ff29fe70e8412a
9
reference_url https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
10
reference_url https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
11
reference_url https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KDOXCX3QFVWYXH5CQMGDDE7H6MUG5XGG/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KDOXCX3QFVWYXH5CQMGDDE7H6MUG5XGG/
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y2HMABEMJDPA6LPCBE5WIEZXUKY7DLTN/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y2HMABEMJDPA6LPCBE5WIEZXUKY7DLTN/
14
reference_url https://security.netapp.com/advisory/ntap-20190404-0002/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190404-0002/
15
reference_url http://www.openwall.com/lists/oss-security/2019/02/18/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/02/18/2
16
reference_url http://www.securityfocus.com/bid/106963
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106963
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1671930
reference_id 1671930
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1671930
18
reference_url https://security.archlinux.org/AVG-850
reference_id AVG-850
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-850
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management_node:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:element_software_management_node:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management_node:-:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.6:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.6:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-7222
reference_id CVE-2019-7222
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-7222
55
reference_url https://access.redhat.com/errata/RHSA-2019:2029
reference_id RHSA-2019:2029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2029
56
reference_url https://access.redhat.com/errata/RHSA-2019:2043
reference_id RHSA-2019:2043
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2043
57
reference_url https://access.redhat.com/errata/RHSA-2019:3309
reference_id RHSA-2019:3309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3309
58
reference_url https://access.redhat.com/errata/RHSA-2019:3517
reference_id RHSA-2019:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3517
59
reference_url https://usn.ubuntu.com/3930-1/
reference_id USN-3930-1
reference_type
scores
url https://usn.ubuntu.com/3930-1/
60
reference_url https://usn.ubuntu.com/3930-2/
reference_id USN-3930-2
reference_type
scores
url https://usn.ubuntu.com/3930-2/
61
reference_url https://usn.ubuntu.com/3931-1/
reference_id USN-3931-1
reference_type
scores
url https://usn.ubuntu.com/3931-1/
62
reference_url https://usn.ubuntu.com/3931-2/
reference_id USN-3931-2
reference_type
scores
url https://usn.ubuntu.com/3931-2/
63
reference_url https://usn.ubuntu.com/3932-1/
reference_id USN-3932-1
reference_type
scores
url https://usn.ubuntu.com/3932-1/
64
reference_url https://usn.ubuntu.com/3932-2/
reference_id USN-3932-2
reference_type
scores
url https://usn.ubuntu.com/3932-2/
65
reference_url https://usn.ubuntu.com/3933-1/
reference_id USN-3933-1
reference_type
scores
url https://usn.ubuntu.com/3933-1/
66
reference_url https://usn.ubuntu.com/3933-2/
reference_id USN-3933-2
reference_type
scores
url https://usn.ubuntu.com/3933-2/
fixed_packages
aliases CVE-2019-7222
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3trr-t25v-3fd8
7
url VCID-3wb4-g3ex-xfdr
vulnerability_id VCID-3wb4-g3ex-xfdr
summary hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9506.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9506.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9506
reference_id
reference_type
scores
0
value 0.04458
scoring_system epss
scoring_elements 0.89114
published_at 2026-04-29T12:55:00Z
1
value 0.04458
scoring_system epss
scoring_elements 0.89081
published_at 2026-04-11T12:55:00Z
2
value 0.04458
scoring_system epss
scoring_elements 0.89077
published_at 2026-04-12T12:55:00Z
3
value 0.04458
scoring_system epss
scoring_elements 0.89074
published_at 2026-04-13T12:55:00Z
4
value 0.04458
scoring_system epss
scoring_elements 0.89089
published_at 2026-04-18T12:55:00Z
5
value 0.04576
scoring_system epss
scoring_elements 0.8919
published_at 2026-04-07T12:55:00Z
6
value 0.04576
scoring_system epss
scoring_elements 0.89212
published_at 2026-04-09T12:55:00Z
7
value 0.04576
scoring_system epss
scoring_elements 0.89223
published_at 2026-04-21T12:55:00Z
8
value 0.04576
scoring_system epss
scoring_elements 0.89241
published_at 2026-04-24T12:55:00Z
9
value 0.04576
scoring_system epss
scoring_elements 0.89246
published_at 2026-04-26T12:55:00Z
10
value 0.04576
scoring_system epss
scoring_elements 0.89166
published_at 2026-04-01T12:55:00Z
11
value 0.04576
scoring_system epss
scoring_elements 0.89208
published_at 2026-04-08T12:55:00Z
12
value 0.04576
scoring_system epss
scoring_elements 0.89173
published_at 2026-04-02T12:55:00Z
13
value 0.04576
scoring_system epss
scoring_elements 0.89187
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9506
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9506
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9506
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1727857
reference_id 1727857
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1727857
5
reference_url https://access.redhat.com/errata/RHSA-2019:2975
reference_id RHSA-2019:2975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2975
6
reference_url https://access.redhat.com/errata/RHSA-2019:3055
reference_id RHSA-2019:3055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3055
7
reference_url https://access.redhat.com/errata/RHSA-2019:3076
reference_id RHSA-2019:3076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3076
8
reference_url https://access.redhat.com/errata/RHSA-2019:3089
reference_id RHSA-2019:3089
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3089
9
reference_url https://access.redhat.com/errata/RHSA-2019:3165
reference_id RHSA-2019:3165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3165
10
reference_url https://access.redhat.com/errata/RHSA-2019:3187
reference_id RHSA-2019:3187
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3187
11
reference_url https://access.redhat.com/errata/RHSA-2019:3217
reference_id RHSA-2019:3217
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3217
12
reference_url https://access.redhat.com/errata/RHSA-2019:3218
reference_id RHSA-2019:3218
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3218
13
reference_url https://access.redhat.com/errata/RHSA-2019:3220
reference_id RHSA-2019:3220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3220
14
reference_url https://access.redhat.com/errata/RHSA-2019:3231
reference_id RHSA-2019:3231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3231
15
reference_url https://access.redhat.com/errata/RHSA-2019:3309
reference_id RHSA-2019:3309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3309
16
reference_url https://access.redhat.com/errata/RHSA-2019:3517
reference_id RHSA-2019:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3517
17
reference_url https://access.redhat.com/errata/RHSA-2020:0204
reference_id RHSA-2020:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0204
18
reference_url https://access.redhat.com/errata/RHSA-2020:1460
reference_id RHSA-2020:1460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1460
19
reference_url https://usn.ubuntu.com/4115-1/
reference_id USN-4115-1
reference_type
scores
url https://usn.ubuntu.com/4115-1/
20
reference_url https://usn.ubuntu.com/4118-1/
reference_id USN-4118-1
reference_type
scores
url https://usn.ubuntu.com/4118-1/
21
reference_url https://usn.ubuntu.com/4147-1/
reference_id USN-4147-1
reference_type
scores
url https://usn.ubuntu.com/4147-1/
fixed_packages
aliases CVE-2019-9506
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3wb4-g3ex-xfdr
8
url VCID-4ax3-5d9h-mqeu
vulnerability_id VCID-4ax3-5d9h-mqeu
summary kernel: Memory leak in sit_init_net() in net/ipv6/sit.c
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16994.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16994.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-16994
reference_id
reference_type
scores
0
value 0.00076
scoring_system epss
scoring_elements 0.2273
published_at 2026-04-01T12:55:00Z
1
value 0.00076
scoring_system epss
scoring_elements 0.22588
published_at 2026-04-29T12:55:00Z
2
value 0.00076
scoring_system epss
scoring_elements 0.22762
published_at 2026-04-21T12:55:00Z
3
value 0.00076
scoring_system epss
scoring_elements 0.226
published_at 2026-04-24T12:55:00Z
4
value 0.00076
scoring_system epss
scoring_elements 0.22592
published_at 2026-04-26T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.22903
published_at 2026-04-02T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.22947
published_at 2026-04-04T12:55:00Z
7
value 0.00076
scoring_system epss
scoring_elements 0.2274
published_at 2026-04-07T12:55:00Z
8
value 0.00076
scoring_system epss
scoring_elements 0.22815
published_at 2026-04-08T12:55:00Z
9
value 0.00076
scoring_system epss
scoring_elements 0.22867
published_at 2026-04-09T12:55:00Z
10
value 0.00076
scoring_system epss
scoring_elements 0.22888
published_at 2026-04-11T12:55:00Z
11
value 0.00076
scoring_system epss
scoring_elements 0.22851
published_at 2026-04-12T12:55:00Z
12
value 0.00076
scoring_system epss
scoring_elements 0.22795
published_at 2026-04-13T12:55:00Z
13
value 0.00076
scoring_system epss
scoring_elements 0.22809
published_at 2026-04-16T12:55:00Z
14
value 0.00076
scoring_system epss
scoring_elements 0.22803
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-16994
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16994
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/torvalds/linux/commit/07f12b26e21ab359261bf75cfcb424fdc7daeb6d
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/07f12b26e21ab359261bf75cfcb424fdc7daeb6d
6
reference_url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=07f12b26e21ab359261bf75cfcb424fdc7daeb6d
reference_id
reference_type
scores
url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=07f12b26e21ab359261bf75cfcb424fdc7daeb6d
7
reference_url https://security.netapp.com/advisory/ntap-20191031-0005/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20191031-0005/
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1759681
reference_id 1759681
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1759681
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-16994
reference_id CVE-2019-16994
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
1
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-16994
13
reference_url https://access.redhat.com/errata/RHSA-2019:3309
reference_id RHSA-2019:3309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3309
14
reference_url https://access.redhat.com/errata/RHSA-2019:3517
reference_id RHSA-2019:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3517
15
reference_url https://access.redhat.com/errata/RHSA-2020:4060
reference_id RHSA-2020:4060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4060
16
reference_url https://access.redhat.com/errata/RHSA-2020:4062
reference_id RHSA-2020:4062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4062
fixed_packages
aliases CVE-2019-16994
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4ax3-5d9h-mqeu
9
url VCID-585a-eedx-yucb
vulnerability_id VCID-585a-eedx-yucb
summary kernel: null pointer dereference in drivers/net/ethernet/intel/fm10k/fm10k_main.c
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15924.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15924.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-15924
reference_id
reference_type
scores
0
value 0.00071
scoring_system epss
scoring_elements 0.21777
published_at 2026-04-01T12:55:00Z
1
value 0.00071
scoring_system epss
scoring_elements 0.21617
published_at 2026-04-29T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.21781
published_at 2026-04-21T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.21633
published_at 2026-04-24T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.21627
published_at 2026-04-26T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.21942
published_at 2026-04-02T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.21995
published_at 2026-04-04T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.2176
published_at 2026-04-07T12:55:00Z
8
value 0.00071
scoring_system epss
scoring_elements 0.21837
published_at 2026-04-08T12:55:00Z
9
value 0.00071
scoring_system epss
scoring_elements 0.21893
published_at 2026-04-09T12:55:00Z
10
value 0.00071
scoring_system epss
scoring_elements 0.21905
published_at 2026-04-11T12:55:00Z
11
value 0.00071
scoring_system epss
scoring_elements 0.21865
published_at 2026-04-12T12:55:00Z
12
value 0.00071
scoring_system epss
scoring_elements 0.21807
published_at 2026-04-13T12:55:00Z
13
value 0.00071
scoring_system epss
scoring_elements 0.2181
published_at 2026-04-16T12:55:00Z
14
value 0.00071
scoring_system epss
scoring_elements 0.21817
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-15924
4
reference_url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.11
reference_id
reference_type
scores
url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.11
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15924
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://github.com/torvalds/linux/commit/01ca667133d019edc9f0a1f70a272447c84ec41f
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/01ca667133d019edc9f0a1f70a272447c84ec41f
8
reference_url https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html
9
reference_url https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html
10
reference_url https://security.netapp.com/advisory/ntap-20191004-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20191004-0001/
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1763869
reference_id 1763869
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1763869
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-15924
reference_id CVE-2019-15924
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-15924
14
reference_url https://access.redhat.com/errata/RHSA-2019:3309
reference_id RHSA-2019:3309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3309
15
reference_url https://access.redhat.com/errata/RHSA-2019:3517
reference_id RHSA-2019:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3517
fixed_packages
aliases CVE-2019-15924
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-585a-eedx-yucb
10
url VCID-813c-xj2p-3kgq
vulnerability_id VCID-813c-xj2p-3kgq
summary kernel: SCTP socket buffer memory leak leading to denial of service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3874.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3874.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-3874
reference_id
reference_type
scores
0
value 0.00178
scoring_system epss
scoring_elements 0.39299
published_at 2026-04-01T12:55:00Z
1
value 0.00178
scoring_system epss
scoring_elements 0.3946
published_at 2026-04-02T12:55:00Z
2
value 0.00178
scoring_system epss
scoring_elements 0.39484
published_at 2026-04-04T12:55:00Z
3
value 0.00178
scoring_system epss
scoring_elements 0.39398
published_at 2026-04-07T12:55:00Z
4
value 0.00178
scoring_system epss
scoring_elements 0.39454
published_at 2026-04-08T12:55:00Z
5
value 0.00178
scoring_system epss
scoring_elements 0.39469
published_at 2026-04-09T12:55:00Z
6
value 0.00178
scoring_system epss
scoring_elements 0.3948
published_at 2026-04-11T12:55:00Z
7
value 0.00178
scoring_system epss
scoring_elements 0.39442
published_at 2026-04-12T12:55:00Z
8
value 0.00178
scoring_system epss
scoring_elements 0.39425
published_at 2026-04-13T12:55:00Z
9
value 0.00178
scoring_system epss
scoring_elements 0.39476
published_at 2026-04-16T12:55:00Z
10
value 0.00178
scoring_system epss
scoring_elements 0.39448
published_at 2026-04-18T12:55:00Z
11
value 0.00178
scoring_system epss
scoring_elements 0.39362
published_at 2026-04-21T12:55:00Z
12
value 0.00178
scoring_system epss
scoring_elements 0.39169
published_at 2026-04-24T12:55:00Z
13
value 0.00178
scoring_system epss
scoring_elements 0.39152
published_at 2026-04-26T12:55:00Z
14
value 0.00178
scoring_system epss
scoring_elements 0.39071
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-3874
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3874
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1686373
reference_id 1686373
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1686373
5
reference_url https://access.redhat.com/errata/RHSA-2019:3309
reference_id RHSA-2019:3309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3309
6
reference_url https://access.redhat.com/errata/RHSA-2019:3517
reference_id RHSA-2019:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3517
7
reference_url https://usn.ubuntu.com/3979-1/
reference_id USN-3979-1
reference_type
scores
url https://usn.ubuntu.com/3979-1/
8
reference_url https://usn.ubuntu.com/3980-1/
reference_id USN-3980-1
reference_type
scores
url https://usn.ubuntu.com/3980-1/
9
reference_url https://usn.ubuntu.com/3980-2/
reference_id USN-3980-2
reference_type
scores
url https://usn.ubuntu.com/3980-2/
10
reference_url https://usn.ubuntu.com/3981-1/
reference_id USN-3981-1
reference_type
scores
url https://usn.ubuntu.com/3981-1/
11
reference_url https://usn.ubuntu.com/3981-2/
reference_id USN-3981-2
reference_type
scores
url https://usn.ubuntu.com/3981-2/
12
reference_url https://usn.ubuntu.com/3982-1/
reference_id USN-3982-1
reference_type
scores
url https://usn.ubuntu.com/3982-1/
13
reference_url https://usn.ubuntu.com/3982-2/
reference_id USN-3982-2
reference_type
scores
url https://usn.ubuntu.com/3982-2/
fixed_packages
aliases CVE-2019-3874
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-813c-xj2p-3kgq
11
url VCID-95qt-y3b3-pbg7
vulnerability_id VCID-95qt-y3b3-pbg7
summary kernel: use-after-free in SMB2_write function in fs/cifs/smb2pdu.c
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15919.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15919.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-15919
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.17747
published_at 2026-04-01T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.17569
published_at 2026-04-29T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.1773
published_at 2026-04-21T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.17638
published_at 2026-04-24T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.17615
published_at 2026-04-26T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.17908
published_at 2026-04-02T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.17962
published_at 2026-04-04T12:55:00Z
7
value 0.00057
scoring_system epss
scoring_elements 0.17662
published_at 2026-04-07T12:55:00Z
8
value 0.00057
scoring_system epss
scoring_elements 0.17751
published_at 2026-04-08T12:55:00Z
9
value 0.00057
scoring_system epss
scoring_elements 0.17812
published_at 2026-04-09T12:55:00Z
10
value 0.00057
scoring_system epss
scoring_elements 0.17828
published_at 2026-04-11T12:55:00Z
11
value 0.00057
scoring_system epss
scoring_elements 0.17785
published_at 2026-04-12T12:55:00Z
12
value 0.00057
scoring_system epss
scoring_elements 0.17737
published_at 2026-04-13T12:55:00Z
13
value 0.00057
scoring_system epss
scoring_elements 0.17683
published_at 2026-04-16T12:55:00Z
14
value 0.00057
scoring_system epss
scoring_elements 0.17692
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-15919
4
reference_url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.10
reference_id
reference_type
scores
url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.10
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15919
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://github.com/torvalds/linux/commit/6a3eb3360667170988f8a6477f6686242061488a
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/6a3eb3360667170988f8a6477f6686242061488a
8
reference_url https://security.netapp.com/advisory/ntap-20191004-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20191004-0001/
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1750410
reference_id 1750410
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1750410
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-15919
reference_id CVE-2019-15919
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-15919
14
reference_url https://access.redhat.com/errata/RHSA-2019:3517
reference_id RHSA-2019:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3517
fixed_packages
aliases CVE-2019-15919
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-95qt-y3b3-pbg7
12
url VCID-9jgx-kua4-q3bk
vulnerability_id VCID-9jgx-kua4-q3bk
summary kernel: unchecked kstrdup of fwstr in drm_load_edid_firmware leads to denial of service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12382.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12382.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-12382
reference_id
reference_type
scores
0
value 0.00113
scoring_system epss
scoring_elements 0.2957
published_at 2026-04-29T12:55:00Z
1
value 0.00118
scoring_system epss
scoring_elements 0.30646
published_at 2026-04-01T12:55:00Z
2
value 0.00118
scoring_system epss
scoring_elements 0.30782
published_at 2026-04-02T12:55:00Z
3
value 0.00118
scoring_system epss
scoring_elements 0.3083
published_at 2026-04-04T12:55:00Z
4
value 0.00118
scoring_system epss
scoring_elements 0.30648
published_at 2026-04-07T12:55:00Z
5
value 0.00118
scoring_system epss
scoring_elements 0.30706
published_at 2026-04-08T12:55:00Z
6
value 0.00118
scoring_system epss
scoring_elements 0.30737
published_at 2026-04-09T12:55:00Z
7
value 0.00118
scoring_system epss
scoring_elements 0.30741
published_at 2026-04-11T12:55:00Z
8
value 0.00118
scoring_system epss
scoring_elements 0.30696
published_at 2026-04-12T12:55:00Z
9
value 0.00118
scoring_system epss
scoring_elements 0.30652
published_at 2026-04-13T12:55:00Z
10
value 0.00118
scoring_system epss
scoring_elements 0.30677
published_at 2026-04-16T12:55:00Z
11
value 0.00118
scoring_system epss
scoring_elements 0.3066
published_at 2026-04-18T12:55:00Z
12
value 0.00118
scoring_system epss
scoring_elements 0.30626
published_at 2026-04-21T12:55:00Z
13
value 0.00118
scoring_system epss
scoring_elements 0.30446
published_at 2026-04-24T12:55:00Z
14
value 0.00118
scoring_system epss
scoring_elements 0.30332
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-12382
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12382
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12382
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1715554
reference_id 1715554
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1715554
5
reference_url https://access.redhat.com/errata/RHSA-2019:3517
reference_id RHSA-2019:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3517
6
reference_url https://access.redhat.com/errata/RHSA-2020:1016
reference_id RHSA-2020:1016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1016
7
reference_url https://access.redhat.com/errata/RHSA-2020:1070
reference_id RHSA-2020:1070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1070
8
reference_url https://access.redhat.com/errata/RHSA-2020:2522
reference_id RHSA-2020:2522
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2522
fixed_packages
aliases CVE-2019-12382
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9jgx-kua4-q3bk
13
url VCID-axdd-vkgz-cye9
vulnerability_id VCID-axdd-vkgz-cye9
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3882.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3882.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-3882
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10529
published_at 2026-04-01T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10673
published_at 2026-04-02T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.10737
published_at 2026-04-04T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10595
published_at 2026-04-07T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10667
published_at 2026-04-08T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.10724
published_at 2026-04-09T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10738
published_at 2026-04-11T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10706
published_at 2026-04-12T12:55:00Z
8
value 0.00036
scoring_system epss
scoring_elements 0.10682
published_at 2026-04-13T12:55:00Z
9
value 0.00036
scoring_system epss
scoring_elements 0.10542
published_at 2026-04-16T12:55:00Z
10
value 0.00036
scoring_system epss
scoring_elements 0.10558
published_at 2026-04-18T12:55:00Z
11
value 0.00036
scoring_system epss
scoring_elements 0.10687
published_at 2026-04-21T12:55:00Z
12
value 0.00036
scoring_system epss
scoring_elements 0.10637
published_at 2026-04-24T12:55:00Z
13
value 0.00036
scoring_system epss
scoring_elements 0.10634
published_at 2026-04-26T12:55:00Z
14
value 0.00036
scoring_system epss
scoring_elements 0.1058
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-3882
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8553
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18509
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20856
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5995
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10639
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10639
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15239
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15239
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3882
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3900
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1689426
reference_id 1689426
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1689426
20
reference_url https://access.redhat.com/errata/RHSA-2019:2029
reference_id RHSA-2019:2029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2029
21
reference_url https://access.redhat.com/errata/RHSA-2019:2043
reference_id RHSA-2019:2043
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2043
22
reference_url https://access.redhat.com/errata/RHSA-2019:3309
reference_id RHSA-2019:3309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3309
23
reference_url https://access.redhat.com/errata/RHSA-2019:3517
reference_id RHSA-2019:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3517
24
reference_url https://usn.ubuntu.com/3979-1/
reference_id USN-3979-1
reference_type
scores
url https://usn.ubuntu.com/3979-1/
25
reference_url https://usn.ubuntu.com/3980-1/
reference_id USN-3980-1
reference_type
scores
url https://usn.ubuntu.com/3980-1/
26
reference_url https://usn.ubuntu.com/3980-2/
reference_id USN-3980-2
reference_type
scores
url https://usn.ubuntu.com/3980-2/
27
reference_url https://usn.ubuntu.com/3981-1/
reference_id USN-3981-1
reference_type
scores
url https://usn.ubuntu.com/3981-1/
28
reference_url https://usn.ubuntu.com/3981-2/
reference_id USN-3981-2
reference_type
scores
url https://usn.ubuntu.com/3981-2/
29
reference_url https://usn.ubuntu.com/3982-1/
reference_id USN-3982-1
reference_type
scores
url https://usn.ubuntu.com/3982-1/
30
reference_url https://usn.ubuntu.com/3982-2/
reference_id USN-3982-2
reference_type
scores
url https://usn.ubuntu.com/3982-2/
fixed_packages
aliases CVE-2019-3882
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-axdd-vkgz-cye9
14
url VCID-cjcd-saft-fqds
vulnerability_id VCID-cjcd-saft-fqds
summary kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15916.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15916.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-15916
reference_id
reference_type
scores
0
value 0.02564
scoring_system epss
scoring_elements 0.85576
published_at 2026-04-29T12:55:00Z
1
value 0.02564
scoring_system epss
scoring_elements 0.85522
published_at 2026-04-13T12:55:00Z
2
value 0.02564
scoring_system epss
scoring_elements 0.85545
published_at 2026-04-16T12:55:00Z
3
value 0.02564
scoring_system epss
scoring_elements 0.8555
published_at 2026-04-18T12:55:00Z
4
value 0.02564
scoring_system epss
scoring_elements 0.85546
published_at 2026-04-21T12:55:00Z
5
value 0.02564
scoring_system epss
scoring_elements 0.85568
published_at 2026-04-24T12:55:00Z
6
value 0.02564
scoring_system epss
scoring_elements 0.85578
published_at 2026-04-26T12:55:00Z
7
value 0.02564
scoring_system epss
scoring_elements 0.85484
published_at 2026-04-07T12:55:00Z
8
value 0.02564
scoring_system epss
scoring_elements 0.85504
published_at 2026-04-08T12:55:00Z
9
value 0.02564
scoring_system epss
scoring_elements 0.85512
published_at 2026-04-09T12:55:00Z
10
value 0.02564
scoring_system epss
scoring_elements 0.85527
published_at 2026-04-11T12:55:00Z
11
value 0.02564
scoring_system epss
scoring_elements 0.85525
published_at 2026-04-12T12:55:00Z
12
value 0.02605
scoring_system epss
scoring_elements 0.85565
published_at 2026-04-02T12:55:00Z
13
value 0.02605
scoring_system epss
scoring_elements 0.85583
published_at 2026-04-04T12:55:00Z
14
value 0.02605
scoring_system epss
scoring_elements 0.85553
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-15916
3
reference_url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.1
reference_id
reference_type
scores
url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.1
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15916
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15916
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=895a5e96dbd6386c8e78e5b78e067dcc67b7f0ab
reference_id
reference_type
scores
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=895a5e96dbd6386c8e78e5b78e067dcc67b7f0ab
7
reference_url https://security.netapp.com/advisory/ntap-20191004-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20191004-0001/
8
reference_url https://support.f5.com/csp/article/K57418558?utm_source=f5support&amp%3Butm_medium=RSS
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K57418558?utm_source=f5support&amp%3Butm_medium=RSS
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1750813
reference_id 1750813
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1750813
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-15916
reference_id CVE-2019-15916
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-15916
12
reference_url https://access.redhat.com/errata/RHSA-2019:3309
reference_id RHSA-2019:3309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3309
13
reference_url https://access.redhat.com/errata/RHSA-2019:3517
reference_id RHSA-2019:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3517
14
reference_url https://access.redhat.com/errata/RHSA-2020:0740
reference_id RHSA-2020:0740
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0740
15
reference_url https://access.redhat.com/errata/RHSA-2020:1016
reference_id RHSA-2020:1016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1016
16
reference_url https://access.redhat.com/errata/RHSA-2020:1070
reference_id RHSA-2020:1070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1070
17
reference_url https://access.redhat.com/errata/RHSA-2020:2522
reference_id RHSA-2020:2522
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2522
18
reference_url https://access.redhat.com/errata/RHSA-2020:2851
reference_id RHSA-2020:2851
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2851
fixed_packages
aliases CVE-2019-15916
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cjcd-saft-fqds
15
url VCID-drgs-3u3a-v3h1
vulnerability_id VCID-drgs-3u3a-v3h1
summary kernel: Information Disclosure in crypto_report_one in crypto/crypto_user.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19854.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19854.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-19854
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16585
published_at 2026-04-01T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16764
published_at 2026-04-02T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16824
published_at 2026-04-04T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.1661
published_at 2026-04-07T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16695
published_at 2026-04-08T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.16749
published_at 2026-04-09T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.16729
published_at 2026-04-11T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.16685
published_at 2026-04-12T12:55:00Z
8
value 0.00053
scoring_system epss
scoring_elements 0.16627
published_at 2026-04-13T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.16563
published_at 2026-04-16T12:55:00Z
10
value 0.00053
scoring_system epss
scoring_elements 0.16572
published_at 2026-04-18T12:55:00Z
11
value 0.00053
scoring_system epss
scoring_elements 0.16611
published_at 2026-04-21T12:55:00Z
12
value 0.00053
scoring_system epss
scoring_elements 0.16508
published_at 2026-04-24T12:55:00Z
13
value 0.00053
scoring_system epss
scoring_elements 0.16496
published_at 2026-04-26T12:55:00Z
14
value 0.00053
scoring_system epss
scoring_elements 0.16453
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-19854
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19854
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1656986
reference_id 1656986
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1656986
5
reference_url https://access.redhat.com/errata/RHSA-2019:3309
reference_id RHSA-2019:3309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3309
6
reference_url https://access.redhat.com/errata/RHSA-2019:3517
reference_id RHSA-2019:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3517
7
reference_url https://usn.ubuntu.com/3872-1/
reference_id USN-3872-1
reference_type
scores
url https://usn.ubuntu.com/3872-1/
8
reference_url https://usn.ubuntu.com/3878-1/
reference_id USN-3878-1
reference_type
scores
url https://usn.ubuntu.com/3878-1/
9
reference_url https://usn.ubuntu.com/3878-2/
reference_id USN-3878-2
reference_type
scores
url https://usn.ubuntu.com/3878-2/
10
reference_url https://usn.ubuntu.com/3901-1/
reference_id USN-3901-1
reference_type
scores
url https://usn.ubuntu.com/3901-1/
11
reference_url https://usn.ubuntu.com/3901-2/
reference_id USN-3901-2
reference_type
scores
url https://usn.ubuntu.com/3901-2/
fixed_packages
aliases CVE-2018-19854
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-drgs-3u3a-v3h1
16
url VCID-efar-vyrf-8fau
vulnerability_id VCID-efar-vyrf-8fau
summary kernel: nfs: use-after-free in svc_process_common()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16884.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16884.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16884
reference_id
reference_type
scores
0
value 0.00048
scoring_system epss
scoring_elements 0.14931
published_at 2026-04-01T12:55:00Z
1
value 0.00048
scoring_system epss
scoring_elements 0.14978
published_at 2026-04-02T12:55:00Z
2
value 0.00048
scoring_system epss
scoring_elements 0.15056
published_at 2026-04-04T12:55:00Z
3
value 0.00048
scoring_system epss
scoring_elements 0.14861
published_at 2026-04-07T12:55:00Z
4
value 0.00048
scoring_system epss
scoring_elements 0.14949
published_at 2026-04-08T12:55:00Z
5
value 0.00048
scoring_system epss
scoring_elements 0.15
published_at 2026-04-09T12:55:00Z
6
value 0.00048
scoring_system epss
scoring_elements 0.14963
published_at 2026-04-11T12:55:00Z
7
value 0.00048
scoring_system epss
scoring_elements 0.14926
published_at 2026-04-12T12:55:00Z
8
value 0.00048
scoring_system epss
scoring_elements 0.14867
published_at 2026-04-26T12:55:00Z
9
value 0.00048
scoring_system epss
scoring_elements 0.14761
published_at 2026-04-16T12:55:00Z
10
value 0.00048
scoring_system epss
scoring_elements 0.14769
published_at 2026-04-18T12:55:00Z
11
value 0.00048
scoring_system epss
scoring_elements 0.14827
published_at 2026-04-21T12:55:00Z
12
value 0.00048
scoring_system epss
scoring_elements 0.14865
published_at 2026-04-24T12:55:00Z
13
value 0.00048
scoring_system epss
scoring_elements 0.1481
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16884
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16884
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1660375
reference_id 1660375
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1660375
5
reference_url https://access.redhat.com/errata/RHSA-2019:1873
reference_id RHSA-2019:1873
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1873
6
reference_url https://access.redhat.com/errata/RHSA-2019:1891
reference_id RHSA-2019:1891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1891
7
reference_url https://access.redhat.com/errata/RHSA-2019:2696
reference_id RHSA-2019:2696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2696
8
reference_url https://access.redhat.com/errata/RHSA-2019:2730
reference_id RHSA-2019:2730
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2730
9
reference_url https://access.redhat.com/errata/RHSA-2019:3309
reference_id RHSA-2019:3309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3309
10
reference_url https://access.redhat.com/errata/RHSA-2019:3517
reference_id RHSA-2019:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3517
11
reference_url https://access.redhat.com/errata/RHSA-2020:0204
reference_id RHSA-2020:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0204
12
reference_url https://access.redhat.com/errata/RHSA-2020:2854
reference_id RHSA-2020:2854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2854
13
reference_url https://usn.ubuntu.com/3932-1/
reference_id USN-3932-1
reference_type
scores
url https://usn.ubuntu.com/3932-1/
14
reference_url https://usn.ubuntu.com/3932-2/
reference_id USN-3932-2
reference_type
scores
url https://usn.ubuntu.com/3932-2/
15
reference_url https://usn.ubuntu.com/3980-1/
reference_id USN-3980-1
reference_type
scores
url https://usn.ubuntu.com/3980-1/
16
reference_url https://usn.ubuntu.com/3980-2/
reference_id USN-3980-2
reference_type
scores
url https://usn.ubuntu.com/3980-2/
17
reference_url https://usn.ubuntu.com/3981-1/
reference_id USN-3981-1
reference_type
scores
url https://usn.ubuntu.com/3981-1/
18
reference_url https://usn.ubuntu.com/3981-2/
reference_id USN-3981-2
reference_type
scores
url https://usn.ubuntu.com/3981-2/
fixed_packages
aliases CVE-2018-16884
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-efar-vyrf-8fau
17
url VCID-ffu4-v4aq-1bdz
vulnerability_id VCID-ffu4-v4aq-1bdz
summary kernel: Heap address information leak while using L2CAP_GET_CONF_OPT
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3459.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3459.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-3459
reference_id
reference_type
scores
0
value 0.00465
scoring_system epss
scoring_elements 0.64267
published_at 2026-04-01T12:55:00Z
1
value 0.00465
scoring_system epss
scoring_elements 0.64416
published_at 2026-04-29T12:55:00Z
2
value 0.00465
scoring_system epss
scoring_elements 0.64381
published_at 2026-04-16T12:55:00Z
3
value 0.00465
scoring_system epss
scoring_elements 0.64392
published_at 2026-04-18T12:55:00Z
4
value 0.00465
scoring_system epss
scoring_elements 0.64383
published_at 2026-04-21T12:55:00Z
5
value 0.00465
scoring_system epss
scoring_elements 0.64403
published_at 2026-04-24T12:55:00Z
6
value 0.00465
scoring_system epss
scoring_elements 0.64325
published_at 2026-04-02T12:55:00Z
7
value 0.00465
scoring_system epss
scoring_elements 0.64353
published_at 2026-04-04T12:55:00Z
8
value 0.00465
scoring_system epss
scoring_elements 0.64311
published_at 2026-04-07T12:55:00Z
9
value 0.00465
scoring_system epss
scoring_elements 0.64359
published_at 2026-04-08T12:55:00Z
10
value 0.00465
scoring_system epss
scoring_elements 0.64374
published_at 2026-04-12T12:55:00Z
11
value 0.00465
scoring_system epss
scoring_elements 0.64386
published_at 2026-04-11T12:55:00Z
12
value 0.00465
scoring_system epss
scoring_elements 0.64345
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-3459
2
reference_url https://bugzilla.novell.com/show_bug.cgi?id=1120758
reference_id
reference_type
scores
url https://bugzilla.novell.com/show_bug.cgi?id=1120758
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3459
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3459
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://git.kernel.org/linus/7c9cbd0b5e38a1672fcd137894ace3b042dfbf69
reference_id
reference_type
scores
url https://git.kernel.org/linus/7c9cbd0b5e38a1672fcd137894ace3b042dfbf69
6
reference_url https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html
7
reference_url https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html
8
reference_url https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html
9
reference_url https://lore.kernel.org/linux-bluetooth/20190110062833.GA15047%40kroah.com/
reference_id
reference_type
scores
url https://lore.kernel.org/linux-bluetooth/20190110062833.GA15047%40kroah.com/
10
reference_url https://marc.info/?l=oss-security&m=154721580222522&w=2
reference_id
reference_type
scores
url https://marc.info/?l=oss-security&m=154721580222522&w=2
11
reference_url https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3459.html
reference_id
reference_type
scores
url https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3459.html
12
reference_url http://www.openwall.com/lists/oss-security/2019/06/27/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/06/27/2
13
reference_url http://www.openwall.com/lists/oss-security/2019/06/27/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/06/27/7
14
reference_url http://www.openwall.com/lists/oss-security/2019/06/28/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/06/28/1
15
reference_url http://www.openwall.com/lists/oss-security/2019/06/28/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/06/28/2
16
reference_url http://www.openwall.com/lists/oss-security/2019/08/12/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/08/12/1
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1663176
reference_id 1663176
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1663176
18
reference_url https://security.archlinux.org/AVG-988
reference_id AVG-988
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-988
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-3459
reference_id CVE-2019-3459
reference_type
scores
0
value 3.3
scoring_system cvssv2
scoring_elements AV:A/AC:L/Au:N/C:P/I:N/A:N
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-3459
50
reference_url https://access.redhat.com/errata/RHSA-2019:2029
reference_id RHSA-2019:2029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2029
51
reference_url https://access.redhat.com/errata/RHSA-2019:2043
reference_id RHSA-2019:2043
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2043
52
reference_url https://access.redhat.com/errata/RHSA-2019:3309
reference_id RHSA-2019:3309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3309
53
reference_url https://access.redhat.com/errata/RHSA-2019:3517
reference_id RHSA-2019:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3517
54
reference_url https://access.redhat.com/errata/RHSA-2020:0740
reference_id RHSA-2020:0740
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0740
55
reference_url https://usn.ubuntu.com/3930-1/
reference_id USN-3930-1
reference_type
scores
url https://usn.ubuntu.com/3930-1/
56
reference_url https://usn.ubuntu.com/3930-2/
reference_id USN-3930-2
reference_type
scores
url https://usn.ubuntu.com/3930-2/
57
reference_url https://usn.ubuntu.com/3931-1/
reference_id USN-3931-1
reference_type
scores
url https://usn.ubuntu.com/3931-1/
58
reference_url https://usn.ubuntu.com/3931-2/
reference_id USN-3931-2
reference_type
scores
url https://usn.ubuntu.com/3931-2/
59
reference_url https://usn.ubuntu.com/3932-1/
reference_id USN-3932-1
reference_type
scores
url https://usn.ubuntu.com/3932-1/
60
reference_url https://usn.ubuntu.com/3932-2/
reference_id USN-3932-2
reference_type
scores
url https://usn.ubuntu.com/3932-2/
61
reference_url https://usn.ubuntu.com/3933-1/
reference_id USN-3933-1
reference_type
scores
url https://usn.ubuntu.com/3933-1/
62
reference_url https://usn.ubuntu.com/3933-2/
reference_id USN-3933-2
reference_type
scores
url https://usn.ubuntu.com/3933-2/
fixed_packages
aliases CVE-2019-3459
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ffu4-v4aq-1bdz
18
url VCID-fk54-8rrc-ekc2
vulnerability_id VCID-fk54-8rrc-ekc2
summary security update
references
0
reference_url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=574823bfab82d9d8fa47f422778043fbb4b4f50e
reference_id
reference_type
scores
url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=574823bfab82d9d8fa47f422778043fbb4b4f50e
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5489.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5489.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-5489
reference_id
reference_type
scores
0
value 0.00207
scoring_system epss
scoring_elements 0.4313
published_at 2026-04-12T12:55:00Z
1
value 0.00207
scoring_system epss
scoring_elements 0.43165
published_at 2026-04-18T12:55:00Z
2
value 0.00207
scoring_system epss
scoring_elements 0.43175
published_at 2026-04-16T12:55:00Z
3
value 0.00207
scoring_system epss
scoring_elements 0.43115
published_at 2026-04-13T12:55:00Z
4
value 0.00208
scoring_system epss
scoring_elements 0.4313
published_at 2026-04-07T12:55:00Z
5
value 0.00208
scoring_system epss
scoring_elements 0.43165
published_at 2026-04-02T12:55:00Z
6
value 0.00208
scoring_system epss
scoring_elements 0.43193
published_at 2026-04-04T12:55:00Z
7
value 0.00208
scoring_system epss
scoring_elements 0.43107
published_at 2026-04-01T12:55:00Z
8
value 0.00218
scoring_system epss
scoring_elements 0.44483
published_at 2026-04-09T12:55:00Z
9
value 0.00218
scoring_system epss
scoring_elements 0.44476
published_at 2026-04-08T12:55:00Z
10
value 0.00218
scoring_system epss
scoring_elements 0.44499
published_at 2026-04-11T12:55:00Z
11
value 0.00439
scoring_system epss
scoring_elements 0.63184
published_at 2026-04-29T12:55:00Z
12
value 0.00439
scoring_system epss
scoring_elements 0.63149
published_at 2026-04-21T12:55:00Z
13
value 0.00439
scoring_system epss
scoring_elements 0.63171
published_at 2026-04-24T12:55:00Z
14
value 0.00439
scoring_system epss
scoring_elements 0.63185
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-5489
6
reference_url https://arxiv.org/abs/1901.01161
reference_id
reference_type
scores
url https://arxiv.org/abs/1901.01161
7
reference_url https://bugzilla.suse.com/show_bug.cgi?id=1120843
reference_id
reference_type
scores
url https://bugzilla.suse.com/show_bug.cgi?id=1120843
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10126
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10126
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11486
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11599
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11815
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11833
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11884
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3846
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5489
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9500
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9503
21
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
22
reference_url https://github.com/torvalds/linux/commit/574823bfab82d9d8fa47f422778043fbb4b4f50e
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/574823bfab82d9d8fa47f422778043fbb4b4f50e
23
reference_url https://lists.debian.org/debian-lts-announce/2019/06/msg00010.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/06/msg00010.html
24
reference_url https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html
25
reference_url https://seclists.org/bugtraq/2019/Jun/26
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Jun/26
26
reference_url https://security.netapp.com/advisory/ntap-20190307-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190307-0001/
27
reference_url https://www.debian.org/security/2019/dsa-4465
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4465
28
reference_url https://www.oracle.com/security-alerts/cpujul2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpujul2020.html
29
reference_url https://www.theregister.co.uk/2019/01/05/boffins_beat_page_cache/
reference_id
reference_type
scores
url https://www.theregister.co.uk/2019/01/05/boffins_beat_page_cache/
30
reference_url http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-pagecache-en
reference_id
reference_type
scores
url http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-pagecache-en
31
reference_url http://www.securityfocus.com/bid/106478
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106478
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1664110
reference_id 1664110
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1664110
33
reference_url https://security.archlinux.org/AVG-842
reference_id AVG-842
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-842
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management_node:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:element_software_management_node:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management_node:-:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-5489
reference_id CVE-2019-5489
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-5489
38
reference_url https://access.redhat.com/errata/RHSA-2019:2029
reference_id RHSA-2019:2029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2029
39
reference_url https://access.redhat.com/errata/RHSA-2019:2043
reference_id RHSA-2019:2043
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2043
40
reference_url https://access.redhat.com/errata/RHSA-2019:2473
reference_id RHSA-2019:2473
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2473
41
reference_url https://access.redhat.com/errata/RHSA-2019:2808
reference_id RHSA-2019:2808
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2808
42
reference_url https://access.redhat.com/errata/RHSA-2019:2809
reference_id RHSA-2019:2809
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2809
43
reference_url https://access.redhat.com/errata/RHSA-2019:2837
reference_id RHSA-2019:2837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2837
44
reference_url https://access.redhat.com/errata/RHSA-2019:3309
reference_id RHSA-2019:3309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3309
45
reference_url https://access.redhat.com/errata/RHSA-2019:3517
reference_id RHSA-2019:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3517
46
reference_url https://access.redhat.com/errata/RHSA-2019:3967
reference_id RHSA-2019:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3967
47
reference_url https://access.redhat.com/errata/RHSA-2019:4056
reference_id RHSA-2019:4056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4056
48
reference_url https://access.redhat.com/errata/RHSA-2019:4057
reference_id RHSA-2019:4057
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4057
49
reference_url https://access.redhat.com/errata/RHSA-2019:4058
reference_id RHSA-2019:4058
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4058
50
reference_url https://access.redhat.com/errata/RHSA-2019:4159
reference_id RHSA-2019:4159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4159
51
reference_url https://access.redhat.com/errata/RHSA-2019:4164
reference_id RHSA-2019:4164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4164
52
reference_url https://access.redhat.com/errata/RHSA-2019:4255
reference_id RHSA-2019:4255
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4255
53
reference_url https://access.redhat.com/errata/RHSA-2020:0204
reference_id RHSA-2020:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0204
fixed_packages
aliases CVE-2019-5489
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fk54-8rrc-ekc2
19
url VCID-h2h4-ypwg-rbh8
vulnerability_id VCID-h2h4-ypwg-rbh8
summary kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3460.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3460.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-3460
reference_id
reference_type
scores
0
value 0.00465
scoring_system epss
scoring_elements 0.64267
published_at 2026-04-01T12:55:00Z
1
value 0.00465
scoring_system epss
scoring_elements 0.64416
published_at 2026-04-29T12:55:00Z
2
value 0.00465
scoring_system epss
scoring_elements 0.64381
published_at 2026-04-16T12:55:00Z
3
value 0.00465
scoring_system epss
scoring_elements 0.64392
published_at 2026-04-18T12:55:00Z
4
value 0.00465
scoring_system epss
scoring_elements 0.64383
published_at 2026-04-21T12:55:00Z
5
value 0.00465
scoring_system epss
scoring_elements 0.64403
published_at 2026-04-24T12:55:00Z
6
value 0.00465
scoring_system epss
scoring_elements 0.64325
published_at 2026-04-02T12:55:00Z
7
value 0.00465
scoring_system epss
scoring_elements 0.64353
published_at 2026-04-04T12:55:00Z
8
value 0.00465
scoring_system epss
scoring_elements 0.64311
published_at 2026-04-07T12:55:00Z
9
value 0.00465
scoring_system epss
scoring_elements 0.64359
published_at 2026-04-08T12:55:00Z
10
value 0.00465
scoring_system epss
scoring_elements 0.64374
published_at 2026-04-12T12:55:00Z
11
value 0.00465
scoring_system epss
scoring_elements 0.64386
published_at 2026-04-11T12:55:00Z
12
value 0.00465
scoring_system epss
scoring_elements 0.64345
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-3460
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3460
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3460
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/linus/af3d5d1c87664a4f150fcf3534c6567cb19909b0
reference_id
reference_type
scores
url https://git.kernel.org/linus/af3d5d1c87664a4f150fcf3534c6567cb19909b0
5
reference_url https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html
6
reference_url https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html
7
reference_url https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html
8
reference_url https://lore.kernel.org/linux-bluetooth/20190110062917.GB15047%40kroah.com/
reference_id
reference_type
scores
url https://lore.kernel.org/linux-bluetooth/20190110062917.GB15047%40kroah.com/
9
reference_url https://marc.info/?l=oss-security&m=154721580222522&w=2
reference_id
reference_type
scores
url https://marc.info/?l=oss-security&m=154721580222522&w=2
10
reference_url https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3460.html
reference_id
reference_type
scores
url https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3460.html
11
reference_url http://www.openwall.com/lists/oss-security/2019/06/27/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/06/27/2
12
reference_url http://www.openwall.com/lists/oss-security/2019/06/27/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/06/27/7
13
reference_url http://www.openwall.com/lists/oss-security/2019/06/28/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/06/28/1
14
reference_url http://www.openwall.com/lists/oss-security/2019/06/28/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/06/28/2
15
reference_url http://www.openwall.com/lists/oss-security/2019/08/12/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/08/12/1
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1663179
reference_id 1663179
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1663179
17
reference_url https://security.archlinux.org/AVG-988
reference_id AVG-988
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-988
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-3460
reference_id CVE-2019-3460
reference_type
scores
0
value 3.3
scoring_system cvssv2
scoring_elements AV:A/AC:L/Au:N/C:P/I:N/A:N
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-3460
46
reference_url https://access.redhat.com/errata/RHSA-2019:2029
reference_id RHSA-2019:2029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2029
47
reference_url https://access.redhat.com/errata/RHSA-2019:2043
reference_id RHSA-2019:2043
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2043
48
reference_url https://access.redhat.com/errata/RHSA-2019:3309
reference_id RHSA-2019:3309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3309
49
reference_url https://access.redhat.com/errata/RHSA-2019:3517
reference_id RHSA-2019:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3517
50
reference_url https://access.redhat.com/errata/RHSA-2020:0740
reference_id RHSA-2020:0740
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0740
51
reference_url https://usn.ubuntu.com/3930-1/
reference_id USN-3930-1
reference_type
scores
url https://usn.ubuntu.com/3930-1/
52
reference_url https://usn.ubuntu.com/3930-2/
reference_id USN-3930-2
reference_type
scores
url https://usn.ubuntu.com/3930-2/
53
reference_url https://usn.ubuntu.com/3931-1/
reference_id USN-3931-1
reference_type
scores
url https://usn.ubuntu.com/3931-1/
54
reference_url https://usn.ubuntu.com/3931-2/
reference_id USN-3931-2
reference_type
scores
url https://usn.ubuntu.com/3931-2/
55
reference_url https://usn.ubuntu.com/3932-1/
reference_id USN-3932-1
reference_type
scores
url https://usn.ubuntu.com/3932-1/
56
reference_url https://usn.ubuntu.com/3932-2/
reference_id USN-3932-2
reference_type
scores
url https://usn.ubuntu.com/3932-2/
57
reference_url https://usn.ubuntu.com/3933-1/
reference_id USN-3933-1
reference_type
scores
url https://usn.ubuntu.com/3933-1/
58
reference_url https://usn.ubuntu.com/3933-2/
reference_id USN-3933-2
reference_type
scores
url https://usn.ubuntu.com/3933-2/
fixed_packages
aliases CVE-2019-3460
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h2h4-ypwg-rbh8
20
url VCID-h9yg-sv8b-mkhf
vulnerability_id VCID-h9yg-sv8b-mkhf
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11599.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11599.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11599
reference_id
reference_type
scores
0
value 0.00549
scoring_system epss
scoring_elements 0.67862
published_at 2026-04-01T12:55:00Z
1
value 0.00549
scoring_system epss
scoring_elements 0.67885
published_at 2026-04-02T12:55:00Z
2
value 0.00549
scoring_system epss
scoring_elements 0.67904
published_at 2026-04-04T12:55:00Z
3
value 0.00549
scoring_system epss
scoring_elements 0.67884
published_at 2026-04-07T12:55:00Z
4
value 0.00549
scoring_system epss
scoring_elements 0.67934
published_at 2026-04-08T12:55:00Z
5
value 0.00549
scoring_system epss
scoring_elements 0.67948
published_at 2026-04-09T12:55:00Z
6
value 0.00549
scoring_system epss
scoring_elements 0.67972
published_at 2026-04-11T12:55:00Z
7
value 0.00549
scoring_system epss
scoring_elements 0.67959
published_at 2026-04-12T12:55:00Z
8
value 0.00549
scoring_system epss
scoring_elements 0.67923
published_at 2026-04-13T12:55:00Z
9
value 0.00549
scoring_system epss
scoring_elements 0.6796
published_at 2026-04-16T12:55:00Z
10
value 0.00549
scoring_system epss
scoring_elements 0.67974
published_at 2026-04-18T12:55:00Z
11
value 0.00549
scoring_system epss
scoring_elements 0.67955
published_at 2026-04-21T12:55:00Z
12
value 0.00549
scoring_system epss
scoring_elements 0.68
published_at 2026-04-24T12:55:00Z
13
value 0.00549
scoring_system epss
scoring_elements 0.68008
published_at 2026-04-26T12:55:00Z
14
value 0.00549
scoring_system epss
scoring_elements 0.68014
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11599
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10126
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10126
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11486
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11599
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11815
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11833
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11884
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3846
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5489
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9500
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9503
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1705937
reference_id 1705937
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1705937
17
reference_url https://bugs.chromium.org/p/project-zero/issues/detail?id=1790
reference_id CVE-2019-11599
reference_type exploit
scores
url https://bugs.chromium.org/p/project-zero/issues/detail?id=1790
18
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/46781.txt
reference_id CVE-2019-11599
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/46781.txt
19
reference_url https://access.redhat.com/errata/RHSA-2019:2029
reference_id RHSA-2019:2029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2029
20
reference_url https://access.redhat.com/errata/RHSA-2019:2043
reference_id RHSA-2019:2043
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2043
21
reference_url https://access.redhat.com/errata/RHSA-2019:3309
reference_id RHSA-2019:3309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3309
22
reference_url https://access.redhat.com/errata/RHSA-2019:3517
reference_id RHSA-2019:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3517
23
reference_url https://access.redhat.com/errata/RHSA-2020:0100
reference_id RHSA-2020:0100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0100
24
reference_url https://access.redhat.com/errata/RHSA-2020:0103
reference_id RHSA-2020:0103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0103
25
reference_url https://access.redhat.com/errata/RHSA-2020:0179
reference_id RHSA-2020:0179
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0179
26
reference_url https://access.redhat.com/errata/RHSA-2020:0543
reference_id RHSA-2020:0543
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0543
27
reference_url https://usn.ubuntu.com/4069-1/
reference_id USN-4069-1
reference_type
scores
url https://usn.ubuntu.com/4069-1/
28
reference_url https://usn.ubuntu.com/4069-2/
reference_id USN-4069-2
reference_type
scores
url https://usn.ubuntu.com/4069-2/
29
reference_url https://usn.ubuntu.com/4095-1/
reference_id USN-4095-1
reference_type
scores
url https://usn.ubuntu.com/4095-1/
30
reference_url https://usn.ubuntu.com/4115-1/
reference_id USN-4115-1
reference_type
scores
url https://usn.ubuntu.com/4115-1/
31
reference_url https://usn.ubuntu.com/4118-1/
reference_id USN-4118-1
reference_type
scores
url https://usn.ubuntu.com/4118-1/
fixed_packages
aliases CVE-2019-11599
risk_score 10.0
exploitability 2.0
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h9yg-sv8b-mkhf
21
url VCID-hmp6-1pt2-3udk
vulnerability_id VCID-hmp6-1pt2-3udk
summary kernel: use-after-free in arch/x86/lib/insn-eval.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-13233.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-13233.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-13233
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16319
published_at 2026-04-29T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16471
published_at 2026-04-21T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16365
published_at 2026-04-24T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16363
published_at 2026-04-26T12:55:00Z
4
value 0.00054
scoring_system epss
scoring_elements 0.17025
published_at 2026-04-04T12:55:00Z
5
value 0.00054
scoring_system epss
scoring_elements 0.16896
published_at 2026-04-08T12:55:00Z
6
value 0.00054
scoring_system epss
scoring_elements 0.16954
published_at 2026-04-09T12:55:00Z
7
value 0.00054
scoring_system epss
scoring_elements 0.16928
published_at 2026-04-11T12:55:00Z
8
value 0.00054
scoring_system epss
scoring_elements 0.16882
published_at 2026-04-12T12:55:00Z
9
value 0.00054
scoring_system epss
scoring_elements 0.16824
published_at 2026-04-13T12:55:00Z
10
value 0.00054
scoring_system epss
scoring_elements 0.16758
published_at 2026-04-16T12:55:00Z
11
value 0.00054
scoring_system epss
scoring_elements 0.16764
published_at 2026-04-18T12:55:00Z
12
value 0.00054
scoring_system epss
scoring_elements 0.16801
published_at 2026-04-01T12:55:00Z
13
value 0.00054
scoring_system epss
scoring_elements 0.16807
published_at 2026-04-07T12:55:00Z
14
value 0.00054
scoring_system epss
scoring_elements 0.16969
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-13233
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12817
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12984
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13233
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13233
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1999
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1727756
reference_id 1727756
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1727756
16
reference_url https://access.redhat.com/errata/RHSA-2019:3309
reference_id RHSA-2019:3309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3309
17
reference_url https://access.redhat.com/errata/RHSA-2019:3517
reference_id RHSA-2019:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3517
18
reference_url https://access.redhat.com/errata/RHSA-2020:1016
reference_id RHSA-2020:1016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1016
19
reference_url https://access.redhat.com/errata/RHSA-2020:1070
reference_id RHSA-2020:1070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1070
20
reference_url https://access.redhat.com/errata/RHSA-2020:2522
reference_id RHSA-2020:2522
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2522
21
reference_url https://access.redhat.com/errata/RHSA-2020:2851
reference_id RHSA-2020:2851
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2851
22
reference_url https://usn.ubuntu.com/4093-1/
reference_id USN-4093-1
reference_type
scores
url https://usn.ubuntu.com/4093-1/
23
reference_url https://usn.ubuntu.com/4094-1/
reference_id USN-4094-1
reference_type
scores
url https://usn.ubuntu.com/4094-1/
24
reference_url https://usn.ubuntu.com/4117-1/
reference_id USN-4117-1
reference_type
scores
url https://usn.ubuntu.com/4117-1/
25
reference_url https://usn.ubuntu.com/4118-1/
reference_id USN-4118-1
reference_type
scores
url https://usn.ubuntu.com/4118-1/
fixed_packages
aliases CVE-2019-13233
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hmp6-1pt2-3udk
22
url VCID-jqvb-tqv1-dfe5
vulnerability_id VCID-jqvb-tqv1-dfe5
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11884.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11884.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11884
reference_id
reference_type
scores
0
value 0.00048
scoring_system epss
scoring_elements 0.14775
published_at 2026-04-01T12:55:00Z
1
value 0.00048
scoring_system epss
scoring_elements 0.14825
published_at 2026-04-02T12:55:00Z
2
value 0.00048
scoring_system epss
scoring_elements 0.14904
published_at 2026-04-04T12:55:00Z
3
value 0.00048
scoring_system epss
scoring_elements 0.14705
published_at 2026-04-07T12:55:00Z
4
value 0.00048
scoring_system epss
scoring_elements 0.14796
published_at 2026-04-08T12:55:00Z
5
value 0.00048
scoring_system epss
scoring_elements 0.14856
published_at 2026-04-09T12:55:00Z
6
value 0.00048
scoring_system epss
scoring_elements 0.14813
published_at 2026-04-11T12:55:00Z
7
value 0.00048
scoring_system epss
scoring_elements 0.14776
published_at 2026-04-12T12:55:00Z
8
value 0.00048
scoring_system epss
scoring_elements 0.1472
published_at 2026-04-13T12:55:00Z
9
value 0.00048
scoring_system epss
scoring_elements 0.14614
published_at 2026-04-16T12:55:00Z
10
value 0.00048
scoring_system epss
scoring_elements 0.14621
published_at 2026-04-18T12:55:00Z
11
value 0.00048
scoring_system epss
scoring_elements 0.14684
published_at 2026-04-21T12:55:00Z
12
value 0.00048
scoring_system epss
scoring_elements 0.14715
published_at 2026-04-24T12:55:00Z
13
value 0.00048
scoring_system epss
scoring_elements 0.14714
published_at 2026-04-26T12:55:00Z
14
value 0.00048
scoring_system epss
scoring_elements 0.1465
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11884
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10126
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10126
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11486
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11599
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11815
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11833
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11884
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3846
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5489
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9500
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9503
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1709837
reference_id 1709837
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1709837
17
reference_url https://access.redhat.com/errata/RHSA-2019:3309
reference_id RHSA-2019:3309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3309
18
reference_url https://access.redhat.com/errata/RHSA-2019:3517
reference_id RHSA-2019:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3517
19
reference_url https://access.redhat.com/errata/RHSA-2020:0740
reference_id RHSA-2020:0740
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0740
20
reference_url https://access.redhat.com/errata/RHSA-2020:1016
reference_id RHSA-2020:1016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1016
21
reference_url https://access.redhat.com/errata/RHSA-2020:1070
reference_id RHSA-2020:1070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1070
22
reference_url https://usn.ubuntu.com/4068-1/
reference_id USN-4068-1
reference_type
scores
url https://usn.ubuntu.com/4068-1/
23
reference_url https://usn.ubuntu.com/4068-2/
reference_id USN-4068-2
reference_type
scores
url https://usn.ubuntu.com/4068-2/
24
reference_url https://usn.ubuntu.com/4069-1/
reference_id USN-4069-1
reference_type
scores
url https://usn.ubuntu.com/4069-1/
25
reference_url https://usn.ubuntu.com/4069-2/
reference_id USN-4069-2
reference_type
scores
url https://usn.ubuntu.com/4069-2/
26
reference_url https://usn.ubuntu.com/4076-1/
reference_id USN-4076-1
reference_type
scores
url https://usn.ubuntu.com/4076-1/
27
reference_url https://usn.ubuntu.com/4118-1/
reference_id USN-4118-1
reference_type
scores
url https://usn.ubuntu.com/4118-1/
fixed_packages
aliases CVE-2019-11884
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jqvb-tqv1-dfe5
23
url VCID-jv35-tmzb-tuag
vulnerability_id VCID-jv35-tmzb-tuag
summary kernel: out-of-bounds array access in __xfrm_policy_unlink
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15666.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15666.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-15666
reference_id
reference_type
scores
0
value 0.05225
scoring_system epss
scoring_elements 0.89911
published_at 2026-04-01T12:55:00Z
1
value 0.05225
scoring_system epss
scoring_elements 0.89979
published_at 2026-04-29T12:55:00Z
2
value 0.05225
scoring_system epss
scoring_elements 0.89964
published_at 2026-04-21T12:55:00Z
3
value 0.05225
scoring_system epss
scoring_elements 0.89981
published_at 2026-04-24T12:55:00Z
4
value 0.05225
scoring_system epss
scoring_elements 0.8998
published_at 2026-04-26T12:55:00Z
5
value 0.05225
scoring_system epss
scoring_elements 0.89915
published_at 2026-04-02T12:55:00Z
6
value 0.05225
scoring_system epss
scoring_elements 0.89927
published_at 2026-04-04T12:55:00Z
7
value 0.05225
scoring_system epss
scoring_elements 0.89933
published_at 2026-04-07T12:55:00Z
8
value 0.05225
scoring_system epss
scoring_elements 0.89949
published_at 2026-04-08T12:55:00Z
9
value 0.05225
scoring_system epss
scoring_elements 0.89955
published_at 2026-04-09T12:55:00Z
10
value 0.05225
scoring_system epss
scoring_elements 0.89963
published_at 2026-04-11T12:55:00Z
11
value 0.05225
scoring_system epss
scoring_elements 0.89961
published_at 2026-04-12T12:55:00Z
12
value 0.05225
scoring_system epss
scoring_elements 0.89954
published_at 2026-04-13T12:55:00Z
13
value 0.05225
scoring_system epss
scoring_elements 0.89967
published_at 2026-04-16T12:55:00Z
14
value 0.05225
scoring_system epss
scoring_elements 0.89968
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-15666
4
reference_url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.19
reference_id
reference_type
scores
url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.19
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15666
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b805d78d300bcf2c83d6df7da0c818b0fee41427
reference_id
reference_type
scores
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b805d78d300bcf2c83d6df7da0c818b0fee41427
8
reference_url https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html
9
reference_url https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html
10
reference_url https://security.netapp.com/advisory/ntap-20191004-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20191004-0001/
11
reference_url https://support.f5.com/csp/article/K53420251?utm_source=f5support&amp%3Butm_medium=RSS
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K53420251?utm_source=f5support&amp%3Butm_medium=RSS
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1747334
reference_id 1747334
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1747334
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-15666
reference_id CVE-2019-15666
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-15666
18
reference_url https://access.redhat.com/errata/RHSA-2019:3309
reference_id RHSA-2019:3309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3309
19
reference_url https://access.redhat.com/errata/RHSA-2019:3517
reference_id RHSA-2019:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3517
20
reference_url https://access.redhat.com/errata/RHSA-2020:1493
reference_id RHSA-2020:1493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1493
fixed_packages
aliases CVE-2019-15666
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jv35-tmzb-tuag
24
url VCID-kecy-99uv-fqdy
vulnerability_id VCID-kecy-99uv-fqdy
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14821.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14821.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-14821
reference_id
reference_type
scores
0
value 0.0008
scoring_system epss
scoring_elements 0.23799
published_at 2026-04-02T12:55:00Z
1
value 0.0008
scoring_system epss
scoring_elements 0.23839
published_at 2026-04-04T12:55:00Z
2
value 0.0008
scoring_system epss
scoring_elements 0.23615
published_at 2026-04-07T12:55:00Z
3
value 0.0008
scoring_system epss
scoring_elements 0.23685
published_at 2026-04-08T12:55:00Z
4
value 0.0008
scoring_system epss
scoring_elements 0.23731
published_at 2026-04-09T12:55:00Z
5
value 0.0008
scoring_system epss
scoring_elements 0.23683
published_at 2026-04-01T12:55:00Z
6
value 0.00106
scoring_system epss
scoring_elements 0.28612
published_at 2026-04-24T12:55:00Z
7
value 0.00106
scoring_system epss
scoring_elements 0.28499
published_at 2026-04-26T12:55:00Z
8
value 0.00106
scoring_system epss
scoring_elements 0.28425
published_at 2026-04-29T12:55:00Z
9
value 0.00106
scoring_system epss
scoring_elements 0.28873
published_at 2026-04-11T12:55:00Z
10
value 0.00106
scoring_system epss
scoring_elements 0.28828
published_at 2026-04-12T12:55:00Z
11
value 0.00106
scoring_system epss
scoring_elements 0.28779
published_at 2026-04-13T12:55:00Z
12
value 0.00106
scoring_system epss
scoring_elements 0.28798
published_at 2026-04-16T12:55:00Z
13
value 0.00106
scoring_system epss
scoring_elements 0.28775
published_at 2026-04-18T12:55:00Z
14
value 0.00106
scoring_system epss
scoring_elements 0.28726
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-14821
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14821
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14821
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14835
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15117
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15117
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15118
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15902
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15902
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1746708
reference_id 1746708
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1746708
9
reference_url https://access.redhat.com/errata/RHSA-2019:3309
reference_id RHSA-2019:3309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3309
10
reference_url https://access.redhat.com/errata/RHSA-2019:3517
reference_id RHSA-2019:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3517
11
reference_url https://access.redhat.com/errata/RHSA-2019:3978
reference_id RHSA-2019:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3978
12
reference_url https://access.redhat.com/errata/RHSA-2019:3979
reference_id RHSA-2019:3979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3979
13
reference_url https://access.redhat.com/errata/RHSA-2019:4154
reference_id RHSA-2019:4154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4154
14
reference_url https://access.redhat.com/errata/RHSA-2019:4256
reference_id RHSA-2019:4256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4256
15
reference_url https://access.redhat.com/errata/RHSA-2020:0027
reference_id RHSA-2020:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0027
16
reference_url https://access.redhat.com/errata/RHSA-2020:0204
reference_id RHSA-2020:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0204
17
reference_url https://access.redhat.com/errata/RHSA-2020:2851
reference_id RHSA-2020:2851
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2851
18
reference_url https://usn.ubuntu.com/4157-1/
reference_id USN-4157-1
reference_type
scores
url https://usn.ubuntu.com/4157-1/
19
reference_url https://usn.ubuntu.com/4157-2/
reference_id USN-4157-2
reference_type
scores
url https://usn.ubuntu.com/4157-2/
20
reference_url https://usn.ubuntu.com/4162-1/
reference_id USN-4162-1
reference_type
scores
url https://usn.ubuntu.com/4162-1/
21
reference_url https://usn.ubuntu.com/4162-2/
reference_id USN-4162-2
reference_type
scores
url https://usn.ubuntu.com/4162-2/
22
reference_url https://usn.ubuntu.com/4163-1/
reference_id USN-4163-1
reference_type
scores
url https://usn.ubuntu.com/4163-1/
23
reference_url https://usn.ubuntu.com/4163-2/
reference_id USN-4163-2
reference_type
scores
url https://usn.ubuntu.com/4163-2/
fixed_packages
aliases CVE-2019-14821
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kecy-99uv-fqdy
25
url VCID-nqb6-zp72-1bdz
vulnerability_id VCID-nqb6-zp72-1bdz
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1593.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1593.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-1593
reference_id
reference_type
scores
0
value 0.01966
scoring_system epss
scoring_elements 0.83456
published_at 2026-04-01T12:55:00Z
1
value 0.01966
scoring_system epss
scoring_elements 0.83469
published_at 2026-04-02T12:55:00Z
2
value 0.01966
scoring_system epss
scoring_elements 0.83483
published_at 2026-04-04T12:55:00Z
3
value 0.01966
scoring_system epss
scoring_elements 0.83482
published_at 2026-04-07T12:55:00Z
4
value 0.01966
scoring_system epss
scoring_elements 0.83506
published_at 2026-04-08T12:55:00Z
5
value 0.01966
scoring_system epss
scoring_elements 0.83516
published_at 2026-04-09T12:55:00Z
6
value 0.01966
scoring_system epss
scoring_elements 0.8353
published_at 2026-04-11T12:55:00Z
7
value 0.01966
scoring_system epss
scoring_elements 0.83524
published_at 2026-04-12T12:55:00Z
8
value 0.01966
scoring_system epss
scoring_elements 0.83521
published_at 2026-04-13T12:55:00Z
9
value 0.01966
scoring_system epss
scoring_elements 0.83555
published_at 2026-04-16T12:55:00Z
10
value 0.01966
scoring_system epss
scoring_elements 0.83557
published_at 2026-04-18T12:55:00Z
11
value 0.01966
scoring_system epss
scoring_elements 0.83558
published_at 2026-04-21T12:55:00Z
12
value 0.01966
scoring_system epss
scoring_elements 0.83581
published_at 2026-04-24T12:55:00Z
13
value 0.01966
scoring_system epss
scoring_elements 0.83589
published_at 2026-04-26T12:55:00Z
14
value 0.01966
scoring_system epss
scoring_elements 0.83593
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-1593
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7421
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7822
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8160
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8160
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8559
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9585
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9644
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9683
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9683
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0239
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0239
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1420
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1420
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1421
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1593
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1192519
reference_id 1192519
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1192519
14
reference_url https://access.redhat.com/errata/RHSA-2015:1137
reference_id RHSA-2015:1137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1137
15
reference_url https://access.redhat.com/errata/RHSA-2015:1138
reference_id RHSA-2015:1138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1138
16
reference_url https://access.redhat.com/errata/RHSA-2015:1139
reference_id RHSA-2015:1139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1139
17
reference_url https://access.redhat.com/errata/RHSA-2015:1221
reference_id RHSA-2015:1221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1221
18
reference_url https://access.redhat.com/errata/RHSA-2019:3517
reference_id RHSA-2019:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3517
19
reference_url https://usn.ubuntu.com/2560-1/
reference_id USN-2560-1
reference_type
scores
url https://usn.ubuntu.com/2560-1/
20
reference_url https://usn.ubuntu.com/2561-1/
reference_id USN-2561-1
reference_type
scores
url https://usn.ubuntu.com/2561-1/
21
reference_url https://usn.ubuntu.com/2562-1/
reference_id USN-2562-1
reference_type
scores
url https://usn.ubuntu.com/2562-1/
22
reference_url https://usn.ubuntu.com/2563-1/
reference_id USN-2563-1
reference_type
scores
url https://usn.ubuntu.com/2563-1/
23
reference_url https://usn.ubuntu.com/2564-1/
reference_id USN-2564-1
reference_type
scores
url https://usn.ubuntu.com/2564-1/
24
reference_url https://usn.ubuntu.com/2565-1/
reference_id USN-2565-1
reference_type
scores
url https://usn.ubuntu.com/2565-1/
fixed_packages
aliases CVE-2015-1593
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nqb6-zp72-1bdz
26
url VCID-ns4n-ng6b-ufaf
vulnerability_id VCID-ns4n-ng6b-ufaf
summary kernel: memory leak in genl_register_family() in net/netlink/genetlink.c
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15921.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15921.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-15921
reference_id
reference_type
scores
0
value 0.00073
scoring_system epss
scoring_elements 0.22004
published_at 2026-04-01T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.21828
published_at 2026-04-29T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.21994
published_at 2026-04-21T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.21853
published_at 2026-04-24T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.21841
published_at 2026-04-26T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22162
published_at 2026-04-02T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.22211
published_at 2026-04-04T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.21995
published_at 2026-04-07T12:55:00Z
8
value 0.00073
scoring_system epss
scoring_elements 0.22076
published_at 2026-04-08T12:55:00Z
9
value 0.00073
scoring_system epss
scoring_elements 0.22132
published_at 2026-04-09T12:55:00Z
10
value 0.00073
scoring_system epss
scoring_elements 0.2215
published_at 2026-04-11T12:55:00Z
11
value 0.00073
scoring_system epss
scoring_elements 0.22109
published_at 2026-04-12T12:55:00Z
12
value 0.00073
scoring_system epss
scoring_elements 0.22049
published_at 2026-04-13T12:55:00Z
13
value 0.00073
scoring_system epss
scoring_elements 0.22047
published_at 2026-04-16T12:55:00Z
14
value 0.00073
scoring_system epss
scoring_elements 0.2204
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-15921
4
reference_url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.6
reference_id
reference_type
scores
url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.6
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15921
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://github.com/torvalds/linux/commit/ceabee6c59943bdd5e1da1a6a20dc7ee5f8113a2
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/ceabee6c59943bdd5e1da1a6a20dc7ee5f8113a2
8
reference_url https://security.netapp.com/advisory/ntap-20191004-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20191004-0001/
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1760958
reference_id 1760958
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1760958
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-15921
reference_id CVE-2019-15921
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
1
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-15921
14
reference_url https://access.redhat.com/errata/RHSA-2019:3309
reference_id RHSA-2019:3309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3309
15
reference_url https://access.redhat.com/errata/RHSA-2019:3517
reference_id RHSA-2019:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3517
fixed_packages
aliases CVE-2019-15921
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ns4n-ng6b-ufaf
27
url VCID-p64t-t6cs-rud3
vulnerability_id VCID-p64t-t6cs-rud3
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3900.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3900.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-3900
reference_id
reference_type
scores
0
value 0.00206
scoring_system epss
scoring_elements 0.42914
published_at 2026-04-01T12:55:00Z
1
value 0.00206
scoring_system epss
scoring_elements 0.42983
published_at 2026-04-02T12:55:00Z
2
value 0.00206
scoring_system epss
scoring_elements 0.4301
published_at 2026-04-04T12:55:00Z
3
value 0.00206
scoring_system epss
scoring_elements 0.42947
published_at 2026-04-07T12:55:00Z
4
value 0.00206
scoring_system epss
scoring_elements 0.42997
published_at 2026-04-12T12:55:00Z
5
value 0.00206
scoring_system epss
scoring_elements 0.43009
published_at 2026-04-09T12:55:00Z
6
value 0.00206
scoring_system epss
scoring_elements 0.43031
published_at 2026-04-11T12:55:00Z
7
value 0.00206
scoring_system epss
scoring_elements 0.4298
published_at 2026-04-13T12:55:00Z
8
value 0.00206
scoring_system epss
scoring_elements 0.4304
published_at 2026-04-16T12:55:00Z
9
value 0.00206
scoring_system epss
scoring_elements 0.43027
published_at 2026-04-18T12:55:00Z
10
value 0.00206
scoring_system epss
scoring_elements 0.42964
published_at 2026-04-21T12:55:00Z
11
value 0.00206
scoring_system epss
scoring_elements 0.42888
published_at 2026-04-24T12:55:00Z
12
value 0.00206
scoring_system epss
scoring_elements 0.42889
published_at 2026-04-26T12:55:00Z
13
value 0.00206
scoring_system epss
scoring_elements 0.42806
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-3900
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8553
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18509
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20856
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5995
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10639
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10639
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15239
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15239
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3882
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3900
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1698757
reference_id 1698757
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1698757
20
reference_url https://access.redhat.com/errata/RHSA-2019:1973
reference_id RHSA-2019:1973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1973
21
reference_url https://access.redhat.com/errata/RHSA-2019:2029
reference_id RHSA-2019:2029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2029
22
reference_url https://access.redhat.com/errata/RHSA-2019:2043
reference_id RHSA-2019:2043
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2043
23
reference_url https://access.redhat.com/errata/RHSA-2019:3220
reference_id RHSA-2019:3220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3220
24
reference_url https://access.redhat.com/errata/RHSA-2019:3309
reference_id RHSA-2019:3309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3309
25
reference_url https://access.redhat.com/errata/RHSA-2019:3517
reference_id RHSA-2019:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3517
26
reference_url https://access.redhat.com/errata/RHSA-2019:3836
reference_id RHSA-2019:3836
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3836
27
reference_url https://access.redhat.com/errata/RHSA-2019:3967
reference_id RHSA-2019:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3967
28
reference_url https://access.redhat.com/errata/RHSA-2019:4058
reference_id RHSA-2019:4058
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4058
29
reference_url https://access.redhat.com/errata/RHSA-2020:0204
reference_id RHSA-2020:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0204
30
reference_url https://usn.ubuntu.com/4114-1/
reference_id USN-4114-1
reference_type
scores
url https://usn.ubuntu.com/4114-1/
31
reference_url https://usn.ubuntu.com/4115-1/
reference_id USN-4115-1
reference_type
scores
url https://usn.ubuntu.com/4115-1/
32
reference_url https://usn.ubuntu.com/4116-1/
reference_id USN-4116-1
reference_type
scores
url https://usn.ubuntu.com/4116-1/
33
reference_url https://usn.ubuntu.com/4117-1/
reference_id USN-4117-1
reference_type
scores
url https://usn.ubuntu.com/4117-1/
34
reference_url https://usn.ubuntu.com/4118-1/
reference_id USN-4118-1
reference_type
scores
url https://usn.ubuntu.com/4118-1/
fixed_packages
aliases CVE-2019-3900
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p64t-t6cs-rud3
28
url VCID-qbax-4n63-jqbk
vulnerability_id VCID-qbax-4n63-jqbk
summary kernel: use-after-free in sound/core/init.c and sound/core/info.c
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15214.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15214.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-15214
reference_id
reference_type
scores
0
value 0.00084
scoring_system epss
scoring_elements 0.24561
published_at 2026-04-01T12:55:00Z
1
value 0.00084
scoring_system epss
scoring_elements 0.24344
published_at 2026-04-29T12:55:00Z
2
value 0.00084
scoring_system epss
scoring_elements 0.24462
published_at 2026-04-21T12:55:00Z
3
value 0.00084
scoring_system epss
scoring_elements 0.24401
published_at 2026-04-24T12:55:00Z
4
value 0.00084
scoring_system epss
scoring_elements 0.24386
published_at 2026-04-26T12:55:00Z
5
value 0.00084
scoring_system epss
scoring_elements 0.24639
published_at 2026-04-02T12:55:00Z
6
value 0.00084
scoring_system epss
scoring_elements 0.24676
published_at 2026-04-04T12:55:00Z
7
value 0.00084
scoring_system epss
scoring_elements 0.24448
published_at 2026-04-07T12:55:00Z
8
value 0.00084
scoring_system epss
scoring_elements 0.24516
published_at 2026-04-08T12:55:00Z
9
value 0.00084
scoring_system epss
scoring_elements 0.2456
published_at 2026-04-09T12:55:00Z
10
value 0.00084
scoring_system epss
scoring_elements 0.24576
published_at 2026-04-11T12:55:00Z
11
value 0.00084
scoring_system epss
scoring_elements 0.24533
published_at 2026-04-12T12:55:00Z
12
value 0.00084
scoring_system epss
scoring_elements 0.24478
published_at 2026-04-13T12:55:00Z
13
value 0.00084
scoring_system epss
scoring_elements 0.24492
published_at 2026-04-16T12:55:00Z
14
value 0.00084
scoring_system epss
scoring_elements 0.24487
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-15214
4
reference_url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.10
reference_id
reference_type
scores
url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.10
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15214
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15214
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2a3f7221acddfe1caa9ff09b3a8158c39b2fdeac
reference_id
reference_type
scores
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2a3f7221acddfe1caa9ff09b3a8158c39b2fdeac
8
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c2f870890fd28e023b0fcf49dcee333f2c8bad7
reference_id
reference_type
scores
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c2f870890fd28e023b0fcf49dcee333f2c8bad7
9
reference_url https://security.netapp.com/advisory/ntap-20190905-0002/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190905-0002/
10
reference_url https://syzkaller.appspot.com/bug?id=75903e0021cef79bc434d068b5169b599b2a46a9
reference_id
reference_type
scores
url https://syzkaller.appspot.com/bug?id=75903e0021cef79bc434d068b5169b599b2a46a9
11
reference_url http://www.openwall.com/lists/oss-security/2019/08/20/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/08/20/2
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1743591
reference_id 1743591
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1743591
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-15214
reference_id CVE-2019-15214
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
1
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-15214
19
reference_url https://access.redhat.com/errata/RHSA-2019:3517
reference_id RHSA-2019:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3517
20
reference_url https://access.redhat.com/errata/RHSA-2020:1016
reference_id RHSA-2020:1016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1016
21
reference_url https://usn.ubuntu.com/4115-1/
reference_id USN-4115-1
reference_type
scores
url https://usn.ubuntu.com/4115-1/
22
reference_url https://usn.ubuntu.com/4118-1/
reference_id USN-4118-1
reference_type
scores
url https://usn.ubuntu.com/4118-1/
fixed_packages
aliases CVE-2019-15214
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qbax-4n63-jqbk
29
url VCID-r7p3-vgra-17d2
vulnerability_id VCID-r7p3-vgra-17d2
summary kernel: oob memory read in hso_probe in drivers/net/usb/hso.c
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-01/msg00023.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-01/msg00023.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00007.html
2
reference_url http://packetstormsecurity.com/files/151420/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/151420/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19985.json
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19985.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-19985
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.1294
published_at 2026-04-01T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.1278
published_at 2026-04-29T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.12897
published_at 2026-04-21T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.1292
published_at 2026-04-24T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12885
published_at 2026-04-26T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.1303
published_at 2026-04-02T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.13083
published_at 2026-04-04T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.12883
published_at 2026-04-07T12:55:00Z
8
value 0.00042
scoring_system epss
scoring_elements 0.12961
published_at 2026-04-08T12:55:00Z
9
value 0.00042
scoring_system epss
scoring_elements 0.13012
published_at 2026-04-09T12:55:00Z
10
value 0.00042
scoring_system epss
scoring_elements 0.12972
published_at 2026-04-11T12:55:00Z
11
value 0.00042
scoring_system epss
scoring_elements 0.12936
published_at 2026-04-12T12:55:00Z
12
value 0.00042
scoring_system epss
scoring_elements 0.12892
published_at 2026-04-13T12:55:00Z
13
value 0.00042
scoring_system epss
scoring_elements 0.12794
published_at 2026-04-16T12:55:00Z
14
value 0.00042
scoring_system epss
scoring_elements 0.12797
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-19985
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19985
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19985
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://hexhive.epfl.ch/projects/perifuzz/
reference_id
reference_type
scores
url https://hexhive.epfl.ch/projects/perifuzz/
8
reference_url https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
9
reference_url https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
10
reference_url https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html
11
reference_url https://seclists.org/bugtraq/2019/Jan/52
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Jan/52
12
reference_url https://security.netapp.com/advisory/ntap-20190404-0002/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190404-0002/
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1666106
reference_id 1666106
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1666106
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management_node:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:element_software_management_node:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management_node:-:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-19985
reference_id CVE-2018-19985
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 4.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-19985
19
reference_url https://access.redhat.com/errata/RHSA-2019:3309
reference_id RHSA-2019:3309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3309
20
reference_url https://access.redhat.com/errata/RHSA-2019:3517
reference_id RHSA-2019:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3517
21
reference_url https://access.redhat.com/errata/RHSA-2020:1016
reference_id RHSA-2020:1016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1016
22
reference_url https://access.redhat.com/errata/RHSA-2020:1070
reference_id RHSA-2020:1070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1070
23
reference_url https://usn.ubuntu.com/3910-1/
reference_id USN-3910-1
reference_type
scores
url https://usn.ubuntu.com/3910-1/
24
reference_url https://usn.ubuntu.com/3910-2/
reference_id USN-3910-2
reference_type
scores
url https://usn.ubuntu.com/3910-2/
25
reference_url https://usn.ubuntu.com/4115-1/
reference_id USN-4115-1
reference_type
scores
url https://usn.ubuntu.com/4115-1/
26
reference_url https://usn.ubuntu.com/4118-1/
reference_id USN-4118-1
reference_type
scores
url https://usn.ubuntu.com/4118-1/
fixed_packages
aliases CVE-2018-19985
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r7p3-vgra-17d2
30
url VCID-t37c-fdcm-fudm
vulnerability_id VCID-t37c-fdcm-fudm
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10126.json
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10126.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10126
reference_id
reference_type
scores
0
value 0.03158
scoring_system epss
scoring_elements 0.86856
published_at 2026-04-01T12:55:00Z
1
value 0.03158
scoring_system epss
scoring_elements 0.86866
published_at 2026-04-02T12:55:00Z
2
value 0.03158
scoring_system epss
scoring_elements 0.86885
published_at 2026-04-04T12:55:00Z
3
value 0.03158
scoring_system epss
scoring_elements 0.8688
published_at 2026-04-07T12:55:00Z
4
value 0.03158
scoring_system epss
scoring_elements 0.869
published_at 2026-04-08T12:55:00Z
5
value 0.03158
scoring_system epss
scoring_elements 0.86908
published_at 2026-04-09T12:55:00Z
6
value 0.03158
scoring_system epss
scoring_elements 0.86921
published_at 2026-04-11T12:55:00Z
7
value 0.03158
scoring_system epss
scoring_elements 0.86917
published_at 2026-04-12T12:55:00Z
8
value 0.03158
scoring_system epss
scoring_elements 0.86911
published_at 2026-04-13T12:55:00Z
9
value 0.03158
scoring_system epss
scoring_elements 0.86927
published_at 2026-04-16T12:55:00Z
10
value 0.03158
scoring_system epss
scoring_elements 0.86932
published_at 2026-04-21T12:55:00Z
11
value 0.03158
scoring_system epss
scoring_elements 0.86949
published_at 2026-04-24T12:55:00Z
12
value 0.03158
scoring_system epss
scoring_elements 0.86955
published_at 2026-04-26T12:55:00Z
13
value 0.03158
scoring_system epss
scoring_elements 0.86959
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10126
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10126
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10126
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11486
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11599
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11815
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11833
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11884
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3846
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5489
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9500
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9503
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1716992
reference_id 1716992
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1716992
17
reference_url https://access.redhat.com/errata/RHSA-2019:3055
reference_id RHSA-2019:3055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3055
18
reference_url https://access.redhat.com/errata/RHSA-2019:3076
reference_id RHSA-2019:3076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3076
19
reference_url https://access.redhat.com/errata/RHSA-2019:3089
reference_id RHSA-2019:3089
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3089
20
reference_url https://access.redhat.com/errata/RHSA-2019:3309
reference_id RHSA-2019:3309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3309
21
reference_url https://access.redhat.com/errata/RHSA-2019:3517
reference_id RHSA-2019:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3517
22
reference_url https://access.redhat.com/errata/RHSA-2020:0174
reference_id RHSA-2020:0174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0174
23
reference_url https://access.redhat.com/errata/RHSA-2020:0204
reference_id RHSA-2020:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0204
24
reference_url https://access.redhat.com/errata/RHSA-2020:2289
reference_id RHSA-2020:2289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2289
25
reference_url https://usn.ubuntu.com/4093-1/
reference_id USN-4093-1
reference_type
scores
url https://usn.ubuntu.com/4093-1/
26
reference_url https://usn.ubuntu.com/4094-1/
reference_id USN-4094-1
reference_type
scores
url https://usn.ubuntu.com/4094-1/
27
reference_url https://usn.ubuntu.com/4095-1/
reference_id USN-4095-1
reference_type
scores
url https://usn.ubuntu.com/4095-1/
28
reference_url https://usn.ubuntu.com/4095-2/
reference_id USN-4095-2
reference_type
scores
url https://usn.ubuntu.com/4095-2/
29
reference_url https://usn.ubuntu.com/4117-1/
reference_id USN-4117-1
reference_type
scores
url https://usn.ubuntu.com/4117-1/
30
reference_url https://usn.ubuntu.com/4118-1/
reference_id USN-4118-1
reference_type
scores
url https://usn.ubuntu.com/4118-1/
fixed_packages
aliases CVE-2019-10126
risk_score 3.6
exploitability 0.5
weighted_severity 7.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t37c-fdcm-fudm
31
url VCID-tgzq-uucd-uqgt
vulnerability_id VCID-tgzq-uucd-uqgt
summary kernel: out-of-bounds memory accesses in netlabel
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-25160.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-25160.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-25160
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02394
published_at 2026-04-01T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02463
published_at 2026-04-02T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02602
published_at 2026-04-29T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02498
published_at 2026-04-09T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02477
published_at 2026-04-11T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02469
published_at 2026-04-12T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02468
published_at 2026-04-13T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02452
published_at 2026-04-16T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02459
published_at 2026-04-18T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02565
published_at 2026-04-21T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02551
published_at 2026-04-24T12:55:00Z
11
value 0.00014
scoring_system epss
scoring_elements 0.0254
published_at 2026-04-26T12:55:00Z
12
value 0.00014
scoring_system epss
scoring_elements 0.02476
published_at 2026-04-04T12:55:00Z
13
value 0.00014
scoring_system epss
scoring_elements 0.02475
published_at 2026-04-07T12:55:00Z
14
value 0.00014
scoring_system epss
scoring_elements 0.02478
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-25160
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25160
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25160
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/1c973f9c7cc2b3caae93192fdc8ecb3f0b4ac000
reference_id 1c973f9c7cc2b3caae93192fdc8ecb3f0b4ac000
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-27T16:02:54Z/
url https://git.kernel.org/stable/c/1c973f9c7cc2b3caae93192fdc8ecb3f0b4ac000
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2266290
reference_id 2266290
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2266290
6
reference_url https://git.kernel.org/stable/c/5578de4834fe0f2a34fedc7374be691443396d1f
reference_id 5578de4834fe0f2a34fedc7374be691443396d1f
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-27T16:02:54Z/
url https://git.kernel.org/stable/c/5578de4834fe0f2a34fedc7374be691443396d1f
7
reference_url https://git.kernel.org/stable/c/97bc3683c24999ee621d847c9348c75d2fe86272
reference_id 97bc3683c24999ee621d847c9348c75d2fe86272
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-27T16:02:54Z/
url https://git.kernel.org/stable/c/97bc3683c24999ee621d847c9348c75d2fe86272
8
reference_url https://git.kernel.org/stable/c/c61d01faa5550e06794dcf86125ccd325bfad950
reference_id c61d01faa5550e06794dcf86125ccd325bfad950
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-27T16:02:54Z/
url https://git.kernel.org/stable/c/c61d01faa5550e06794dcf86125ccd325bfad950
9
reference_url https://git.kernel.org/stable/c/dc18101f95fa6e815f426316b8b9a5cee28a334e
reference_id dc18101f95fa6e815f426316b8b9a5cee28a334e
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-27T16:02:54Z/
url https://git.kernel.org/stable/c/dc18101f95fa6e815f426316b8b9a5cee28a334e
10
reference_url https://git.kernel.org/stable/c/e3713abc4248aa6bcc11173d754c418b02a62cbb
reference_id e3713abc4248aa6bcc11173d754c418b02a62cbb
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-27T16:02:54Z/
url https://git.kernel.org/stable/c/e3713abc4248aa6bcc11173d754c418b02a62cbb
11
reference_url https://git.kernel.org/stable/c/fbf9578919d6c91100ec63acf2cba641383f6c78
reference_id fbf9578919d6c91100ec63acf2cba641383f6c78
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-27T16:02:54Z/
url https://git.kernel.org/stable/c/fbf9578919d6c91100ec63acf2cba641383f6c78
12
reference_url https://git.kernel.org/stable/c/fcfe700acdc1c72eab231300e82b962bac2b2b2c
reference_id fcfe700acdc1c72eab231300e82b962bac2b2b2c
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-27T16:02:54Z/
url https://git.kernel.org/stable/c/fcfe700acdc1c72eab231300e82b962bac2b2b2c
13
reference_url https://access.redhat.com/errata/RHSA-2019:3517
reference_id RHSA-2019:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3517
fixed_packages
aliases CVE-2019-25160
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tgzq-uucd-uqgt
32
url VCID-uss1-mjb5-fqb4
vulnerability_id VCID-uss1-mjb5-fqb4
summary kernel: usb: missing size check in the __usb_get_extra_descriptor() leading to DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20169.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20169.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20169
reference_id
reference_type
scores
0
value 0.00108
scoring_system epss
scoring_elements 0.2919
published_at 2026-04-11T12:55:00Z
1
value 0.00108
scoring_system epss
scoring_elements 0.29079
published_at 2026-04-07T12:55:00Z
2
value 0.00108
scoring_system epss
scoring_elements 0.29142
published_at 2026-04-08T12:55:00Z
3
value 0.00108
scoring_system epss
scoring_elements 0.29184
published_at 2026-04-09T12:55:00Z
4
value 0.00108
scoring_system epss
scoring_elements 0.29143
published_at 2026-04-12T12:55:00Z
5
value 0.00111
scoring_system epss
scoring_elements 0.29534
published_at 2026-04-01T12:55:00Z
6
value 0.00111
scoring_system epss
scoring_elements 0.2965
published_at 2026-04-04T12:55:00Z
7
value 0.00111
scoring_system epss
scoring_elements 0.29601
published_at 2026-04-02T12:55:00Z
8
value 0.00122
scoring_system epss
scoring_elements 0.31351
published_at 2026-04-13T12:55:00Z
9
value 0.00122
scoring_system epss
scoring_elements 0.31384
published_at 2026-04-16T12:55:00Z
10
value 0.00122
scoring_system epss
scoring_elements 0.31364
published_at 2026-04-18T12:55:00Z
11
value 0.00122
scoring_system epss
scoring_elements 0.31335
published_at 2026-04-21T12:55:00Z
12
value 0.00122
scoring_system epss
scoring_elements 0.31043
published_at 2026-04-26T12:55:00Z
13
value 0.00122
scoring_system epss
scoring_elements 0.30965
published_at 2026-04-29T12:55:00Z
14
value 0.00122
scoring_system epss
scoring_elements 0.31165
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20169
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20169
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1660385
reference_id 1660385
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1660385
5
reference_url https://access.redhat.com/errata/RHSA-2019:3309
reference_id RHSA-2019:3309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3309
6
reference_url https://access.redhat.com/errata/RHSA-2019:3517
reference_id RHSA-2019:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3517
7
reference_url https://access.redhat.com/errata/RHSA-2020:1016
reference_id RHSA-2020:1016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1016
8
reference_url https://access.redhat.com/errata/RHSA-2020:1070
reference_id RHSA-2020:1070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1070
9
reference_url https://access.redhat.com/errata/RHSA-2020:2522
reference_id RHSA-2020:2522
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2522
10
reference_url https://access.redhat.com/errata/RHSA-2020:2770
reference_id RHSA-2020:2770
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2770
11
reference_url https://access.redhat.com/errata/RHSA-2020:2777
reference_id RHSA-2020:2777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2777
12
reference_url https://access.redhat.com/errata/RHSA-2020:2851
reference_id RHSA-2020:2851
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2851
13
reference_url https://usn.ubuntu.com/3879-1/
reference_id USN-3879-1
reference_type
scores
url https://usn.ubuntu.com/3879-1/
14
reference_url https://usn.ubuntu.com/3879-2/
reference_id USN-3879-2
reference_type
scores
url https://usn.ubuntu.com/3879-2/
15
reference_url https://usn.ubuntu.com/4094-1/
reference_id USN-4094-1
reference_type
scores
url https://usn.ubuntu.com/4094-1/
16
reference_url https://usn.ubuntu.com/4118-1/
reference_id USN-4118-1
reference_type
scores
url https://usn.ubuntu.com/4118-1/
fixed_packages
aliases CVE-2018-20169
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uss1-mjb5-fqb4
33
url VCID-v5rq-g6e5-jbap
vulnerability_id VCID-v5rq-g6e5-jbap
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11833.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11833.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11833
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06404
published_at 2026-04-01T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06437
published_at 2026-04-02T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06473
published_at 2026-04-04T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06461
published_at 2026-04-07T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06511
published_at 2026-04-08T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06552
published_at 2026-04-09T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06547
published_at 2026-04-11T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.0654
published_at 2026-04-12T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06531
published_at 2026-04-13T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06466
published_at 2026-04-16T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06474
published_at 2026-04-18T12:55:00Z
11
value 0.00024
scoring_system epss
scoring_elements 0.06623
published_at 2026-04-21T12:55:00Z
12
value 0.00024
scoring_system epss
scoring_elements 0.06635
published_at 2026-04-24T12:55:00Z
13
value 0.00024
scoring_system epss
scoring_elements 0.06649
published_at 2026-04-26T12:55:00Z
14
value 0.00024
scoring_system epss
scoring_elements 0.06644
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11833
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10126
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10126
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11486
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11599
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11815
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11833
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11884
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3846
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5489
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9500
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9503
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1712072
reference_id 1712072
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1712072
17
reference_url https://access.redhat.com/errata/RHSA-2019:2029
reference_id RHSA-2019:2029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2029
18
reference_url https://access.redhat.com/errata/RHSA-2019:2043
reference_id RHSA-2019:2043
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2043
19
reference_url https://access.redhat.com/errata/RHSA-2019:3309
reference_id RHSA-2019:3309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3309
20
reference_url https://access.redhat.com/errata/RHSA-2019:3517
reference_id RHSA-2019:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3517
21
reference_url https://usn.ubuntu.com/4068-1/
reference_id USN-4068-1
reference_type
scores
url https://usn.ubuntu.com/4068-1/
22
reference_url https://usn.ubuntu.com/4068-2/
reference_id USN-4068-2
reference_type
scores
url https://usn.ubuntu.com/4068-2/
23
reference_url https://usn.ubuntu.com/4069-1/
reference_id USN-4069-1
reference_type
scores
url https://usn.ubuntu.com/4069-1/
24
reference_url https://usn.ubuntu.com/4069-2/
reference_id USN-4069-2
reference_type
scores
url https://usn.ubuntu.com/4069-2/
25
reference_url https://usn.ubuntu.com/4076-1/
reference_id USN-4076-1
reference_type
scores
url https://usn.ubuntu.com/4076-1/
26
reference_url https://usn.ubuntu.com/4095-2/
reference_id USN-4095-2
reference_type
scores
url https://usn.ubuntu.com/4095-2/
27
reference_url https://usn.ubuntu.com/4118-1/
reference_id USN-4118-1
reference_type
scores
url https://usn.ubuntu.com/4118-1/
fixed_packages
aliases CVE-2019-11833
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v5rq-g6e5-jbap
34
url VCID-xf8u-tez7-rug4
vulnerability_id VCID-xf8u-tez7-rug4
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-13648.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-13648.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-13648
reference_id
reference_type
scores
0
value 0.00089
scoring_system epss
scoring_elements 0.25466
published_at 2026-04-04T12:55:00Z
1
value 0.00089
scoring_system epss
scoring_elements 0.25363
published_at 2026-04-01T12:55:00Z
2
value 0.00089
scoring_system epss
scoring_elements 0.25431
published_at 2026-04-02T12:55:00Z
3
value 0.00098
scoring_system epss
scoring_elements 0.27003
published_at 2026-04-11T12:55:00Z
4
value 0.00098
scoring_system epss
scoring_elements 0.26958
published_at 2026-04-12T12:55:00Z
5
value 0.00098
scoring_system epss
scoring_elements 0.26901
published_at 2026-04-13T12:55:00Z
6
value 0.00098
scoring_system epss
scoring_elements 0.26912
published_at 2026-04-16T12:55:00Z
7
value 0.00098
scoring_system epss
scoring_elements 0.26888
published_at 2026-04-18T12:55:00Z
8
value 0.00098
scoring_system epss
scoring_elements 0.26852
published_at 2026-04-21T12:55:00Z
9
value 0.00098
scoring_system epss
scoring_elements 0.26803
published_at 2026-04-24T12:55:00Z
10
value 0.00098
scoring_system epss
scoring_elements 0.26795
published_at 2026-04-26T12:55:00Z
11
value 0.00098
scoring_system epss
scoring_elements 0.26729
published_at 2026-04-29T12:55:00Z
12
value 0.00098
scoring_system epss
scoring_elements 0.26885
published_at 2026-04-07T12:55:00Z
13
value 0.00098
scoring_system epss
scoring_elements 0.26953
published_at 2026-04-08T12:55:00Z
14
value 0.00098
scoring_system epss
scoring_elements 0.26999
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-13648
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8553
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18509
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20856
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5995
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10639
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10639
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12817
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12984
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13233
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13233
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15239
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15239
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1999
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3882
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3900
22
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1735630
reference_id 1735630
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1735630
24
reference_url https://access.redhat.com/errata/RHSA-2019:3517
reference_id RHSA-2019:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3517
25
reference_url https://access.redhat.com/errata/RHSA-2020:1016
reference_id RHSA-2020:1016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1016
26
reference_url https://access.redhat.com/errata/RHSA-2020:3019
reference_id RHSA-2020:3019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3019
27
reference_url https://usn.ubuntu.com/4114-1/
reference_id USN-4114-1
reference_type
scores
url https://usn.ubuntu.com/4114-1/
28
reference_url https://usn.ubuntu.com/4115-1/
reference_id USN-4115-1
reference_type
scores
url https://usn.ubuntu.com/4115-1/
29
reference_url https://usn.ubuntu.com/4116-1/
reference_id USN-4116-1
reference_type
scores
url https://usn.ubuntu.com/4116-1/
fixed_packages
aliases CVE-2019-13648
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xf8u-tez7-rug4
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-147%3Farch=el8